The paper proposes a model for the examination of tweets (brief texts and messages) in Russian. The model is based on the authors' explorations on the identification of tweets meanings. The main idea is to apply t...
详细信息
In this paper, we propose a novel hardening technique against Single Event Effects, which enables high-frequency operation and does not cause large power consumption and area overhead. The protection is based on redun...
详细信息
Day-ahead trading of electricity has been applied to ensure the balance between the amount of electricity sold and bought. Even so, due to the intermittent distributed energy resources (DERs), the actual condition can...
详细信息
Critical theory is an approach to research focused on acknowledging and dismantling power structures. In this piece, we illustrate the ways in which security and privacy research already takes a critical approach and ...
详细信息
The automation of processes in greenhouses provides a significant advantage to the agricultural sector. Due to the rapid growth of the population, increasing demand for food and labor shortage make the autonomous moni...
详细信息
The environment surrounds our daily lives, whether we want to or not. When we have a clean environment, we can enjoy very healthy lifestyles. However, when we have dirty environments, it can cause a myriad of diseases...
详细信息
Climate is rapidly changing around the world. Over time, there have been significant changes in the weather. Rainfall is now erratic due to climate change. The frequency of extreme weather events like droughts and flo...
详细信息
Modeling and predicting the performance of students in collaborative learning paradigms is an important task. Most of the research presented in literature regarding collaborative learning focuses on the discussion for...
详细信息
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems requir...
详细信息
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems require the drivers to search for an empty parking space with no guaran-tee of finding any wasting time,resources,and causing unnecessary *** address these issues,this paper proposes a digitized parking system with a proof-of-concept implementation that combines multiple technological concepts into one solution with the advantages of using IoT for real-time tracking of park-ing *** authentication and automated payments are handled using a quick response(QR)code on entry and *** experiments were done on real data collected for six different locations in Cairo via a live popular times *** machine learning models were investigated in order to estimate the occu-pancy rate of certain ***,a clear analysis of the differences in per-formance is illustrated with the final model deployed being *** has achieved the most efficient results with a R^(2) score of 85.7%.
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
暂无评论