Recent work has proven the effort of researchers to integrate small sensors and a cloud environment, delivering the Internet of Things (IoT). Sensors as a service are one of the leading research concerns in this conte...
详细信息
In the global community, countries are paying more and more attention to the monitoring and control of food safety. The food industry is investing more resources in the production chain to improve the process. Food pr...
详细信息
Eye disorders such as cataracts, glaucoma, and diabetic retinopathy can cause abnormalities in eye function, including blindness. This research aims to develop a machine-learning model and find the best model for dete...
详细信息
A traditional method of generating an optimal energy mix involves selecting from various power producers, each with different costs per kilowatt-hour (kWh). This energy is then transmitted and distributed among variou...
详细信息
In the data based digital age, there are risks of attacks that cause denial of service (DoS) or distributed denial of service (DDoS) which pose threats to the security and availability of databases especially with tho...
详细信息
ISBN:
(数字)9798331533243
ISBN:
(纸本)9798331533250
In the data based digital age, there are risks of attacks that cause denial of service (DoS) or distributed denial of service (DDoS) which pose threats to the security and availability of databases especially with those who are affected by this which is very disturbing. This research aims at analysing the methods of detecting and preventing DoS and DDoS attacks, with more focus on the security of databases. This research identifies and evaluates various strategies employed to counter such threats to cloud and Internet of Things (IoT) systems from the literature review conducted using the PRISMA approach. The analyses show that machine learning algorithms are capable of enhancing the detection of DoS/DDoS attack's efficiency and accuracy, and the cloud and IoT security solutions, including complex load balancing and powerful firewalls, are crucial for preventing and mitigating such attacks. This study also shows that, AI should be included in the security plans and security measures should be adaptable and proactive. This work is useful for scholars, developers, and cybersecurity experts who are interested in enhancing measures to counter and prevent advanced cybercrimes and ensuring continued and reliable functionality in data centric settings.
Air pollution is a pressing issue in cities, and managing air quality poses a challenge for urban designers and decision-makers. This study proposes a Digital Twin (DT) Smart City integrated with Mixed Reality technol...
详细信息
Passenger transport is one of the most common ways of commuting in Taiwan. It plays an important role in the transportation system due to its large number of stations, dense frequency, and cheap transportation. Due to...
详细信息
Medical imaging abnormality detection is challenging, but deep learning approaches have shown promise. This paper reviews the current state of the art in deep learning approaches for detecting abnormalities in chest m...
详细信息
We have been developing MEIMAT, meiji micro-processor (MPU) architecture design tools. Our MEIMAT has a feature to implement arbitrary instructions. However, the MEIMAT does not have a function to simulate those instr...
详细信息
Opinion has always affected businesses and individuals especially from the Public. People react through social media and spread it incompletely. The situation was then accepted as public opinion. There are three categ...
详细信息
暂无评论