The proceedings contain 85 papers. The topics discussed include: tipple band s-type antenna with meander line for ism band application;personality prediction of social network users using LstM based sentiment analysis...
ISBN:
(纸本)9781665421119
The proceedings contain 85 papers. The topics discussed include: tipple band s-type antenna with meander line for ism band application;personality prediction of social network users using LstM based sentiment analysis;credit card assent using supervised learning;a survey on machine learning-based facial recognition algorithm;a novel remote sensing based approach to estimate the water quality index using sentinel-2 multispectral data;seasonal sales prediction and visualization for Walmart retail chain using time series and regression analysis: a comparative study;low power enhanced trivium implementation using parallel-pipeline technique;aspect based sentiment analysis for customer reviews;deep neural network based medical image steganography;rotation scheme based power consumption analysis for wireless sensor network;detecting offensive Tamil texts using machine learning and multilingual transformer models;and deep learning method for classifying thyroid nodules using ultrasound images.
We study the Traveling Salesman Problem (TSP) in the Congested Clique Model (CCM) of distributedcomputing. We present a deterministic distributed algorithm that computes a tour for the TSP using O(1) rounds and O(m) ...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
We study the Traveling Salesman Problem (TSP) in the Congested Clique Model (CCM) of distributedcomputing. We present a deterministic distributed algorithm that computes a tour for the TSP using O(1) rounds and O(m) messages for a given undirected weighted complete graph of n nodes and m edges with an approximation factor 2 of the optimal. The TSP has wide applications in logistics, planning, manufacturing and testing microchips, DNA sequencing etc., and we claim that our proposed O(1)-rounds approximation algorithm to the TSP, which is fast and efficient, can also be used to minimize the energy consumption in Wireless sensor Networks.
The rapid rise of 5G networks has accelerated the integration of smart cities, marking the emergence of increased intelligence in urban environments, often referred to as Smart Cities. This swift integration has inter...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
The rapid rise of 5G networks has accelerated the integration of smart cities, marking the emergence of increased intelligence in urban environments, often referred to as Smart Cities. This swift integration has interconnected a wide range of devices and systems, thereby exposing them to potential vulnerabilities. As a result, a smart urban landscape has emerged where valuable and sensitive information is shared without adequate attention to security considerations. Given these challenges, it is essential to implement an effective cloud-based Intrusion Detection System (IDS) for the security of smart cities. This work examines the reliability and robustness of various ensemble learning models, focusing on evaluating the performance and efficiency of an IDS strategy based on machine learning to enhance the security of IoT in smart urban networks. We conducted experimental procedures on three commonly used datasets to achieve the objectives of our study. The results obtained from these procedures are crucial for developing practical IDS solutions that address the ever-changing challenges posed by diverse, smart, cloud-based network traffic systems in smart cities.
Like any other Internet of Things (IoT) communication solution, LoRaWAN is vulnerable to profiling attacks such as Denial of Service including reactive jamming or Man in The Middle attacks. These attacks can be challe...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
Like any other Internet of Things (IoT) communication solution, LoRaWAN is vulnerable to profiling attacks such as Denial of Service including reactive jamming or Man in The Middle attacks. These attacks can be challenging to detect and source-locate due to their brief occurrence when attempting to block or simulate a signal. Its deployment requires good accuracy on time predictability. This paper analyzes the temporal behavior of data packets that were captured in a real-world environment with LoRaWAN links over a 16-month period with more than 8 million frames. The aim is to provide tools for analyzing temporal predictability on LoRa data packets to enhance future secure designs. To achieve this, we propose some features and apply them to the dataset. The study reveals slight variations in behavior within the coverage area on a monthly basis, as well as the existence of easily predictable temporal patterns in some device transmissions. Additionally, our findings indicate that designing the LoRaWAN IoT system to transmit at pseudorandom intervals or avoiding static increments in the frame counter could mitigate the risk of time predictability.
Communicating UAVs (Unmanned Aerial Vehicles) are promising in terms of applications, but require to address numerous research issues. In this paper, we study the impact of the quality of Wi-Fi communications on the b...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
Communicating UAVs (Unmanned Aerial Vehicles) are promising in terms of applications, but require to address numerous research issues. In this paper, we study the impact of the quality of Wi-Fi communications on the behavior of remotely controlled UAVs. To this end, we design an experimental platform composed of PX4 Vision UAVs, a Motion Capture system, and a tool to generate mission traffic from the ground station. By defining different scenarios and different traffic configurations, we conduct a set of experiments. This allows us to analyze how the presence of mission traffic impacts the stability of the reception of the control traffic, and how, in turn, it impacts the behavior of the UAVs.
distributed clustering algorithms are employed in wireless sensor network (WSN) to improve the local data analysis. This process is carried out collaboratively with the help of nearby neighbours without a central cont...
详细信息
AI on the edge as a paradigm promises unparalleled energy efficiency and data privacy among other benefits. This has resulted in a rising trend of approaches to bring AI computing near or embedded directly inside a se...
详细信息
The promises of the computing continuum paradigm motivate a paradigm change for Internet-distributedcomputingsystems. Unfortunately, we are still far from being able to develop computing continuum systems. We try to...
详细信息
ISBN:
(纸本)9798350340754
The promises of the computing continuum paradigm motivate a paradigm change for Internet-distributedcomputingsystems. Unfortunately, we are still far from being able to develop computing continuum systems. We try to move one step forward in the direction of the computing continuum systems by defining design phases for the interconnection of the application with its underlying infrastructure. We assume that SLOs are critical to that endeavor. Hence, we analyze its usage in the scientific literature. Based on the learnings obtained, we define 9 design phases to provide homogeneity and common behaviors in large-scale, heterogeneous, distributed, and complex systems.
Network calculus has seen extensive use in the performance modeling of communications systems. Here, we apply network calculus techniques to the modeling of streaming data applications running on heterogeneous computi...
详细信息
ISBN:
(纸本)9798350364613;9798350364606
Network calculus has seen extensive use in the performance modeling of communications systems. Here, we apply network calculus techniques to the modeling of streaming data applications running on heterogeneous computing platforms. We quantitatively compare the performance predictions from network calculus with predictions from a discrete-event simulation model and a previously presented queuing theory model.
In the rapidly evolving landscape of Intelligent Transportation systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flow. However, VANETs face significant securi...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
In the rapidly evolving landscape of Intelligent Transportation systems (ITS), Vehicular Ad-hoc Networks (VANETs) play a critical role in enhancing road safety and traffic flow. However, VANETs face significant security and privacy challenges due to their high mobility, dynamic topology, and reliance on open wireless communication. This study addresses the critical question of enhancing the security and privacy of VANET communications amidst the challenges of high mobility, dynamic topology, and the threat of various cyber-attacks. This paper presents a comprehensive solution to enhance the security of VANETs by introducing a novel Physically Unclonable Function (PUF)-based authentication scheme. Our approach leverages the intrinsic security features of PUFs, integrating them with lightweight cryptography to fortify the network against physical acquisition attacks and ensure secure communication over potentially insecure channels. The proposed scheme is meticulously designed to address the unique security and privacy requirements of VANETs, offering a scalable and resilient framework for authenticating and managing the network's entities. Through an extensive evaluation using a realistic experimental setup, our solution demonstrates its efficacy in providing a secure, reliable, and efficient authentication mechanism for VANETs. The scheme balances computational efficiency with advanced security features, making it well-suited for the resource-constrained environment of vehicular networks.
暂无评论