Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
Emotions are a vital semantic part of human correspondence. Emotions are significant for human correspondence as well as basic for human–computer cooperation. Viable correspondence between people is possibly achieved...
详细信息
This article studies a new stator-permanent magnet (PM) motor with flux-switching (FS) and flux-reversal (FR) effects synergies. The proposed structure benefits from the splitting stator pole PMs and consequent-pole F...
详细信息
Miniaturization of the transistor has resulted in novel patterning techniques to come into account. To alleviate the resolution limits of photolithography, various promising techniques have been developed with high re...
详细信息
Unmanned Aerial Vehicles (UAVs) have been recently leveraged in massive amount of Internet of Things (IoT) applications. However, given the stringent limitations of UAVs, investigating their performance in terms of th...
详细信息
Producing executable code from natural-language directives via Large Language Models (LLMs) involves obstacles like semantic uncertainty and the requirement for task-focused context interpretation. To resolve these di...
详细信息
The global automotive industry is in the phase where Internal Combustion vehicles are in decline and witnessing a shift towards sustainable development. The major parameter of a successful EV is an efficient battery p...
详细信息
Background: The concept of pill reminders has been discussed and developed throughout the decade. It varies from cascaded plastic pill boxes to complicated robust dispensers. This proposed smart pill reminding system ...
详细信息
Background: The concept of pill reminders has been discussed and developed throughout the decade. It varies from cascaded plastic pill boxes to complicated robust dispensers. This proposed smart pill reminding system based on IoT is being designed by considering ease-to-use and cost-effectiveness. Method: A smart pill reminding system is a system that will alert the patient to take their respective pill at the desired time. It will also track the motion of the patient’s hand while taking the pill and will also display the pill count on an LCD Screen. In case a patient forgets/ignores the reminder provided by the system, the system will automatically display the status on the application that will be installed in the relative/caretaker’s phone and through an email on the patient's relative/caretaker’s email address to take subsequent action. The system will monitor the real-time using an RTC module, and as and when the current time matches the medicines time, it will activate its mechanism, and the patient will have a buffer time to take their medicine. In case a patient does take the medicine in the buffer time provided by the system, then one mechanism of the system will be activated. In another case, if a patient does not take the medicine in the stipulated time, further actions will be initiated by the system to benefit the patient. Results: It was tested and found that out of ten times, the system worked accurately nine times, with calculated accuracy as high as 90%. Initially, the Blynk application will display "Welcome Patient" and "You will be updated". Once the RTC matches the scheduled time to take medicine, the buzzer starts buzzing. If the IR sensor detects the movement of the user’s hand, the LCD will update the pill count, and the pill count is reduced by one. The LCD will also display the message "Medicine Taken". If the IR sensor does not detect the movement of the user’s hand, the LCD will display the same pill count. The LCD will also display the me
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,manual screening has several limitations,including the propensity for errors,and raises concerns about passenger *** address these drawbacks,researchers have leveraged recent advances in deep learning to design threatsegmentation ***,these models require extensive training data and labour-intensive dense pixelwise annotations and are finetuned separately for each dataset to account for inter-dataset ***,this study proposes a semi-supervised contour-driven broad learning system(BLS)for X-ray baggage security threat instance segmentation referred to as *** research methodology involved enhancing representation learning and achieving faster training capability to tackle severe occlusion and class imbalance using a single training routine with limited baggage *** proposed framework was trained with minimal supervision using resource-efficient image-level labels to localize illegal items in multi-vendor baggage *** specifically,the framework generated candidate region segments from the input X-ray scans based on local intensity transition cues,effectively identifying concealed prohibited items without entire baggage *** multi-convolutional BLS exploits the rich complementary features extracted from these region segments to predict object categories,including threat and benign *** contours corresponding to the region segments predicted as threats were then utilized to yield the segmentation *** proposed C-BLX system was thoroughly evaluated on three highly imbalanced public datasets and surpassed other competitive approaches in baggage-threat segmentation,yielding 90.04%,78.92%,and 59.44%in terms of mIoU on GDXray,SIXray,and Compass-XP,***,the lim
Wind and solar energy are two popular forms of renewable energy used in microgrids and facilitating the transition towards net-zero carbon emissions by ***,they are exceedingly unpredictable since they rely highly on ...
详细信息
Wind and solar energy are two popular forms of renewable energy used in microgrids and facilitating the transition towards net-zero carbon emissions by ***,they are exceedingly unpredictable since they rely highly on weather and atmospheric *** microgrids,smart energy management systems,such as integrated demand response programs,are permanently established on a step-ahead basis,which means that accu-rate forecasting of wind speed and solar irradiance intervals is becoming increasingly crucial to the optimal operation and planning of *** this in mind,a novel“bidirectional long short-term memory network”(Bi-LSTM)-based,deep stacked,sequence-to-sequence autoencoder(S2SAE)forecasting model for predicting short-term solar irradiation and wind speed was developed and evaluated in *** create a deep stacked S2SAE prediction model,a deep Bi-LSTM-based encoder and decoder are stacked on top of one another to reduce the dimension of the input sequence,extract its features,and then reconstruct it to produce the *** of the proposed deep stacked S2SAE forecasting model were optimized using the Bayesian optimization ***,the forecasting performance of the proposed Bi-LSTM-based deep stacked S2SAE model was compared to three other deep,and shallow stacked S2SAEs,i.e.,the LSTM-based deep stacked S2SAE model,gated recurrent unit-based deep stacked S2SAE model,and Bi-LSTM-based shallow stacked S2SAE *** these models were also optimized and modeled in *** results simulated based on actual data confirmed that the proposed model outperformed the alternatives by achieving an accuracy of up to 99.7%,which evidenced the high reliability of the proposed forecasting.
暂无评论