Many challenges are faced by agricultural sector due to various dependent factors like changes in climatic conditions, variation in soil properties and farming practices. What to plant in their agricultural land is th...
详细信息
Object tracking is one of the latest research topic in various applications of computer vison. Satellite videos are provided by the commercial satellite makes it possible to extend into earth observation. Moving objec...
详细信息
In developing countries, rural areas often lack integrated medical systems, leading to pregnant women not receiving regular checkups, resulting in higher death rates for newborns and parents. This presents significant...
详细信息
In recent years, the advances in digitalisation have also adversely contributed to the significant rise in cybercrimes. Hence, building the threat intelligence to shield against rising cybercrimes has become a fundame...
详细信息
Object detection is one of the appealing branch of the study in the fields of computer science. Object detection defines some popular object detection models in deep learning such as YOLO (You Only Look Once), Single ...
详细信息
Application containers are widely used in contemporary cloud computing environments. Migration of containers across hosts provides cost-effective cloud management by enabling improved server consolidation, load balanc...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use...
详细信息
Building Automation Systems(BASs)are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control,HVAC systems,entry systems,and lighting *** BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS *** this paper,we provide a comprehensive,up-to-date survey on BASs and attacks against seven BAS protocols including BACnet,EnOcean,KNX,LonWorks,Modbus,ZigBee,and *** studies of secure BAS protocols are also presented,covering BACnet Secure Connect,KNX Data Secure,KNX/IP Secure,ModBus/TCP Security,EnOcean High Security and Z-Wave *** and ZigBee do not have security *** point out how these security protocols improve the security of the BAS and what issues remain.A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of *** seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
Natural disasters still have a crippling effect on our infrastructure notwithstanding society's development. Communication systems, the backbone of our network, sustain the most damage during such crises. When it ...
详细信息
Pedestrian trajectory prediction is crucial for several applications such as robotics and self-driving vehicles. Significant progress has been made in the past decade thanks to the availability of pedestrian trajector...
Integrating computer science with biology is crucial for advancing bone cancer diagnostics, particularly in distinguishing between benign and malignant tumors in X-ray and MRI images. The rapid evolution of medical im...
详细信息
暂无评论