Today, the Internet of Things has been widely used and is becoming an increasingly vital part in various areas of human activity, which helps to effectively solve various real-life tasks and problems. The infrastructu...
详细信息
ISBN:
(纸本)9798350333053
Today, the Internet of Things has been widely used and is becoming an increasingly vital part in various areas of human activity, which helps to effectively solve various real-life tasks and problems. The infrastructure of the Internet of Things includes a lot of heterogeneous devices with limited capacities, which makes it difficult to control them in order to detect cyberattacks. The increase in the number of attacks on the infrastructure of the Internet of Things indicates the relevance of developing new solutions for detecting attacks on the networks of the Internet of Things. One of the possible approaches to identify attacks is to analyze the physical parameters associated with IoT devices that describe the behavior of devices on the network, such as power consumption. Power analysis allows you to detect power-hungry attacks such as crypto mining and denial-of-service attacks. The paper proposes a new method for cyberattack detection in the infrastructure of the Internet of Things that is based on the analysis of energy consumption. In order to improve the accuracy of detecting cyberattacks, the approach also uses the analysis of the actions of the IoT software. The proposed approach makes it possible to detect attacks such as DoS/DDoS with high efficiency with a level of detection up to 99.95%.
In this study, we present an improved approach to optimizing the parameters of sensor sensing elements using quartz resonators with an interelectrode gap. We combine graphical and analytical methods to solve the multi...
详细信息
ISBN:
(数字)9798350378627
ISBN:
(纸本)9798350378634
In this study, we present an improved approach to optimizing the parameters of sensor sensing elements using quartz resonators with an interelectrode gap. We combine graphical and analytical methods to solve the multi-criteria optimization problem. The work focuses on the modes of operation of a quartz resonator equipped with an interelectrode gap in sensors with a frequency output, determining a set of optimal parameters and representing them as surfaces in a particular optimization parameter space. The presented results reveal specific areas on the surface of the objective function where optimization of design and technological parameters is possible, taking into account technological influences and features of the sensor design, including the initial value of the interelectrode gap. By using an improved mathematical model for the oscillations of a quartz resonator with an electrode gap, this study achieves results with an accuracy of ($8 . . .11$)% higher than previous studies, demonstrating the effectiveness of the proposed method in improving the design and functionality of piezoelectric sensors for advanced applications.
This article discusses the use of fuzzy logic and a neural network to predict the demand for pharmaceutical products in a distributed network, in conditions of insufficient information, a large assortment and the infl...
详细信息
Visually impaired people encounter several challenges in their mobility and navigation. Their daily activities are obstructed due to their inability to adapt or recognize accurately their surroundings, especially outs...
详细信息
This paper introduces a novel and comprehensive approach for estimating the reliability of safety critical software components in autonomous vehicle motion systems. The proposed approach in this paper presents a combi...
This paper introduces a novel and comprehensive approach for estimating the reliability of safety critical software components in autonomous vehicle motion systems. The proposed approach in this paper presents a combination software reliability model (CSRM) that integrates multiple non-homogeneous Poisson process (NHPP) software reliability growth models (SRGMs) to achieve a reasonable compromise between accuracy, the trade-off between the goodness of fit and the simplicity, and stability. By using machine learning techniques, the CSRM effectively combines the strengths of individual SRGMs while mitigating their weaknesses through suitable evaluation and calibration techniques. The developed CSRM has been successfully applied and validated to facilitate a smoother and more efficient evaluation of reliability targets for software components in autonomous robotic wheelchair (ARW). Based on the validation results, the new CSRM has significantly enhanced the efficiency of the process for evaluating whether the defined reliability goals were being achieved. Furthermore, has facilitated a more accurate assessment of the need for further test executions and better planning of the required verification and validation session. This new approach provides valuable insights into the reliability of the developed software, particularly for software developers lacking extensive experience in identifying and applying appropriate SGRM.
Cancer victims, particularly those with lung cancer, are more susceptible and at higher danger of COVID-19 and associated consequences as a result of their compromised immune systems, which makes them particularly sen...
详细信息
Cancer victims, particularly those with lung cancer, are more susceptible and at higher danger of COVID-19 and associated consequences as a result of their compromised immune systems, which makes them particularly sensitive. Because of a variety of circumstances, cancer patients' diagnosis, treatment, and aftercare are very complicated and time-consuming during an epidemic. In such circumstances, advances in artificial intelligence (AI) and machine learning algorithms (ML) offer the capacity to boost cancer sufferer diagnosis, therapy, and care via the use of cutting technologies. For example, using clinical and imaging data combined with machine learning methods, the researchers may be able to distinguish among lung alterations induced by corona virus and those produced by immunotherapy and radiation. During this epidemic, artificial intelligence (AI) may be utilized to guarantee that the appropriate individuals are recruited in cancer clinical trials more quickly and effectively than in the past, which was done in a conventional and complicated manner. In order to better care for cancer patients and find novel and more effective therapies, It is critical that we move beyond traditional research methods and use artificial intelligence (AI) and machine learning to update our research (ML). Artificial intelligence (AI) and machine learning (ML) are being utilised to help with several aspects of the COVID-19 epidemic, such as epidemiology, molecular research and medication development, medical diagnosis and treatment, and socioeconomics. The use of artificial intelligence (AI) and machine learning (ML) in the diagnosis and treatment of COVID-19 patients is also being investigated. The combination of artificial intelligence and machine learning in COVID-19 may help to identify positive patients more quickly. In order to understand the dynamics of an epidemic that is relevant to artificial intelligence, when used in different patient groups, AI-based algorithms can quic
Industrial Internet of NanoThings (IIoNT) traffic model proposed. The model is based on the developed algorithm for Dynamic Data Composition Control. The application of the algorithm made it possible to reduce the tot...
详细信息
Remote monitoring of objects or technological processes is used in many industries and service-oriented companies to obtain up-to-date information about the state of things or technical processes. The article is devot...
详细信息
Feature models are the de facto standard for modelling variabilities and commonalities. Concrete models in different domains exist;however, many are in private or sparse repositories or belong to discontinued projects...
详细信息
Fog computing extends the capabilities of cloud computing by enabling computing at the edge of the network, involving devices such as mobile collaborative devices or fixed nodes with integrated storage, computing, and...
Fog computing extends the capabilities of cloud computing by enabling computing at the edge of the network, involving devices such as mobile collaborative devices or fixed nodes with integrated storage, computing, and communication capabilities. Fog computing offers benefits such as improved efficiency, increased security, savings in network bandwidth, and increased flexibility. In order to provide a complete understanding of Fog computing, this paper presents its salient features and highlights the differences from cloud computing research. Cloud computing is an emerging technology that offers computing resources on a pay-per-use basis. It provides three service models, and the cloud offers cost-effective centrally managed resources for reliable computing for specific tasks. This document presents a comparison between Fog computing and cloud computing, highlighting the differences in design, deployment, services, and tools available to organizations and users. By explicating the distinctiveness of fog computing and its contrast to cloud computing, we contribute to the field by shedding light on the unparalleled potential of fog computing in conserving resources while delivering robust computational solutions at the network periphery. Our study offers a new perspective that challenges the prevailing practices and extends the discourse on optimizing distributed computing architectures.
暂无评论