The proceedings contain 63 papers. The topics discussed include: a novel simple 6d hyperchaotic system with hidden attractors;hybrid function projective synchronization via a nonlinear control;dynamic power reduction ...
ISBN:
(纸本)9781665426329
The proceedings contain 63 papers. The topics discussed include: a novel simple 6d hyperchaotic system with hidden attractors;hybrid function projective synchronization via a nonlinear control;dynamic power reduction in Huffman design using 130 nm technology library;comparative analysis of AI-powered approaches for skeleton-based child and adult action recognition in multi-person environment;a comprehensive review for video anomaly detection on videos;optimal path selection for a universal relation view of relational databases;evaluating the performance of id3 method to analyze and predict students' performance in online platforms;facial emotion classification of multi-type datasets based on SVM classifier;design of a compact MIMO antenna for wireless communication applications;and a review of the impairments and challenges of radio over fiber technology and their mitigation strategies.
The proceedings contain 124 papers. The topics discussed include: a machine leaning based Parkinson’s detection using acoustic features;performance analysis of various image steganography techniques;development of ap...
ISBN:
(纸本)9781665458344
The proceedings contain 124 papers. The topics discussed include: a machine leaning based Parkinson’s detection using acoustic features;performance analysis of various image steganography techniques;development of application software for generating music composition inspired by nature using deep learning;validation of an information diffusion based health social media on yoga and ayurveda;DEVINE: distributed energy-related virtual network embedding approach utilizing multiple objective optimization;masked or unmasked face detection from online video using learning aided pattern recognition method;an experimental study on hyper-parameter optimization for breast cancer risk prediction using IBM snap machine learning techniques;categorizing data for sentimental analysis by auto-focusing mechanism using natural language processing;single camera based real time framework for automated fall detection;secret key generation using genetic algorithm for the hybrid blowfish encryption and substitution ciphers;classification and detection of Covid-19 using deep transfer learning techniques;encrypted cloud storage approach for a multicloud environment using fog computing;and programmable stickers to monitor perishable goods using blockchain.
The proceedings contain 33 papers. The topics discussed include: predicting the habitat for alien species based on gis;research of mobile recommender service based on user preferences and social tags;vehicle image cla...
ISBN:
(纸本)9781450371728
The proceedings contain 33 papers. The topics discussed include: predicting the habitat for alien species based on gis;research of mobile recommender service based on user preferences and social tags;vehicle image classification using data mining techniques;spectrum allocation of cognitive radio network based on improved cuckoo search algorithm;a fusion clustering algorithm based on global gravitation search and partitioning around medoid;design and implementation of B2B E-commerce platform based on microservices architecture;bi-group Bayesian personalized ranking from implicit feedback;grouping based on comparison of data and grouping consecutive data for logging visualization;a neural network-based method for automatic pericardium segmentation;learning rate adaptive kernel correlation filter tracking algorithm combined with multi-feature fusion;and micro-level data analysis and visualization of the interrelation between confidence and athletic performance.
The proceedings contain 163 papers. The topics discussed include: method to supply acoustic positioning and communication service simultaneously for underwater multiple users;virtual gradiometer-based noise reduction ...
ISBN:
(纸本)9781665476164
The proceedings contain 163 papers. The topics discussed include: method to supply acoustic positioning and communication service simultaneously for underwater multiple users;virtual gradiometer-based noise reduction method for wearable magnetoencephalography;research on short text entity disambiguation based on entity type classification;a direct-coupled harmonic rejection mixer employing IIP3 improving technology;robust self-supervised correspondence learning for SAR-optical image matching;automatic generation model of host micro- segmentation in distribution master station based on distributed intrusion detection;method for speed measurement of small radar targets based on adaptive signal separation;design of a near-spherical digital phased array with a large coverage;and design of miniaturized quadrupole waveguide filter based on spatial multiplexing.
The proceedings contain 40 papers. The special focus in this conference is on Database and Expert Systems Applications. The topics include: Synthetic Data in Automatic Number Plate Recognition;An Untold Tale of...
ISBN:
(纸本)9783031143427
The proceedings contain 40 papers. The special focus in this conference is on Database and Expert Systems Applications. The topics include: Synthetic Data in Automatic Number Plate Recognition;An Untold Tale of Scientific Collaboration: SCCH and AC 2 T;on the Creation and Maintenance of a Documentation Generator in an Applied Research Context;towards the Digitalization of Additive Manufacturing;Twenty Years of Successful Translational Research: A Case Study of Three COMET Centers;data Integration, Management, and Quality: From Basic Research to Industrial Application;building a YouTube Channel for science Communication;introduction of Visual Regression Testing in Collaboration Between Industry and Academia;vibration Analysis for Rotatory Elements Wear Detection in Paper Mill Machine;applying Time-Inhomogeneous Markov Chains to Math Performance Rating;introducing Data science Techniques into a Company Producing Electrical Appliances;a Technology Transfer Portal to Promote Industry-Academia Collaboration in South-Tyrol;fast and Automatic Object Registration for Human-Robot Collaboration in Industrial Manufacturing;sending Spies as Insurance Against Bitcoin Pool Mining Block Withholding Attacks;risks in DeFi-Lending Protocols - An Exploratory Categorization and Analysis of Interest Rate Differences;battling the Bullwhip Effect with Cryptography;Reporting of Cross-Border Transactions for Tax Purposes via DLT;securing File System Integrity and Version History Via Directory Merkle Trees and Blockchains;taxation of Blockchain Staking Rewards: Propositions Based on a Comparative Legal Analysis;comparison Framework for Blockchain Interoperability Implementations;A Comparative Analysis of Anomaly Detection Methods for Predictive Maintenance in SME;towards Strategies for Secure Data Transfer of IoT Devices with Limited Resources;application of Validation Obligations to Security Concerns;mode Switching for Secure Edge Devices;a Lifecycle Framework for Semantic Web Machine Learn
Mind-controlled robotics can help people with disabilities to have a better life than ever. Childhood is the most enjoyable lifespan, which cannot be repeated. However, children with disabilities have the least enjoym...
详细信息
ISBN:
(纸本)9781665426329
Mind-controlled robotics can help people with disabilities to have a better life than ever. Childhood is the most enjoyable lifespan, which cannot be repeated. However, children with disabilities have the least enjoyment in their childhood. In this work, we aimed to examine the available robot toys that are educational and made for disabled children, studying their capabilities. The literature on mind-controlled educational robot toys is presented to determine the gaps available as open problems and future directions. The main observation of this study is that available educational robot toys may assist normal children, but the available mind-controlled ones lack the feature of being educational. Besides all, state of the art presented concerns on power management and data privacy concerns for all robot toys.
The Internet of Things (IoT) is a new technological trend involved in many of our day-to-day activities, and its applications cover many aspects of our lives, including healthcare, military, industry, etc. Therefore, ...
详细信息
ISBN:
(纸本)9781665426329
The Internet of Things (IoT) is a new technological trend involved in many of our day-to-day activities, and its applications cover many aspects of our lives, including healthcare, military, industry, etc. Therefore, testing IoT applications, services, and systems is crucial to avoid losses in resources and lives, especially in critical application domains. This paper presents a survey on IoT testing and its types. Each testing type is briefly introduced in many cases with its main challenges and possible solutions. Thus, it contributes to the understanding of IoT testing along with the significant efforts introduced in this regard. Furthermore, it provides several directions that need more attention from academia and industry. Several publications on the topic were gathered, read, and analyzed to achieve the aforementioned goals.
Information security has progressed dramatically over the past century because of the significant advancements in computer and communications research. As a result, numerous scholars have made it their major goal to e...
详细信息
ISBN:
(纸本)9781665426329
Information security has progressed dramatically over the past century because of the significant advancements in computer and communications research. As a result, numerous scholars have made it their major goal to examine, improve, implement, or compare its methods. Cryptography is one of the most critical information security topics, with many different encryption algorithms, such as symmetric key and public key encryption methods, branching out from it. Homomorphic encryption is a form of encryption that permits mathematical operations on a ciphertext;it has recently become famous for protecting data in the cloud. This paper offers essential knowledge to researchers who may want it before implementing homomorphic/public key methods. It analyses the unpadded RSA, Paillier, and ElGamal public-key algorithms. The evaluation is done according to several criteria, including secrecy, homomorphism property, encryption/decryption time, memory usage, encryption throughput criteria, and how different file sizes and key sizes affect these criteria. The results demonstrate that the three algorithms compete in the analysed criteria. Depending on the application and the required features, any one of the algorithms might be favoured over the other.
Network programming provides new security solutions for traditional networks. However, software-defined networking still suffers from security issues. An important one is the weaknesses related to the OpenFlow channel...
详细信息
ISBN:
(纸本)9781665426329
Network programming provides new security solutions for traditional networks. However, software-defined networking still suffers from security issues. An important one is the weaknesses related to the OpenFlow channel between network devices and controller, as the network can be attacked via the OpenFlow channel and exploit communications with the control plane. Our work proposes a solution to provide adequate security for OpenFlow messages in software-defined networks by using a hybrid key consisting of classical and quantum key distribution protocols to provide double security' depending on the quantum's computational complexity and physical properties. To achieve this goal, the hybrid key is used with transport layer security protocol to provide confidentiality, integrity and quantum authentication to secure software-defined network connections between the control and data planes. We experimentally based on the SDN-testbed to show the workflow of exchanging quantum and classical keys between the control plane and network devices in the data plane, and our results showed the effectiveness of the hybrid key to enhance the security of the transport layer security protocol. Thereby achieving adequate security for controller communications with the data plane against classical and quantum computer attacks by conducting security analysis and clarifying the efficiency of the proposal in terms of the average required time.
暂无评论