The high mobility of uncrewed aerial vehicles (UAVs) has led to their usage in various computer vision applications, notably in intelligent traffic surveillance, where it enhances productivity and simplifies the proce...
详细信息
This study introduces a new hybrid fuzzy time series (FTS) model designed to improve forecasting abilities by independently applying forecasting techniques using both overlapping and non-overlapping partitions. By lev...
详细信息
This paper presents a novel medical imaging framework, Efficient Parallel Deep Transfer SubNet+-based Explainable Model (EPDTNet + -EM), designed to improve the detection and classification of abnormalities in medical...
详细信息
Cloud computing involves accessing and using computing resources, such as servers, storage, and software applications, over the Internet, enabling scalable access on demand. Cloud computing systems are becoming an ess...
详细信息
Design patterns offer reusable solutions for common software issues,enhancing *** advent of generative large language models(LLMs)marks progress in software development,but their efficacy in applying design patterns i...
详细信息
Design patterns offer reusable solutions for common software issues,enhancing *** advent of generative large language models(LLMs)marks progress in software development,but their efficacy in applying design patterns is not fully *** recent introduction of generative large language models(LLMs)like ChatGPT and CoPilot has demonstrated significant promise in software *** assist with a variety of tasks including code generation,modeling,bug fixing,and testing,leading to enhanced efficiency and *** initial uses of these LLMs have had a positive effect on software development,their potential influence on the application of design patterns remains *** study introduces a method to quantify LLMs’ability to implement design patterns,using Role-Based Metamodeling Language(RBML)for a rigorous specification of the pattern’s problem,solution,and transformation *** method evaluates the pattern applicability of a software application using the pattern’s problem *** deemed applicable,the application is input to the LLM for pattern *** resulting application is assessed for conformance to the pattern’s solution specification and for completeness against the pattern’s transformation *** the method with ChatGPT 4 across three applications reveals ChatGPT’s high proficiency,achieving averages of 98%in conformance and 87%in completeness,thereby demonstrating the effectiveness of the *** RBML,this study confirms that LLMs,specifically ChatGPT 4,have great potential in effective and efficient application of design patterns with high conformance and *** opens avenues for further integrating LLMs into complex software engineering processes.
Visible Light Communication (VLC) has emerged as a promising technology for vehicular communication due to its high data rates, low latency, and immunity to electromagnetic interference. However, optimizing spectral e...
详细信息
The advancement in technology leads to provide an efficient communication among vehicles to offload resource-intensive tasks for transportation-based services. However, it may cause issue related to efficient secure r...
详细信息
Push-based two-factor authentication (2FA) methods, such as the "Just-Confirm" approach, are popular due to their user-friendly design, requiring users to simply approve or deny a push notification on their ...
详细信息
Push-based two-factor authentication (2FA) methods, such as the "Just-Confirm" approach, are popular due to their user-friendly design, requiring users to simply approve or deny a push notification on their mobile device. However, these methods are vulnerable to "concurrency attacks," where an attacker attempts to log in immediately after the legitimate user, causing multiple push notifications that may lead to users inadvertently approving fraudulent access. This vulnerability arises because the login notifications are not uniquely bound to individual login attempts. To address this issue, Push-Compare-and-Confirm 2FA method enhances security by associating each login notification with a unique code displayed on both the authentication terminal and the push notification. Users are required to match these codes before confirming access, thereby binding the notification to a specific login attempt. Recognizing the ubiquity of mobile devices in daily life, we conducted a comprehensive user study with 65 participants to evaluate the usability and security of Push-Compare-and-Confirm. The study considered two scenarios: one where the user’s second-factor device (phone) is physically separate from the authentication terminal (e.g., logging in on a PC and confirming on the phone), and another where the phone serves as both the authentication terminal and the second-factor device. Participants completed 24 login trials, including both benign and attack scenarios, with varying code lengths (four characters and six characters). Our results indicate that while Push-Compare-and-Confirm maintains high usability in benign scenarios, with True Positive Rates (TPR) exceeding 95%, it presents significant challenges in attack detection. Participants correctly identified only about 50% of fraudulent login attempts, indicating a substantial vulnerability remains. These findings suggest that although Push-Compare-and-Confirm enhances security over standard push-based 2FA methods, addit
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut...
详细信息
The Telecare Medical Information System (TMIS) faces challenges in securely exchanging sensitive health information between TMIS nodes. A Mutual Authenticated Key Agreement (MAKA) scheme is used to eliminate security ...
详细信息
暂无评论