Aquaculture plays a pivotal role in meeting the growing global demand for seafood. However, ensuring optimal water quality within aquaculture ponds is a pressing challenge. This project proposes a paradigm shift by in...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr...
详细信息
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied *** Detection systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant ***,existing ML and DL-based IDS still face a number of obstacles that must be *** instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory *** and fewer data potentially lead to low performance on existing *** paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant *** proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for *** performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID *** datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios.
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
In this research paper, the authors present a comprehensive overview of three key elements of Metaverse-as-a-service (MaaS) platforms: privacy and security, edge computing, and blockchain technology. The study begins ...
详细信息
Photovoltaic panel used in solar power generation is an environmentally beneficial and sustainable energy source that has been used to transform sunlight into electrical power. Arranged in large solar facilities, thes...
详细信息
For the cause of evolution of agriculture to its next generation, the introduction of A.I. and data-driven approach is going to be an important part of the agricultural industry that as per our vision would offer nume...
详细信息
This research introduces an innovative Sign Language to Speech Conversion Model using Convolutional Neural Networks (CNNs) to address communication barriers for the people who are deaf and unable to hear properly. The...
详细信息
Skin cancer is a predominant and possibly lethal condition that distresses people across the world. Primary detection and precise finding are crucial for leveraging efficacious treatment and enhanced patient consequen...
详细信息
Financial fraud presents substantial risks to individuals and financial institutions globally, necessitating efficient detection mechanisms to mitigate probable fatalities. In this study, the development and evaluatio...
详细信息
The number of cases of violence and fights has been increasing around the world. With the use of CCTV, such incidents can be recorded but the detection of Violence is a major issue around the globe, and it plays a vit...
详细信息
暂无评论