Security associated threats are often increased for online social media during a pandemic, such as COVID-19, along with changes in a work environment. For example, employees in many companies and organizations have st...
详细信息
Central-managed security mechanisms are often utilized in many organizations, but such server is also a security breaking point. This is because the server has the authority for all nodes that share the security prote...
详细信息
Air pollution is one of the major concerns considering detriments to human *** type of pollution leads to several health problems for humans,such as asthma,heart issues,skin diseases,bronchitis,lung cancer,and throat ...
详细信息
Air pollution is one of the major concerns considering detriments to human *** type of pollution leads to several health problems for humans,such as asthma,heart issues,skin diseases,bronchitis,lung cancer,and throat and eye *** pollution also poses serious issues to the *** from the vehicle industry is the cause of greenhouse effect and CO2 ***,real-time monitoring of air pollution in these areas will help local authorities to analyze the current situation of the city and take necessary *** monitoring process has become efficient and dynamic with the advancement of the Internet of things and wireless sensor *** is the main issue in WSNs;if the sensor node location is unknown,then coverage and power and routing are not *** study concentrates on localization-based air pollution prediction systems for real-time monitoring of smart *** systems comprise two phases considering the prediction as heavy or light traffic area using the Gaussian support vector machine algorithm based on the air pollutants,such as PM2.5 particulate matter,PM10,nitrogen dioxide(NO2),carbon monoxide(CO),ozone(O3),and sulfur dioxide(SO2).The sensor nodes are localized on the basis of the predicted area using the meta-heuristic algorithms called fast correlation-based elephant herding *** dataset is divided into training and testing parts based on 10 *** evaluation on predicting the air pollutant for localization is performed with the training *** error prediction in localizing nodes is 9.83 which is lesser than existing solutions and accuracy is 95%.
Hardware description languages are essential for specifying, designing, and verifying digital systems. VHDL and Verilog have been the predominant hardware description languages, but they present educational challenges...
Hardware description languages are essential for specifying, designing, and verifying digital systems. VHDL and Verilog have been the predominant hardware description languages, but they present educational challenges due to their steep learning curve and low-level nature. Conversely, Chisel, a language embedded in Scala, offers a high-level, software-like approach to hardware design. This paper presents our experience at the Technical University of Denmark (DTU) transitioning from VHDL to Chisel for selected courses and projects. We discuss the challenges faced in using VHDL and Verilog as entry-level languages, and we highlight the benefits and lessons learned from the transition to Chisel, including improved accessibility and efficiency in learning hardware design. This paper contributes to the ongoing discussion on languages for hardware description in education and provides insights into the advantages of adopting Chisel as an alternative language. The transition resulted in overwhelmingly positive outcomes, with improved student understanding, productivity, satisfaction, and performance.
Accurate cardiovascular (CV) risk assessment is relevant for asymptomatic individuals, in particular for those at risk for cardiovascular diseases (CVD). Metabolic-associated fatty liver disease (MASLD), previously kn...
详细信息
We present a whole-body model of human metabolism that utilizes a system of organs and blood vessels to simulate the enzymatic reactions. The model focuses on key organs, including the brain, heart and lungs, liver, g...
详细信息
With the rapid development of information technology, the ethical use of data and users' privacy has become a big concern. In European Union, the General Data Protection Regulation (GDPR) has been enforced since 2...
With the rapid development of information technology, the ethical use of data and users' privacy has become a big concern. In European Union, the General Data Protection Regulation (GDPR) has been enforced since 2018, aiming to protect a person's privacy. However, the growth of the data economy might be hindered due to the lack of a trusted, secure and privacy-aware tool. Motivated by this observation, this work presents Data Vaults - a secure, distributed and privacy-preserving personal data management platform. The main goal is to mitigate various privacy concerns through allowing an individual to maintain the ownership, handle and share the data based on their willingness. The platform enables a flexible data sharing method with fair compensation schemes. In particular, with the Data Vaults platform, an individual can protect the sharing of personal data and fairly define how value can be captured, created, released and cashed out for the benefit of all the stakeholders involved (companies or not).
Manufacturers and users have embraced the shift from wired to wireless technologies—a shift that promises convenience, reduced cabling, and modernization. Manufacturers cut costs by cutting down on wiring; meanwhile,...
Manufacturers and users have embraced the shift from wired to wireless technologies—a shift that promises convenience, reduced cabling, and modernization. Manufacturers cut costs by cutting down on wiring; meanwhile, users experience increased accessibility and mobility on their wireless devices. Naturally, wireless media does not come with wires, but it does come with strings attached. In a wireless world, when device A talks to device B, communication is no longer physically constrained to the two of them. Instead, the communication channel is shared by many devices, opening up avenues for eavesdropping and *** charging, which has become de facto functionality on many types of smart devices, is not immune to this phenomenon. Qi, the leading standard in this domain, provides a communication protocol that is unencrypted and insecure. In fact, the Qi standard enables several new means of wireless charging attack. In this paper, we propose three novel attacks on wireless charging stations, named LeakyCharge, SneakyCharge and CheatyCharge. Two are supply chain attacks, while the third would allow an adversary to perform random attacks.
We describe a "top down" approach for automated theorem proving (ATP). Researchers might usefully investigate the forms of the theorems mathematicians use in practice, carefully examine how they differ and a...
详细信息
In geospatial planning, it is often essential to represent objects in a vectorized format, as this format easily translates to downstream tasks such as web development, graphics, or design. While these problems are fr...
详细信息
暂无评论