This technical abstract makes a specialty of an Iota-based strategy to enhance the performance of livestock monitoring and management. The proposed answer involves the usage of wireless sensors and mobile gadgets to g...
详细信息
Dataflow architecture accelerators are a new kind of scalable DNN accelerators. For an instruction, the availability of input operands solely determines the beginning of executions. DNN model orchestration determines ...
详细信息
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
Cryptography is a fundamental field in computerscience that focuses on securing communication and protecting sensitive information from unauthorized access. It involves the use of mathematical algorithms and techniqu...
详细信息
Software-defined networking (SDN) is a transformative technology that systematically centralises and manages network resources. This paradigm shift allows for greater flexibility, agility, and efficiency in network ma...
详细信息
The National Capital Territory (NCT) of India, Delhi, is home to New Delhi, the country's capital. Being a significant political and economic hub, Delhi experiences unique considerations in terms of power consumpt...
详细信息
This research study investigates the potential of blockchain technology, specifically the Hyperledger platform, in addressing challenges in food supply chain management, The aim of this study is to propose a comprehen...
详细信息
In the contemporary digital era, data has evolved into the cornerstone of myriad sectors, encompassing academia, commerce, and medical research. Yet, the acquisition of insights from this expansive reservoir of inform...
详细信息
This paper presents models to differentiate between human-written and AI-generated essays, addressing challenges posed by advanced AI models like ChatGPT and Claude. Using a structured dataset, we fine-tune multiple m...
详细信息
Recently, the attention mechanism has been introduced into object tracking, making significant improvements in tracking performance. However, the tracking target often undergoes deformation during tracking, which can ...
详细信息
暂无评论