In this paper, we investigate the potential of reconfigurable intelligent surfaces (RISs) in facilitating passive/device-free three-dimensional (3D) drone localization within existing cellular infrastructure operating...
详细信息
In guaranteeing the absence of adversarial examples in an instance's neighbourhood, certification mechanisms play an important role in demonstrating neural net robustness. In this paper, we ask if these certificat...
In guaranteeing the absence of adversarial examples in an instance's neighbourhood, certification mechanisms play an important role in demonstrating neural net robustness. In this paper, we ask if these certifications can compromise the very models they help to protect? Our new Certification Aware Attack exploits certifications to produce computationally efficient norm-minimising adversarial examples 74% more often than comparable attacks, while reducing the median perturbation norm by more than 10%. While these attacks can be used to assess the tightness of certification bounds, they also highlight that releasing certifications can paradoxically reduce security.
Employers should recognize that employees are the most vulnerable aspect of business environments since these cyber hazards are growing because of user neglect, lack of fundamental security discipline, and a fast-chan...
详细信息
ISBN:
(数字)9798350367560
ISBN:
(纸本)9798350367577
Employers should recognize that employees are the most vulnerable aspect of business environments since these cyber hazards are growing because of user neglect, lack of fundamental security discipline, and a fast-changing threat context. The theoretical approach proposed in the study bridges the difference by carefully following and handling the staff's internet presence. Overall, the study describes a comprehensive solution to govern the security of employees' internet presence by utilizing Artificial Neural Networks (ANN) for advanced intrusion detection, Natural Language Processing (NLP) for implementation and enforcement of browser-based security policies, visual and text data recognition to identify phishing attempts, and lastly analyzing and profiling users based on their online presence via a mathematical model. As a result, this study provides a comprehensive solution for mitigating risks related to human factors in corporate environments.
Under the blessing of the new generation of informationtechnology represented by 5G, a large number of new models and new businesses represented by smart logistics, industrial Internet, and smart transportation have ...
详细信息
Modern medicine demands innovations in medical education, particularly in the learning of human anatomy, traditionally taught through textbooks, dissections, and lectures. Virtual Reality (VR) has emerged as a promisi...
详细信息
The Internet of Things-empowered precision irrigation management system with LoRaWAN technology is presented given the growing food requirements across the world and pressing calls for judicious use of water in agricu...
详细信息
ISBN:
(数字)9798331505264
ISBN:
(纸本)9798331505271
The Internet of Things-empowered precision irrigation management system with LoRaWAN technology is presented given the growing food requirements across the world and pressing calls for judicious use of water in agriculture. Flow Pilot, specifically designed for chili farms, optimizes water application while enhancing crop health using precise and automated irrigation. The Flow Pilot features advanced sensors such as soil moisture, temperature, humidity, and rain sensors that collect real-time environmental data transmitted over a LoRaWAN network for analysis. Flow Pilot uses the Machine learning algorithm by analyzing sensor data to make localized irrigation recommendations based on crop needs, environmental factors, and weather forecasting. LoRaWAN gateways will support this for long-ranged communications over power-consuming agricultural fields. Besides this, it can use different network architectures. There is also an automated water tank management module that regulates the supply of water and pH levels to have optimal conditions for crop growth. A visually simple dashboard interface enables farmers to inspect and operate irrigation processes remotely, hence rendering the whole process far more efficient. Finally, over the extensive period of field tests executed by the project, Flow Pilot was able to save water, improve crop yields, and help support sustainable agriculture. For example, this testing supports the potential of IoT with LoRaWAN technologies, such as the Flow Pilot implementation, for a game change in conventional irrigation practices into a modern, scalable, and reliable solution.
This research highlights a gap in applying gamification to agile software development enterprises. While gamification risks and negative side effects have been addressed in principle, limited research explored their i...
详细信息
ISBN:
(纸本)9798400717765
This research highlights a gap in applying gamification to agile software development enterprises. While gamification risks and negative side effects have been addressed in principle, limited research explored their impact on software development, specifically agile gamification. The paper aims to: 1) identify gamification risks and risk factors for software development enterprises 2) provide a gamification risk taxonomy 3) design context-inclusive risk profiles to identify the cause-effect of the potential risks for the agile roles, and 4) present the impact of gamification on agile software development roles and tasks. The research employs qualitative methods to uncover risk factors and identify gamification risks from software engineers and scrum teams, providing insights from experts to confirm and refine gamification risks within the agile software development context. We aim to help project managers and scrum masters with task assignments and improve the employee's well-being and team performance during the gamified agile software development process.
This research offers a comparative analysis of Qual-ity of Service (QoS) within software Defined Networks (SDN) by assessing the POX and OpenDaylight controllers across various network topologies. The results show tha...
详细信息
ISBN:
(数字)9798331517878
ISBN:
(纸本)9798331517885
This research offers a comparative analysis of Qual-ity of Service (QoS) within software Defined Networks (SDN) by assessing the POX and OpenDaylight controllers across various network topologies. The results show that OpenDaylight has a 32.59% higher average throughput than POX, demonstrating its superior data handling capabilities. Conversely, POX exhibits a 54.53% lower average delay and an 85.05% higher average jitter compared to OpenDaylight, highlighting its effectiveness in maintaining lower latency and variability in packet transmission times. These contrasting performances provide essential insights for network engineers in selecting the optimal SDN controller based on specific network demands, significantly influencing the overall network efficiency and stability.
The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and *** assimilation of blockchain systems lever...
详细信息
The design of distributed ledger,Asymmetric Key Algorithm(AKA)blockchain systems,is prominent in administering security and access control in various real-time services and *** assimilation of blockchain systems leverages the reliable access and secure service provisioning of the ***,the distributed ledger technology’s access control and chained decisions are defaced by pervasive and service *** results in degrading security through unattended access control for limited-service *** this article,a service-aware access control procedure(SACP)is introduced to address the afore-mentioned *** proposed SACP denes attended access control for all the service session by identifying the users and service provider *** distributed nature of the ledger systems and classication tree learning are combined to determine unattended *** sole access is determined by summarizing the closed and open access requests and the service provider’s availability and integrity *** this process,the learning process classies the secured access request and completed the integrity checks of the current and previous service *** classication-based access administration reduces the service disconnections and false access rate of the applications.
The Internet of Things (IoT) has led to a surge in smart devices, generating vast volumes of data. Cloud computing offers scalability but does not suffice for many real-time and privacy-sensitive IoT applications. Thi...
详细信息
ISBN:
(数字)9798350368536
ISBN:
(纸本)9798350368543
The Internet of Things (IoT) has led to a surge in smart devices, generating vast volumes of data. Cloud computing offers scalability but does not suffice for many real-time and privacy-sensitive IoT applications. This limitation has prompted a blend of both edge and cloud resources, creating the need for seamless integration, known as the “compute continuum“. Testing applications and resource management techniques within this continuum is vital but can be very complex. Simulation and emulation are preferred methods, with emulation providing more accurate representations of real-world environments. In this paper, we introduce iContinuum, a novel emulation toolkit facilitating an intent-based platform for edge-to-cloud testing and experimentation. Leveraging software-Defined Networking (SDN) and containerization, iContinuum enables experimentation and performance evaluation while aligning application requirements with actual performance. We present our detailed architecture, implementation, and evaluation of iContinuum, showcasing how our proposed toolkit bridges the gap between simulation and real-world deployment within compute continuum environments, and further demonstrate the effectiveness of Intent-Based Scheduling through a specific use case.
暂无评论