We present a novel 1 Human = 1 Node blockchain protocol which aims to overcome problems arising from plutocratic principles upon which Proof-of-Work (PoW) and Proof-of-Stake (PoS) heavily rely on. The advent of blockc...
详细信息
ISBN:
(纸本)9798400708534
We present a novel 1 Human = 1 Node blockchain protocol which aims to overcome problems arising from plutocratic principles upon which Proof-of-Work (PoW) and Proof-of-Stake (PoS) heavily rely on. The advent of blockchain technology has led to a massive wave of different decentralized ledger technology (DLT) solutions. Projects such as Bitcoin and Ethereum managed to shift the paradigm of how to transact value in a decentralized manner, yet their core technologies give rise to a significant early adopters’ control bias and have led to financial systems flawed by massive inequality and centralization of power. In this paper we propose an alternative to modern decentralized financial networks by introducing the Humanode network. Humanode is a network safeguarded by cryptographically secure bio-authorized nodes on which users are able to deploy nodes by staking their encrypted biometric data. This approach can potentially lead to the creation of a truly public, permissionless financial network, based on consensus between equal human nodes with algorithmic emission mechanisms targeting real value growth and contribution-based wealth distribution.
The Covid-19 pandemic has caused numerous infections and deaths worldwide since 2019 due to its high transmission and respiratory contagion capacity, reaching over 535.1 million confirmed cases. Nowadays, there are di...
详细信息
ISBN:
(数字)9798350373219
ISBN:
(纸本)9798350373226
The Covid-19 pandemic has caused numerous infections and deaths worldwide since 2019 due to its high transmission and respiratory contagion capacity, reaching over 535.1 million confirmed cases. Nowadays, there are different types of tests to diagnose Covid-19, such as PCR or antigen tests. However, radiographs are characterized by being fast, efficient, and low-cost, being a key factor in the diagnosis of Covid-19. Deep learning can be added to this through convolutional neural networks that use convolution operations to classify data. This could mean a great advantage when diagnosing people who have the disease compared to healthy people, in order to support medical specialists and not overload the healthcare system. This article analyzes the efficacy of image classification through deep learning of three convolutional neural network architectures: standard, VGGI6, and NASNet. The database was collected from different repositories such as GitHub, Radiopaedia, the Italian Society of Radiology (SIRM), and others, gathering a total of 10,000 X-ray images between healthy patients and patients with Covid-19. The Matlab software was used for image preprocessing and the Google Colaboratory web application for deep learning training. The proposed convolutional neural networks achieved an accuracy of 97%, 94.5%, and 93.3%, respectively, which shows high effectiveness in classifying X-ray images with Covid-19 from healthy patients.
The growing adoption of 5G private networks has significantly enhanced industries such as smart factories, autonomous vehicles, and smart homes, thanks to their high-speed data transmission, low latency, and support f...
详细信息
ISBN:
(数字)9798350364637
ISBN:
(纸本)9798350364644
The growing adoption of 5G private networks has significantly enhanced industries such as smart factories, autonomous vehicles, and smart homes, thanks to their high-speed data transmission, low latency, and support for large-scale device connectivity. These networks have driven advancements in real-time monitoring and process automation, boosting productivity and efficiency while reducing costs. However, the deployment of 5G private networks has also introduced various security challenges, particularly with the emergence of AI-driven technologies. This paper discusses these challenges, focusing on the design and implementation of a 5G security testbed to validate AI solutions within such environments. Key security threats associated with 5G private networks include the exploitation of AI and generative AI for sophisticated phishing and spoofing attacks, the hacking of autonomous vehicles and smart homes that can compromise both safety and privacy, and security breaches in AI-based smart factory systems, which could lead to operational disruptions and economic losses. These risks emphasize the need for proactive countermeasures to ensure the integrity and security of 5G private networks. This paper verifies the security of AI-based applications implemented through a testbed using Nokia's 5G network system and provides the necessary configurations for the stable deployment of AI-based service solutions.
DecisionSupport systems (DSSs) are interactive information systems that are based on computers; as such, they share many of the characteristics that make information systems successful. As the name suggests, an intera...
详细信息
DecisionSupport systems (DSSs) are interactive information systems that are based on computers; as such, they share many of the characteristics that make information systems successful. As the name suggests, an interactive system allows for two-way communication between the user and the software. There is a structure in place at many companies for dealing with customer concerns. This is an effort to improve the company's overall quality, customer happiness, and decision-making processes. Current processes for managing complaints are inadequate, and the organisation is unresponsive to them. Within the company, there is a lack of proper framework to deal with such situations. With the use of an Intelligent Decision Support System for Managing Complaints (IDSSMC), researchers were able to test how well Ethiopian Polytechnic TVET Colleges deal with complaints submitted through a web-based interface coupled to a mobile application with SMS notification. Users may sign up and file complaints using the system's website or mobile app. A descriptive developmental approach was used for this investigation. While the development approach was utilised to create the system, the descriptive approach was used for describing test findings. Users of the TVET system will be able to register, submit, and check the progress of their complaints through the system's website and mobile phone application. This makes it possible to gather complaints from a wide range of individuals at any time and from any location. In the conclusion, it is strongly suggested to implement a Model driven DSS approach that might offer additional intelligence to this company or another, with the expectation that this project could serve as a starting point.
Loss minimization of a Quadratic Boost Converter (QBC) for Multilevel inverter (MLI) fed Induction Motor (IM) is intended so that the efficiency can be optimized. QBC with MLI is placed between the DC-source & the...
详细信息
Loss minimization of a Quadratic Boost Converter (QBC) for Multilevel inverter (MLI) fed Induction Motor (IM) is intended so that the efficiency can be optimized. QBC with MLI is placed between the DC-source & the induction motor. This work proposes QBC-between the DC source and inverter. The DC output is boosted by QBC and fed to the inverter. The inverter output activates the induction motor. This work deals with loss minimization of closed loop Quadratic boost converter multilevel inverter (QBCMLI) system using Proportional Integral (PI), Fractional Order PID (FOPID) and Proportional Resonant (PR) controllers. The objective of the proposed system is to maximize the efficiency of the induction motor drive modules incorporating PI, FOPID and PR controllers. The investigations are done in closed loop systems. Voltage mode PRC algorithm is proposed to optimize the performance of QBCMLIIM system. The outcome illustrates minimization of losses by utilizing PR controlled QBCMLIIM system.
Communication technologies are developing at a rapid rate in the present world. Wireless networking technology or Wi-Fi technology allows modern devices to interface with the internet. Almost all the modern electrical...
详细信息
This paper presents the design and implementation of a 5G security testbed based on Zero Trust Architecture (ZTA). As 5G networks offer ultra-high speeds, low latency, and massive connectivity, ensuring their security...
详细信息
ISBN:
(数字)9798350364637
ISBN:
(纸本)9798350364644
This paper presents the design and implementation of a 5G security testbed based on Zero Trust Architecture (ZTA). As 5G networks offer ultra-high speeds, low latency, and massive connectivity, ensuring their security has become a critical challenge, especially with the distributed nature and numerous connected devices. Traditional perimeter-based security models are no longer sufficient. Therefore, Zero Trust Architecture, which continuously verifies and monitors all resources and users regardless of their location, has been proposed as a solution. In this study, we propose a comprehensive security management system by integrating ZTA into a 5G testbed, focusing on real-time monitoring and dynamic policy enforcement using data collected from the Access and Mobility Management Function (AMF) and User Plane Function (UPF). The testbed's effectiveness is demonstrated through the deployment of Nokia's network equipment, allowing the collection and analysis of high-resolution traffic data, which aids in early threat detection and response. The proposed system enhances 5G network security and offers significant potential for application across various industries.
Formal languages are in the core of models of computation and their behavior. A rich family of models for many classes of languages have been widely studied. Hyperproperties lift conventional trace-based languages fro...
详细信息
This study proposed an interlinked coupled split square ring resonator (SSRR) based metamaterial (MTM) unit cell. The double-negative (DNG) metamaterial characteristics are exhibited in C, X, and Ku microwave frequenc...
详细信息
Air-gapped systems are isolated from the Internet due to the sensitive information they *** paper presents a new covert channel attack that enables the leaking of sensitive information from highly isolated, air-gapped...
详细信息
Air-gapped systems are isolated from the Internet due to the sensitive information they *** paper presents a new covert channel attack that enables the leaking of sensitive information from highly isolated, air-gapped systems to nearby mobile phones. Malware running on an air-gapped computer can generate radio waves by executing crafted code on the target system. The malicious code exploits the dynamic power consumption of modern computers and manipulates the momentary loads on CPU cores. With this technique, malware can control the computer's internal utilization and generate low-frequency electromagnetic radiation in the 0-60 kHz band. Sensitive information (e.g., files, encryption keys, biometric data, and keylogging) can be modulated over the emanated signals and received by a nearby mobile phone at a max speed of 1000 bit/sec. We show that a standard smartphone with a simple antenna carried by a malicious insider or visitor can be used as a covert receiver. Finally, we present a set of countermeasures to this air-gap attack.
暂无评论