A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete...A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.展开更多
Establishing a sense of ritual within tourism consumption scenarios offers tourists the opportunity for interactive engagement.Drawing upon the value co-creation theory,this study constructed an influence mechanism mo...Establishing a sense of ritual within tourism consumption scenarios offers tourists the opportunity for interactive engagement.Drawing upon the value co-creation theory,this study constructed an influence mechanism model to examine tourists'active engagement in the process of co-creating tourism experience values.It employed Partial Least Squares Structural Equation Modeling(PLS-SEM)to empirically test the proposed hypotheses.The findings demonstrate that the model constructed in the present study exhibits robust reliability,validity,and explanatory power.The perception of the sense of ritual in tourism exerts a significant positive influence on tourists’co-creation of tourism experience values,thereby significantly enhancing both the communitas and flow experienced by tourists during their travels.Moreover,such communitas and flow can mediate the influence of the sense of ritual in tourism on tourists’co-creation of tourism experience values.This study contributes to advancing the current research on tourists’co-creation of tourism experience values and the sense of ritual in tourism,thereby providing theoretical foundations for cultivating a sense of ritual within tourism consumption scenarios.展开更多
With Taining national scenic area as the case study, the guidance of ecological footprint analysis on the sustainable development of tourist destination was expounded.
Remote sensing, in particular satellite imagery, has been widely used to map cropland, analyze cropping systems, monitor crop changes, and estimate yield and production. However, although satellite imagery is useful w...Remote sensing, in particular satellite imagery, has been widely used to map cropland, analyze cropping systems, monitor crop changes, and estimate yield and production. However, although satellite imagery is useful within large scale agriculture applications (such as on a national or provincial scale), it may not supply sufifcient information with adequate resolution, accurate geo-referencing, and specialized biological parameters for use in relation to the rapid developments being made in modern agriculture. Information that is more sophisticated and accurate is required to support reliable decision-making, thereby guaranteeing agricultural sustainability and national food security. To achieve this, strong integration of information is needed from multi-sources, multi-sensors, and multi-scales. In this paper, we propose a new framework of satellite, aerial, and ground-integrated (SAGI) agricultural remote sensing for use in comprehensive agricultural monitoring, modeling, and management. The prototypes of SAGI agriculture remote sensing are ifrst described, followed by a discussion of the key techniques used in joint data processing, image sequence registration and data assimilation. Finally, the possible applications of the SAGI system in supporting national food security are discussed.展开更多
Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-...Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-pressure, state and exposure to pollution-response (DPSER) model as a basis, a conceptual framework of regional ecological evaluation and an index system were established. The extraction and standardization of evaluation indices were carried out with GIS techniques, an information extraction model and a data standardization model. The conversion of regional ecological security results from the pixel scale to a small watershed or county scale was obtained with an evaluation model and a scaling model. Two conceptual scale conversion models of regional ecological security from the pixel scale to the county scale were proposed: 1) scale conversion of ecological security regime results from plxel to small watershed; and 2) scale conversion from pixel to county. These research results could provide useful ideas for regional ecological security evaluation as well as ecological and environmental management.展开更多
This paper seeks to explore the role of Remote Sensing in solving the agriculture related problems, which are the basic issues of sustainable development.
Purpose: The concept of security is related to the experience of health but has ever so often been argued from a risk perspective rather than from a promotional perspective. The experience of older persons’ sense of ...Purpose: The concept of security is related to the experience of health but has ever so often been argued from a risk perspective rather than from a promotional perspective. The experience of older persons’ sense of security in private homes and in nursing homes seems to be missing when it comes to promote aging well throughout the life span. This study aimed to describe and analyze factors related to the sense of security of older persons receiving care in nursing homes in Sweden. Design and Methods: The study was based on a questionnaire from a total of 495 persons aged ≥ 65 in private homes (n = 350) or nursing homes (n = 145) in Sweden. Results: Secure relationships, sense of control, and perceived health were significantly related to the subjects’ sense of security. No significant relationships were found between sense of security and having a personal emergency response alarm. Implications: Experience of sense of security from the older person perspective differs depending on the context. To promote the sense of security within the care of older persons, methods on how to establish secure relations as well as the sense of control and knowledge need to be further tested, developed and analyzed together with older persons.展开更多
Aiming at some security problems in railway running and the application condition of existing technology, this paper studies some issues of using fiber optic sensing technology in railway security monitoring. Through ...Aiming at some security problems in railway running and the application condition of existing technology, this paper studies some issues of using fiber optic sensing technology in railway security monitoring. Through field experiment measuring the strain of the rail and analyzing the experiment data, the method of diagnosing the health condition of rail and wheel is investigated.展开更多
As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying i...As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying it to remote sensing data recently. Because of the particularity of remote sensing image, higher requirements are put forward for its security and management, especially for the copyright protection, illegal use and authenticity identification of remote sensing image data. Therefore, this paper proposes to use image watermarking technology to achieve comprehensive security protection of remote sensing image data, while the use of cryptography technology increases the applicability and security of watermarking technology. The experimental results show that the scheme of remote sensing image digital watermarking technology has good performance in the imperceptibility and robustness of watermarking.展开更多
To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing(MCS) systems must address security threats ...To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing(MCS) systems must address security threats such as jamming, spoofing and faked sensing attacks during both sensing and information exchange processes in large-scale dynamic and heterogeneous networks. In this article, we investigate secure mobile crowdsensing and present ways to use deep learning(DL) methods, such as stacked autoencoder, deep neural networks, convolutional neural networks, and deep reinforcement learning, to improve approaches to MCS security, including authentication, privacy protection, faked sensing countermeasures, intrusion detection and anti-jamming transmissions in MCS. We discuss the performance gain of these DLbased approaches compared to traditional security schemes and identify the challenges that must be addressed to implement these approaches in practical MCS systems.展开更多
Cognitive Internet of Things(IoT)has at-tracted much attention due to its high spectrum uti-lization.However,potential security of the short-packet communications in cognitive IoT becomes an important issue.This paper...Cognitive Internet of Things(IoT)has at-tracted much attention due to its high spectrum uti-lization.However,potential security of the short-packet communications in cognitive IoT becomes an important issue.This paper proposes a relay-assisted maximum ratio combining/zero forcing beamforming(MRC/ZFB)scheme to guarantee the secrecy perfor-mance of dual-hop short-packet communications in cognitive IoT.This paper analyzes the average secrecy throughput of the system and further investigates two asymptotic scenarios with the high signal-to-noise ra-tio(SNR)regime and the infinite blocklength.In ad-dition,the Fibonacci-based alternating optimization method is adopted to jointly optimize the spectrum sensing blocklength and transmission blocklength to maximize the average secrecy throughput.The nu-merical results verify the impact of the system pa-rameters on the tradeoff between the spectrum sensing blocklength and transmission blocklength under a se-crecy constraint.It is shown that the proposed scheme achieves better secrecy performance than other bench-mark schemes.展开更多
Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still fac...Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article.Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article.展开更多
The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data g...The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches.展开更多
基金supported by the Key Area R&D Program of Guangdong Province (Grant No.2022B0701180001)the National Natural Science Foundation of China (Grant No.61801127)+1 种基金the Science Technology Planning Project of Guangdong Province,China (Grant Nos.2019B010140002 and 2020B111110002)the Guangdong-Hong Kong-Macao Joint Innovation Field Project (Grant No.2021A0505080006)。
文摘A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality.
基金This study was supported by the Humanities and Social Sciences Project of the Ministry of Education(No.23YJA790070)the Graduate Innovation Research Project of Southwest Minzu University(No.YB2022621)the Research Project of BCIMY(No.BCIMY1910).
文摘Establishing a sense of ritual within tourism consumption scenarios offers tourists the opportunity for interactive engagement.Drawing upon the value co-creation theory,this study constructed an influence mechanism model to examine tourists'active engagement in the process of co-creating tourism experience values.It employed Partial Least Squares Structural Equation Modeling(PLS-SEM)to empirically test the proposed hypotheses.The findings demonstrate that the model constructed in the present study exhibits robust reliability,validity,and explanatory power.The perception of the sense of ritual in tourism exerts a significant positive influence on tourists’co-creation of tourism experience values,thereby significantly enhancing both the communitas and flow experienced by tourists during their travels.Moreover,such communitas and flow can mediate the influence of the sense of ritual in tourism on tourists’co-creation of tourism experience values.This study contributes to advancing the current research on tourists’co-creation of tourism experience values and the sense of ritual in tourism,thereby providing theoretical foundations for cultivating a sense of ritual within tourism consumption scenarios.
基金Supported by Innovation Program for Young Talents of Science and Technology Department of Fujian Province (2008F3082) ~~
文摘With Taining national scenic area as the case study, the guidance of ecological footprint analysis on the sustainable development of tourist destination was expounded.
基金supported by the Opening Project of the Key Laboratory of Agri-Informatics,Ministry of Agriculture of China(2012004)the National Basic Research Program of China(973 Program,2010CB951500)+2 种基金the Innovation Project of Chinese Academy of Agricultural Sciencesthe National Natural Science Foundation of China(41301365)the National High-Tech R&D Program of China(863 Program,2013AA12A401)
文摘Remote sensing, in particular satellite imagery, has been widely used to map cropland, analyze cropping systems, monitor crop changes, and estimate yield and production. However, although satellite imagery is useful within large scale agriculture applications (such as on a national or provincial scale), it may not supply sufifcient information with adequate resolution, accurate geo-referencing, and specialized biological parameters for use in relation to the rapid developments being made in modern agriculture. Information that is more sophisticated and accurate is required to support reliable decision-making, thereby guaranteeing agricultural sustainability and national food security. To achieve this, strong integration of information is needed from multi-sources, multi-sensors, and multi-scales. In this paper, we propose a new framework of satellite, aerial, and ground-integrated (SAGI) agricultural remote sensing for use in comprehensive agricultural monitoring, modeling, and management. The prototypes of SAGI agriculture remote sensing are ifrst described, followed by a discussion of the key techniques used in joint data processing, image sequence registration and data assimilation. Finally, the possible applications of the SAGI system in supporting national food security are discussed.
基金Project supported by the National Natural Science Foundation of China (No. 40301002) and the State EnvironmentalProtection Administration of China.
文摘Based on related literature and this research, an ecological security evaluation from the pixel scale to the small watershed or county scale was presented using remote sensing data and related models. With the driver-pressure, state and exposure to pollution-response (DPSER) model as a basis, a conceptual framework of regional ecological evaluation and an index system were established. The extraction and standardization of evaluation indices were carried out with GIS techniques, an information extraction model and a data standardization model. The conversion of regional ecological security results from the pixel scale to a small watershed or county scale was obtained with an evaluation model and a scaling model. Two conceptual scale conversion models of regional ecological security from the pixel scale to the county scale were proposed: 1) scale conversion of ecological security regime results from plxel to small watershed; and 2) scale conversion from pixel to county. These research results could provide useful ideas for regional ecological security evaluation as well as ecological and environmental management.
文摘This paper seeks to explore the role of Remote Sensing in solving the agriculture related problems, which are the basic issues of sustainable development.
文摘Purpose: The concept of security is related to the experience of health but has ever so often been argued from a risk perspective rather than from a promotional perspective. The experience of older persons’ sense of security in private homes and in nursing homes seems to be missing when it comes to promote aging well throughout the life span. This study aimed to describe and analyze factors related to the sense of security of older persons receiving care in nursing homes in Sweden. Design and Methods: The study was based on a questionnaire from a total of 495 persons aged ≥ 65 in private homes (n = 350) or nursing homes (n = 145) in Sweden. Results: Secure relationships, sense of control, and perceived health were significantly related to the subjects’ sense of security. No significant relationships were found between sense of security and having a personal emergency response alarm. Implications: Experience of sense of security from the older person perspective differs depending on the context. To promote the sense of security within the care of older persons, methods on how to establish secure relations as well as the sense of control and knowledge need to be further tested, developed and analyzed together with older persons.
文摘Aiming at some security problems in railway running and the application condition of existing technology, this paper studies some issues of using fiber optic sensing technology in railway security monitoring. Through field experiment measuring the strain of the rail and analyzing the experiment data, the method of diagnosing the health condition of rail and wheel is investigated.
文摘As a means of copyright protection for multimedia data, digital watermarking technology has attracted more and more attention in various research fields. Researchers have begun to explore the feasibility of applying it to remote sensing data recently. Because of the particularity of remote sensing image, higher requirements are put forward for its security and management, especially for the copyright protection, illegal use and authenticity identification of remote sensing image data. Therefore, this paper proposes to use image watermarking technology to achieve comprehensive security protection of remote sensing image data, while the use of cryptography technology increases the applicability and security of watermarking technology. The experimental results show that the scheme of remote sensing image digital watermarking technology has good performance in the imperceptibility and robustness of watermarking.
基金supported in part by the National Natural Science Foundation of China under Grant 61671396 and 91638204in part by the open research fund of National Mobile Communications Research Laboratory,Southeast University(No.2018D08)in part by Science and Technology Innovation Project of Foshan City,China(Grant No.2015IT100095)
文摘To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing(MCS) systems must address security threats such as jamming, spoofing and faked sensing attacks during both sensing and information exchange processes in large-scale dynamic and heterogeneous networks. In this article, we investigate secure mobile crowdsensing and present ways to use deep learning(DL) methods, such as stacked autoencoder, deep neural networks, convolutional neural networks, and deep reinforcement learning, to improve approaches to MCS security, including authentication, privacy protection, faked sensing countermeasures, intrusion detection and anti-jamming transmissions in MCS. We discuss the performance gain of these DLbased approaches compared to traditional security schemes and identify the challenges that must be addressed to implement these approaches in practical MCS systems.
基金Natural Science Foun-dation of China(No.62171464,61801496 and 61771487)This paper was presented in part at the 2021 IEEE International Conference on Communica-tions Workshops(ICC Workshops),2021.
文摘Cognitive Internet of Things(IoT)has at-tracted much attention due to its high spectrum uti-lization.However,potential security of the short-packet communications in cognitive IoT becomes an important issue.This paper proposes a relay-assisted maximum ratio combining/zero forcing beamforming(MRC/ZFB)scheme to guarantee the secrecy perfor-mance of dual-hop short-packet communications in cognitive IoT.This paper analyzes the average secrecy throughput of the system and further investigates two asymptotic scenarios with the high signal-to-noise ra-tio(SNR)regime and the infinite blocklength.In ad-dition,the Fibonacci-based alternating optimization method is adopted to jointly optimize the spectrum sensing blocklength and transmission blocklength to maximize the average secrecy throughput.The nu-merical results verify the impact of the system pa-rameters on the tradeoff between the spectrum sensing blocklength and transmission blocklength under a se-crecy constraint.It is shown that the proposed scheme achieves better secrecy performance than other bench-mark schemes.
基金the National Natural Science Foundation of China(No.62171462,No.62231027,No.U20B2038,No.61931011,No.62001514 and No.62271501).
文摘Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article.Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R319)PrincessNourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4210118DSR48).
文摘The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches.