Internet of things(IoT)devices are being increasingly used in numerous ***,the low priority on security and various IoT types have made these devices vulnerable to *** prevent this,recent studies have analyzed firmwar...
详细信息
Internet of things(IoT)devices are being increasingly used in numerous ***,the low priority on security and various IoT types have made these devices vulnerable to *** prevent this,recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated ***,these studies focused only on major firmware architectures and rarely considered exotic *** addition,because of the diversity of firmware,the emulation success rate is not high in terms of large-scale *** this study,we propose the adaptive emulation framework for multi-architecture(AEMA).In the field of automated emulation frameworks for IoT firmware testing,AEMA considers the following issues:(1)limited compatibility for exotic firmware architectures,(2)emulation instability when configuring an automated environment,and(3)shallow testing range resulting from structured *** tackle these problems,AEMAcan emulate not onlymajor firmware architectures but also exotic firmware architectures not previously considered,such as Xtensa,ColdFire,and reduced instruction set computer(RISC)version five,by implementing a minority ***,we applied the emulation arbitration technique and input keyword extraction technique for emulation stability and efficient test case *** compared AEMA with other existing frameworks in terms of emulation success rates and fuzz *** a result,AEMA succeeded in emulating 864 out of 1,083 overall experimental firmware and detected vulnerabilities at least twice as fast as the experimental ***,AEMAfound a 0-day vulnerability in realworld IoT devices within 24 h.
Self-healing soft electronic devices that can recover their mechanical and electrical properties are of use in the development of long-term wearable and implantable electronic systems. However, creating self-healing a...
详细信息
Machine learning (ML) models are used to mine inconspicuous information in big data. The model and data quality influence the performance of a ML model. However, modifying the ML model while measuring performance is i...
详细信息
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various ***,the Avatar and Metaverse are being ...
详细信息
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various ***,the Avatar and Metaverse are being developed with a new theory,application,and design,necessitating the association of more personal data and devices of targeted users every *** Avatar and Metaverse technology explosion raises privacy and security concerns,leading to cyber ***-Honeypot,or Metaverse-Honeypot,as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities,should be *** fill this gap,we study user’s engagements with Avatars in Metaverse,analyze possible security vulnerabilities,and create a model named Simplified Avatar Relationship Association with Non-linear Gradient(SARANG)that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this *** also determine the most significant threat for each component’s cyberattacks that will affect user data and *** a result,the commercial off-the-shelf(COTS)of the MV-Honeypot must be established.
This paper presents the fabrication of hierarchical hollow 3D nanowires-like cobalt nickel oxide nanowires (NWs) embedded in tungsten disulfide/reduced graphene oxide hybrid (CoNiO 2 @WS 2 /rGO) composite through a fa...
详细信息
This paper presents the fabrication of hierarchical hollow 3D nanowires-like cobalt nickel oxide nanowires (NWs) embedded in tungsten disulfide/reduced graphene oxide hybrid (CoNiO 2 @WS 2 /rGO) composite through a facile hydrothermal process. The interaction between the 3D hollow WS 2 /rGO skeleton network and the well-defined CoNiO 2 NWs enabled the remarkable electrochemical supercapacitor performances constructed with an enriched specific capacity (515C/g at 0.5 A/g) and superior cycling solidity (97.5 %). Asymmetric device assembled engaging the CoNiO 2 @WS 2 /rGO composite displayed a 236F/g specific capacitance at 1 A/g with ∼74 Wh/kg energy density at 2.4 kW/kg power density along with a high cycling stability (95.2 %). Furthermore, CoNiO 2 @WS 2 /rGO composite possessed bundles of pores with strong interfacial connection, and this enabled a large accessible surface area on the nanowires and facilitated the release of gas bubbles, resulting in excellent oxygen evolution and hydrogen evolution kinetics with a small overpotential ( η 10 = 195 and 33 mV, respectively). Assembled CoNiO 2 @WS 2 /rGO (+/-) electrolyzer achieved a current density of 10 mA cm −2 at a minimal cell voltage of 1.43 with long-span strength. Additionally, theoretical computation studies confirmed that the exceptional catalytic efficacy of the fabricated catalyst could be attributed to the transfer of charge from WS 2 /rGO to CONiO 2 NWs.
The analysis of overcrowded areas is essential for flow monitoring,assembly control,and *** counting’s primary goal is to calculate the population in a given region,which requires real-time analysis of congested scen...
详细信息
The analysis of overcrowded areas is essential for flow monitoring,assembly control,and *** counting’s primary goal is to calculate the population in a given region,which requires real-time analysis of congested scenes for prompt reactionary *** crowd is always unexpected,and the benchmarked available datasets have a lot of variation,which limits the trained models’performance on unseen test *** this paper,we proposed an end-to-end deep neural network that takes an input image and generates a density map of a crowd *** proposed model consists of encoder and decoder networks comprising batch-free normalization layers known as evolving normalization(EvoNorm).This allows our network to be generalized for unseen data because EvoNorm is not using statistics from the training *** decoder network uses dilated 2D convolutional layers to provide large receptive fields and fewer parameters,which enables real-time processing and solves the density drift problem due to its large receptive *** benchmark datasets are used in this study to assess the proposed model,resulting in the conclusion that it outperforms conventional models.
User authentication is a promising security solution in which an external user having his/her mobile device can securely access the real-time information directly from the deployed smart devices in an Internet of Thin...
详细信息
The coronavirus pandemic, which first began in December 2019, has completely changed our daily lives. In particular, daily online digital content consumption over the world has soared since the start of the coronaviru...
详细信息
Fruit classification utilizing a deep convolutional neural network(CNN)is the most promising application in personal computer vision(CV).Profound learning-related characterization made it possible to recognize fruits ...
详细信息
Fruit classification utilizing a deep convolutional neural network(CNN)is the most promising application in personal computer vision(CV).Profound learning-related characterization made it possible to recognize fruits from ***,due to the similarity and complexity,fruit recognition becomes an issue for the stacked fruits on a weighing ***,Machine Learning(ML)methods have been used in fruit farming and agriculture and brought great convenience to human *** automated system related to ML could perform the fruit classifier and sorting tasks previously managed by human ***’s(convolutional neural networks)have attained incredible outcomes in image classifiers in several *** the success of transfer learning and CNNs in other image classifier issues,this study introduces an Artificial Humming Bird Optimization with Siamese Convolutional Neural Network based Fruit Classification(AMO-SCNNFC)*** the presented AMO-SCNNFC technique,image preprocessing is performed to enhance the contrast level of the *** addition,spiral optimization(SPO)with the VGG-16 model is utilized to derive feature *** fruit classification,AHO with end to end SCNN(ESCNN)model is applied to identify different classes of *** performance validation of the AMO-SCNNFC technique is tested using a dataset comprising diverse classes of fruit *** comparison studies reported improving the AMOSCNNFC technique over other approaches with higher accuracy of 99.88%.
Sustainable agriculture is an approach that involves adopting and developing agricultural practices to increase efficiency and preserve resources, both environmentally and economically. Jute is one of the primary sour...
详细信息
Sustainable agriculture is an approach that involves adopting and developing agricultural practices to increase efficiency and preserve resources, both environmentally and economically. Jute is one of the primary sources of income grown in many countries. At this stage, increasing efficiency in jute production and protecting it from pests is essential. Detecting jute pests at an early stage will not only improve crop yield but also provide more income. In this paper, an artificial intelligence-based model was suggested to detect jute pests at an early stage. In this developed model, two different pre-trained models were used for feature extraction. To improve the performance of the developed model, the features obtained using the DarkNet-53 and DenseNet-201 models were combined. After this stage, the metaheuristic Mountain Gazelle Optimizer (MGO) was used, allowing the developed model to work faster and achieve more successful results. Feature selection was carried out using MGO; thus, more successful results were obtained with fewer, more compelling features. The proposed model was compared with six different models and five different classifiers accepted in the literature. In the developed model, 17 different jute pests were detected with 96.779% accuracy. The accuracy value achieved in the developed model is promising in successfully detecting jute pests.
暂无评论