The rapid expansion of Internet of Things (IoT) and Edge devices has introduced a variety of security challenges, particularly within resource-constrained computing environments. This paper aims to address these chall...
The rapid expansion of Internet of Things (IoT) and Edge devices has introduced a variety of security challenges, particularly within resource-constrained computing environments. This paper aims to address these challenges by proposing a resource-efficient anomaly-based intrusion detection system tailored for IoT and Edge Devices, leveraging the capabilities of Binary Neural Networks (BNNs). Anomaly-based systems have demonstrated their efficacy in identifying potential cyber-attacks, but their conventional development methods often demand substantial storage and computational resources. Therefore, this research investigates the viability of BNNs for anomaly detection, offering a compelling alternative to full-precision approaches. Three distinct models are developed for this study using TensorFlow and Keras: Full-binary, Binary-weighted, and Full-precision. The models are trained and evaluated on the NSL-KDD dataset and achieved accuracy rates of 82%,87%, and 97% for these respective models. While binary networks experience a minor performance reduction due to aggressive quantization, they maintain notable levels of accuracy and precision. This observation takes into consideration the anticipated reduction in resource requirements, affirming the feasibility of BNNs' utilization for efficient anomaly detection.
In recent years, a variety of paints have been developed in response to the diversification of color design. Due to the powder manufacturing process, different sizes of powders may randomly attach to each powder. Sinc...
详细信息
In recent years, a variety of paints have been developed in response to the diversification of color design. Due to the powder manufacturing process, different sizes of powders may randomly attach to each powder. Since the objects attached to larger ones affect the quality of the product, they are specifically referred to as asteroid powder. Asteroid powders are similar in shape have many problems and it difficult to detect. This paper investigates whether an object detection method can automatically detect asteroid powders. It also tries to choose a suitable detection method. The paper compared two typical object detection methods YOLO and SSD. As a result, it has turned out YOLO works far better than SSD.
In VANET, a vehicle can exchange information from other vehicles and facilities around the road. However, the problems such as transmitting data over insecure wireless channels and storing information in insecure memo...
详细信息
In VANET, a vehicle can exchange information from other vehicles and facilities around the road. However, the problems such as transmitting data over insecure wireless channels and storing information in insecure memory can pose serious security threats. To solve this problem, research on authentication and key establishment using PUF is being actively conducted. In 2021, Umar et al. proposed an ID-based authentication and key establishment scheme using PUF in VANETs. However, their scheme has some security vulnerabilities and does not provide secure mutual authentication. In this paper, we analyze the security vulnerabilities of Umar et al. 's scheme and propose a secure authentication and key establishment scheme to solve the problems.
Layer-One.X (L1X) blockchain provides the infrastructure layer on which decentralized applications can be created. L1X's governance token distribution is important and requires a proportional balance between token...
详细信息
Layer-One.X (L1X) blockchain provides the infrastructure layer on which decentralized applications can be created. L1X's governance token distribution is important and requires a proportional balance between token distribution, nurturing user activity and engagement, and financial incentives. In this paper, we present research in progress of L1X tokenomics describing key concepts and implementations including token velocity and value, incentive scheme, and broad distribution. Particularly the economic design of the native token of the L1X blockchain is presented.
Internet economic markets have upgraded the traditional ways of product, service, consumption, and processing transactions and prompted the reforming of traditional multisided markets. With this background, our paper ...
详细信息
Video content classification has a wide range of application scenarios. In situations such as public place security and behavior prediction, the type of behavior of a person is inferred from the continuous images in t...
详细信息
Crime is a major factor that adds unnecessary financial stress to government. If agencies are able to intelligently and strategically use their resources, e.g., for crime prevention, then many benefits would arise. A ...
详细信息
Crime is a major factor that adds unnecessary financial stress to government. If agencies are able to intelligently and strategically use their resources, e.g., for crime prevention, then many benefits would arise. A variety of statistical methodologies had been explored to predict crime. However, few studies have explored and compared machine learning solutions. In this paper we utilize a range of machine learning and natural language process (NLP) approaches to build models that are able to predict offence categories, as well as their time and location. We focus specifically on environmental offences based on incident report data from the Department of the Environment, Land, Water and Planning (DELWP) in Victoria.
In recent years, digitalization has made significant developments in all areas of modern society. data analysis and the application of information technology are becoming increasingly important in the tourism industry...
In recent years, digitalization has made significant developments in all areas of modern society. data analysis and the application of information technology are becoming increasingly important in the tourism industry, which is an important pillar industry in Japan. Therefore, we propose a system with four main functions to support local governments in processing and using image data and deep learning to promote tourism. Function 1: The system classifies images by detecting faces and selects images without faces and personal information that can be used for local tourism promotion. Function 2: The system protects personal information by transforming image styles or adding mosaics, and the processed data can be used for image publishing and display. Function 3: The system classifies images according to season and other factors to organize tourism promotion materials. Function 4: The system expands the application by adding captions to the images, such as using the original image and captions to promote local scenery and festivals. These functions can help users to better utilize the image data for tourism promotion in local governments. Our goal is to reduce the workload of local governments and improve the efficiency of image data utilization. We also use image data to promote urban promotion and achieve regional revitalization. We have confirmed the usefulness of the proposed system for data processing and tourism promotion through cooperation with local govemments.
U-net is very popular in medical image segmentation. However, the labels of training sets are always lacking for supervised learning. Thus, semi-supervised learning which utilizes unlabeled data shows advantages when ...
详细信息
This paper reports pressure-temperature conditions for liquid + hydrate + vapor phase equilibrium of hydrate formed with deuterium oxide (D 2 O), CO 2 and cyclopentane. The aim of this study is to obtain the equilibr...
详细信息
This paper reports pressure-temperature conditions for liquid + hydrate + vapor phase equilibrium of hydrate formed with deuterium oxide (D 2 O), CO 2 and cyclopentane. The aim of this study is to obtain the equilibrium properties of the formed hydrate for the application to hydrate-based tritium separation process. Measurements with batch isochoric method were performed. The pressure and temperature ranges of measurement were from 1.63 MPa to 2.46 MPa and from 290.6 K to 293.4 K. The obtained results indicate that D 2 O + CO 2 + cyclopentane hydrate is formed in milder conditions than H 2 O + CO 2 + cyclopentane hydrate by 2.1 K at the given pressure conditions.
暂无评论