With the rapid advancement of artificial intelligence and machine learning in Industry 4.0 and cyber-physical systems, security poses a significant challenge for humans. To address this, Physical Unclonable Functions ...
With the rapid advancement of artificial intelligence and machine learning in Industry 4.0 and cyber-physical systems, security poses a significant challenge for humans. To address this, Physical Unclonable Functions (PUFs) have emerged as a promising and lightweight solution for securing IoT devices. The demand for low-power and secure crypto-devices has become critical in the context of the Internet of Things (IoT) and its emerging technologies. Although IoT has enabled battery-powered devices to transmit sensitive data, it has also introduced issues of high power consumption and security vulnerabilities. In this paper, we propose an investigation into the use of adiabatic logic with carbon nanotube field-effect transistors (CNTFETs) for designing lightweight IoT devices that tackle these challenges. This computing platform offers potential benefits in terms of security and energy efficiency for IoT applications.
Low altitude airspace economy applications will be of highly effective in a wide range of civil activities and will be a critical element in the smart cities of the future. In view of the main features of unmanned aer...
详细信息
Domain incremental learning (DIL) poses a significant challenge in real-world scenarios, as models need to be sequentially trained on diverse domains over time, all the while avoiding catastrophic forgetting. Mitigati...
详细信息
In the rapidly expanding landscape of Internet of Things (IoT), sensors have emerged as pivotal components, playing a critical role in sensing and data collection. However, this crucial function also renders them susc...
详细信息
ISBN:
(数字)9798350361230
ISBN:
(纸本)9798350361247
In the rapidly expanding landscape of Internet of Things (IoT), sensors have emerged as pivotal components, playing a critical role in sensing and data collection. However, this crucial function also renders them susceptible to potential threats such as unauthorized access and security breaches. This paper investigates the vulnerabilities that lead to these threats and offers a comprehensive set of best practices aimed at fortifying the security of IoT devices. We highlight key measures such as secure device design, robust authentication mechanisms, encrypted communication protocols, regular updates, and emphasize the importance of collaborative efforts among stakeholders using an ontological approach. An Ontology provides a structured framework for organizing knowledge, facilitating clearer communication, efficient data management, and enhanced decision-making. Thus, this paper contributes to the development of a more secure and resilient IoT ecosystem.
In response to the growing need for compliance with diverse safety and security regulations, crucial for safeguarding both humans and machines in the era of Industry 4.0 (I4.0), it has also become increasingly crucial...
详细信息
ISBN:
(数字)9781665464543
ISBN:
(纸本)9781665464550
In response to the growing need for compliance with diverse safety and security regulations, crucial for safeguarding both humans and machines in the era of Industry 4.0 (I4.0), it has also become increasingly crucial for industries to ensure adherence to safety and security standards. However, navigating the complexities of regulations and standards can be daunting, often leading to inefficiencies in compliance processes. Our goal is to foster a comprehensive understanding of an effective approach to meeting compliance requirements in these related fields. Therefore, this paper introduces a semi-automated method for ensuring compliance with unified safety and security standards within the context of I4.0. This approach empowers management teams to thoroughly analyze the specific requirements necessary to maintain a protected environment. Compliance can be achieved at both the asset component and system levels, aligning with the relevant standards. Additionally, we present a detailed analysis of a use case and its output, demonstrating the practical application and efficacy of our approach.
The unprecedented global crisis caused by the COVID-19 pandemic has significantly impacted public health, economies, and daily routines. A critical challenge in managing the pandemic is promptly and precisely identify...
详细信息
ISBN:
(数字)9798350367928
ISBN:
(纸本)9798350367935
The unprecedented global crisis caused by the COVID-19 pandemic has significantly impacted public health, economies, and daily routines. A critical challenge in managing the pandemic is promptly and precisely identifying COVID-19 cases. As a result, there is an urgent need for alternative, non-invasive, and swift diagnostic techniques to identify infected individuals and mitigate the spread of the virus. In this study, we introduce a machine-learning method for early COVID-19 diagnosis by analyzing cough sounds. The study utilizes Mel-frequency cepstral coefficients, extracted from cough audio. Extensive experiments using the COUGHVID cough dataset demonstrate the feasibility and effectiveness of the approach which uses the Extra-Tree classifier. The classification model outperforms other models with a testing accuracy of 90.05%, sensitivity of 86.01%, and an area under the curve of 90.08%, outperforming other similar works, in terms of performance and computation.
Immunotherapy utilizes the potential of the patient's immune system to fight disease. T-lymphocytes have become the central focus of the immune system in the fight against cancer. One of the fundamental studies in...
详细信息
In the contemporary landscape of convergence between Information technology (IT) and Operational technology (OT), maintaining asset visibility within the Industrial Control Systems (ICS) infrastructure is paramount. Y...
详细信息
ISBN:
(数字)9798350361230
ISBN:
(纸本)9798350361247
In the contemporary landscape of convergence between Information technology (IT) and Operational technology (OT), maintaining asset visibility within the Industrial Control Systems (ICS) infrastructure is paramount. Yet, the escalating targeting of legacy systems and air-gapped networks by cyber threats underscores the need for robust security measures and solutions to counter unauthorized access and malicious activities. This paper presents an analysis aimed at identifying gaps and opportunities in integrating IT Security Solutions with OT environments. These solutions offer comprehensive features such as real-time threat detection, asset identification, network monitoring, and incident response capabilities tailored specifically for the unique challenges posed by industrial control networks. Leveraging the Festo MPS 403–1 system as a case study, we delve into the intricacies of IT/ OT integration and highlight areas necessitating improvement to achieve seamless convergence and harness the advantages of unified systems across industries.
The purpose of this research was to design, produce and evaluate a stray child warning system. The device has been designed by using 2 ESP8266 boards to receive signals as specified. The system will notify the informa...
详细信息
This survey examines the current state of energy efficiency and management in South Africa, focusing on the country’s key challenges and opportunities. The study highlights the importance of energy efficiency in redu...
详细信息
暂无评论