Extended reality (XR) applications pose strict technical demands on future communication systems in terms of rapid connectivity and resource-intensive task computations. To this end, this paper addresses the benefits ...
详细信息
Interoperable, internet-connected distributed energy resource (DER) devices in power systems create a new attack vector for malicious cyber-actors. Modern control systems primarily focus on transmission and sub-transm...
详细信息
The fast-growing number of electric vehicles has resulted in a variety of charging-related issues, such as the shortage of public charging piles, the inconvenience of finding available charging piles, the additional t...
详细信息
The evolution of intelligent transport systems (ITS) has significantly enhanced driving experiences in vehicular ad-hoc networks (VANET), crucial for improving road safety and traffic efficiency. Despite these advance...
详细信息
ISBN:
(纸本)9798350373981;9798350373974
The evolution of intelligent transport systems (ITS) has significantly enhanced driving experiences in vehicular ad-hoc networks (VANET), crucial for improving road safety and traffic efficiency. Despite these advancements, challenges persist. Trust management solutions often assume user legitimacy without verification. Moreover, the need for reauthentication as vehicles move between RSUs adds computational complexity. VANET is relatively vulnerable to security threats from multiple parties given its highly dynamic topology and its wireless and heterogeneous communication mode. We have expanded upon Maria et al.'s schema by specifically targeting and resolving significant shortcomings in their research. More precisely, we improve the features related to confirming the identity of users, preventing vehicles from being used without authorization, and continuously monitoring their current location in order to strengthen the security of vehicles and increase user involvement. We suggest implementing a schema that utilizes QR code verification to authenticate vehicle users, specifically targeting these difficulties. In VANETs, blockchain has been adopted with the authentication process for fog computing. The result is that there is no need for trusted authority (TA) while achieving privacy within the blockchain network and ensuring of the vehicle user authentication and the integrity of messages. Several key benefits have been achieved, such as blocking malicious entities and the potential damage they cause, enabling the revocation of malicious vehicles by conditional anonymization, as well as simplifying conflict resolution. Likewise, the proposed work was characterized by achieving an effective balance between effectiveness and complexity, protecting privacy, conditional tracking, ensuring integrity, and anonymous authentication.
Crop disease detection is an important maintenance aspect for the upkeep of agricultural productivity. This paper presents a novel autonomous robot system designed to navigate and monitor crop health. The system was d...
详细信息
Attention Deficit Hyperactivity Disorder (ADHD) profoundly impacts children, often extending into adulthood. Timely identification and intervention are critical. This paper explores ADHD assessment by integrating chil...
详细信息
Privacy preserving data clustering is a useful method for extracting intrinsic cluster structures from distributed databases keeping personal privacy. In a previous research, a model of performing Fuzzy c-Lines cluste...
详细信息
ISBN:
(纸本)9781665499248
Privacy preserving data clustering is a useful method for extracting intrinsic cluster structures from distributed databases keeping personal privacy. In a previous research, a model of performing Fuzzy c-Lines clustering was proposed, where a privacy preserving scheme of k-means-type model was adopted with cryptographic calculation. This paper further improves the model for handling incomplete data ignoring the influences of missing values. The element-wise clustering criterion enables to derive local principal component vectors in each data sources by considering minimization of low-rank approximation of observed elements only. Then, fuzzy memberships of each object are calculated in a collaborative manner among organizations, where partial distances between objects and prototypes are derived with cryptographic framework so that intra-organization information is kept secret. The characteristic features of the proposed method are demonstrated through numerical experiments.
The proceedings contain 174 papers. The topics discussed include: analyzing the effects of driving experience on backing maneuvers based on data collected by eye-tracking devices;recommendation algorithm based on soci...
ISBN:
(纸本)9798350304602
The proceedings contain 174 papers. The topics discussed include: analyzing the effects of driving experience on backing maneuvers based on data collected by eye-tracking devices;recommendation algorithm based on social information and global average matrix decomposition;data analytics for dependable transportation systems in a smart city;stabilizing technology for online user dynamics by controlling one-way weights of links;a novel feature extraction technique for ECG arrhythmia classification using ml;fault-tolerant data aggregation with error-checking for smart grids;characterization of execution time variability in FPGA-based ai-accelerators;an improved deep learning-based approach to urban weather radar echo extrapolation;balanced hashgraph based on dynamic MCMC: efficient, practical and compatible;a blockchain of blockchains structure based on asset trading scheme;and research on malicious traffic detection based on word embedding algorithms and neural networks.
The recent advancement of pretrained models shows great potential as well as challenges for privacy-preserving distributed machine learning technique called Federated Learning (FL). With the growing demands of foundat...
详细信息
Beam management (BM) protocols are critical for establishing and maintaining connectivity between network radio nodes and User Equipments (UEs). In distributed Multiple Input Multiple Output systems (D-MIMO), a number...
详细信息
暂无评论