Wearable technology holds promise for monitoring and managing Social Anxiety Disorder (SAD), yet the absence of clear biomarkers specific to SAD hampers its effectiveness. This article explores this issue by presentin...
详细信息
Wearable technology holds promise for monitoring and managing Social Anxiety Disorder (SAD), yet the absence of clear biomarkers specific to SAD hampers its effectiveness. This article explores this issue by presenting a study investigating variances in heart rate, heart rate variability, and skin conductance between socially anxious and non-anxious individuals. One hundred eleven non-clinical student participants participated in groups of three in three anxiety-provoking activities (i.e., speech, group discussion, and interview) in a controlled lab-based study. During the study, electrocardiogram (ECG) and electrodermal activity (EDA) signals were captured via on-body electrodes. During data analysis, participants were divided into four groups based on their self-reported anxiety level (“none,” “mild,” “moderate,” and “severe”). Between-group analysis shows that discriminating ECG features (i.e., heart rate and MeanNN) could identify anxious individuals during anxiety-provoking activities, while EDA could not. Moreover, the discriminating ECG features improved the classification accuracy of anxious and non-anxious individuals in different machine-learning techniques. The findings need to be further scrutinized in real-world settings for the generalizability of the results.
This research paper focuses on the integration of Very Large Scale Integration (VLSI) technology with traditional Proportional-Integral-Derivative (PID) controllers to improve temperature control in electronic devices...
详细信息
The main objective of this work is to model, control and simulate an electrical microgrid. To achieve this objective, models of the subsystems or associated elements (generators, power interfaces, electrical loads, et...
详细信息
The paper describes the energy consumption from the battery based on the current measurements for various cases, i.e., speed (PWL adjustment) and loads. The main purpose of the research is to have additional and relia...
详细信息
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne...
详细信息
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies *** vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end *** anomaly detector investigates these identified risks and provides secure network *** enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)*** anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation *** classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment.
作者:
Yau, Yeu-TorngDepartment of Ph.D. Program
Prospective Technology of Electrical Engineering and Computer Science National Chin-Yi University of Technology Taichung No.57 Sec. 2 Zhongshan Rd. Taiping Dist Taichung41170 Taiwan
To provide a hold-up time function in DC-DC supplies for cell site stations or data centers, using a boost converter with a bulk output capacitor as a front-end converter stage is a simple and highly cost-effective so...
详细信息
Tracking is a crucial problem for nonlinear systems as it ensures stability and enables the system to accurately follow a desired reference signal. Using Takagi–Sugeno (T–S) fuzzy models, this paper addresses the pr...
详细信息
A novel hydrogen (H2) sensor produced by the combination of an amorphous indium-aluminum-zinc-oxide (a-IAZO) thin film and palladium (Pd) nanoparticles (NPs) is demonstrated and studied herein. Elemental and morpholog...
详细信息
The satellite edge computing (SEC) has recently received considerable attention thanks to its wide area service around the world. However, this also creates a risk of exposing private user data to eavesdroppers. Physi...
详细信息
ISBN:
(数字)9783903176652
ISBN:
(纸本)9798331508722
The satellite edge computing (SEC) has recently received considerable attention thanks to its wide area service around the world. However, this also creates a risk of exposing private user data to eavesdroppers. Physical layer security can help prevent this, yet it requires extra usage of network resources. Hence, efficient management of these resources is essential for saving power and ensuring secure code offloading. Moreover, from the perspective of mobile devices that request services, the level of security demands is quite different for various services, yet current studies have not fully considered this aspect. In this paper, we propose a secure code offloading framework for an SEC system with a jamming strategy in the existence of eavesdropping satellite. We formulate an average power minimization problem of an LEO satellite, a gateway, and a mobile device while ensuring security and the stability of queues. This includes making decisions of code offloading, computing/network resource allocation, and jamming unit selection. As a solution of this problem, we propose an SOS algorithm by invoking stochastic optimization theory. Finally, via extensive simulations, we demonstrate that the proposed SOS algorithm can save up to 60% of average power compared to existing algorithms while maintaining the same delay and zero leakage of information toward eavesdropper.
For efficient and robust information exchange in the vehicular adhoc network,a secure and trusted incentive reward is needed to avoid and reduce the intensity of misbehaving nodes and congestion especially in the case...
详细信息
For efficient and robust information exchange in the vehicular adhoc network,a secure and trusted incentive reward is needed to avoid and reduce the intensity of misbehaving nodes and congestion especially in the case where the periodic beacons exploit the *** addition,we cannot be sure that all vehicular nodes eagerly share their communication assets to the system for message dissemination without any ***,there may be some misbehaving nodes and due to their selfish and greedy approach,these nodes may not help others on the *** deal with this challenge,trust-based misbehavior avoidance schemes are generally reflected as the capable *** this paper,we employed a fair incentive mechanism for cooperation aware vehicular communication *** order to deploy a comprehensive credit based rewarding scheme,the proposed rewardbased scheme fully depends on secure and reliable cryptographic *** order to achieve the security goals,we used the cryptographic scheme to generate a certified public key for the authenticity of every message exchange over the *** evaluated the friction of misbehaving vehicles and the effect of rewarding schemes in context with honest messages dissemination over the network.
暂无评论