1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ...
详细信息
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods also exist,such as peer-to-peer networks and distributed hash *** technology,which is decentralized,anonymous,non-tamperable and anti-attack,can be applied to covert communication to solve the problems of traditional methods and improve the quality of communication.
Educational, online learning has become a common practice due to rapid digitalization and recent global events. This study focuses on developing a comprehensive online learning platform that addresses users' needs...
详细信息
ISBN:
(数字)9798331542634
ISBN:
(纸本)9798331542641
Educational, online learning has become a common practice due to rapid digitalization and recent global events. This study focuses on developing a comprehensive online learning platform that addresses users' needs by integrating advanced AI capabilities for personalized support and adaptive learning. The platform supports user registration and authentication, course and lesson management, and offers interactive features like AI-driven chat support. In this study, we show the importance of creating user-friendly online learning platforms with the implementation of modern AI trends. The development and testing of this platform is ongoing to determine the adaptation of the system to different learning styles.
Today, the Internet of Things has been widely used and is becoming an increasingly vital part in various areas of human activity, which helps to effectively solve various real-life tasks and problems. The infrastructu...
详细信息
ISBN:
(纸本)9798350333053
Today, the Internet of Things has been widely used and is becoming an increasingly vital part in various areas of human activity, which helps to effectively solve various real-life tasks and problems. The infrastructure of the Internet of Things includes a lot of heterogeneous devices with limited capacities, which makes it difficult to control them in order to detect cyberattacks. The increase in the number of attacks on the infrastructure of the Internet of Things indicates the relevance of developing new solutions for detecting attacks on the networks of the Internet of Things. One of the possible approaches to identify attacks is to analyze the physical parameters associated with IoT devices that describe the behavior of devices on the network, such as power consumption. Power analysis allows you to detect power-hungry attacks such as crypto mining and denial-of-service attacks. The paper proposes a new method for cyberattack detection in the infrastructure of the Internet of Things that is based on the analysis of energy consumption. In order to improve the accuracy of detecting cyberattacks, the approach also uses the analysis of the actions of the IoT software. The proposed approach makes it possible to detect attacks such as DoS/DDoS with high efficiency with a level of detection up to 99.95%.
the paper proposes the use of 3D convolutional neural network for recognizing user emotions on videos in a recommender system. The data approach aims to use the recognized emotion as important implicit feedback and im...
the paper proposes the use of 3D convolutional neural network for recognizing user emotions on videos in a recommender system. The data approach aims to use the recognized emotion as important implicit feedback and improve the recommendation result. This is expected to significantly improve the performance of the recommender system.
Heterogeneous network (HetNet) is an attractive solution for future cellular networks with high data rate and coverage requirements. In HetNets, small cells such as micro cells, pico cells, femto cells and relay node ...
详细信息
With this work, a research contribution in the field of reliability theory has been made, with which a realistic prognosis of reliability parameters of technical systems can be carried out. The motivation to deal with...
详细信息
ISBN:
(纸本)9789811820168
With this work, a research contribution in the field of reliability theory has been made, with which a realistic prognosis of reliability parameters of technical systems can be carried out. The motivation to deal with this topic resulted from the realization that the prognosis quality of established prognosis models must be optimized. An early and realistic prognosis of reliability parameters contributes to the success of a concern, mainly through the early implementation of quality measures. The work focuses on the development of a new multivariate prognosis model, which uses multivariate stress parameters as reference variables. Its application enables the prediction of reliability parameters for electronic control units. The predicted reliability parameters can be specified as stress-dependent (bivariate/multivariate) or time-dependent variables. While univariate reference quantities usually use the time dwell time of a technical system, the prognosis model newly presented here can process multivariate reference quantities. During the time in the field, technical systems are not only exposed to different usage behavior, but also to other stresses and influences that make a not inconsiderable contribution to failure. The use of time in the field as a univariate reference variable does not allow for this differentiated consideration and does not take into account relevant information in the reliability analysis. All existing prediction models have in common that only univariate reference parameters can be processed. For a fully comprehensive reliability analysis, all stress variables that lead to a failure must be considered. This is not sufficiently possible with a simple univariate approach. With the new approaches, it is now possible for the first time to consider different stress variables, their changes and their effects on the technical system under investigation in a field data analysis. The presented approach for the multivariate prognosis model considers i
Road accidents have been known to be one of the leading death causes around the world for a long time. Thus, cars and all kinds of road vehicles form a huge source of danger, and they relate to multiple high risks. Th...
Road accidents have been known to be one of the leading death causes around the world for a long time. Thus, cars and all kinds of road vehicles form a huge source of danger, and they relate to multiple high risks. There are many factors that can contribute to road traffic accidents such as the health condition of the driver if a medical emergency event happened while driving, drowsiness, or mind-wandering. The proposed system can monitor the behavior of the driver while driving as well as his/her health status. Moreover, it analyzes the monitored data, alerts the driver in a timely manner, and assists him/her in adjusting the driving behavior. Different dangerous and risky situations which can be faced during driving can be captured and avoided by using such a system which leads at the end to increase road traffic safety and reduce vehicle collisions. Notifications are developed in cases of drowsiness, loss of focus, or other concerns that may emerge while driving. However, when the driver's ability to operate the vehicle safely is hampered by a health concern, the implemented system is only able at this stage to alarm the driver itself and the surrounding cars as a first level of alarms.
The report presents the results of a comparative analysis of methods for parameterization of cognitive models based on the use of fuzzy set theory and antonym logic. Reasoned expediency of using methods of the logic o...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
The report presents the results of a comparative analysis of methods for parameterization of cognitive models based on the use of fuzzy set theory and antonym logic. Reasoned expediency of using methods of the logic of antonyms in the construction and research of cognitive models of weakly structured situations. An approach to calculating the magnitudes of the indirect and total influence of factors on each other in certain types of cognitive models built based on the logic of antonyms is proposed.
The paper evaluates the influence of wire thickness and insulation material on its heating temperature during operation. The temperature and time characteristics of wire exploitation under conditions of different load...
详细信息
Heterogeneous IoT architectures are evolving rapidly and different challenged are faced with the traditional IoT architectures including the performance time of real-time IoT application. Parallel computing programmin...
详细信息
ISBN:
(数字)9798350349740
ISBN:
(纸本)9798350349757
Heterogeneous IoT architectures are evolving rapidly and different challenged are faced with the traditional IoT architectures including the performance time of real-time IoT application. Parallel computing programming technique could enhance the performance and efficiency for distributed systems and multicore processors as well as the IoT systems. However, parallel computing, presents certain difficulties and constraints, including synchronization, communication, security concerns, and load balancing. In this regard, a novel IoT workload balancing model for heterogeneous IoT architectures is presented in this paper. This model is intended to reduce the execution time of large systems by redistributing part of their functions to other involved IoT nodes. An experiment has been conducted to evaluate the actual real load for each IoT node and tried to rebalance the load using the proposed model. The results were encouraging as the performance time was reduced by about one third on two cores.
暂无评论