This paper presents the design, development and evaluation of a novel Network Simulator as a Service infrastructure. It is based on a prominent open-source discrete-event network simulator which is extended to offer a...
详细信息
We explore the possibility of extending Mardare et al.’s quantitative algebras to the structures which naturally emerge from Combinatory Logic and the λ-calculus. First of all, we show that the framework is indeed a...
详细信息
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of...
详细信息
ISBN:
(纸本)9789819776023
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of different services to customers, and that have the potential to do so. Customers are required to pay for the cost of using the Services in accordance with the company's "pay-for-use only" policy. However, there are certain firms, such as Google Inc, that provide customers with particular free storage space even though the services provided by the company are limited, specifically with regard to the public cloud. A third-party service provider frequently owns and maintains the infrastructure required to run cloud computing services. But because more and more data and files pertaining to individuals and businesses are being stored in the cloud, worries have started to grow about how safe it actually is. Among these are the protection of software for virtualization and distributed computing, the safety of application software, the administration of identities, and the authentication and restriction of access. Nevertheless, efficient user authentication is the most essential need of cloud computing, as it limits unauthorized usage of a cloud server. Cloud computing has become increasingly popular in recent years. In this research, we present a new authentication method between users and online computing systems that is based on the suggested secure hash algorithm (SHA-3) and makes use of the lightweight Sosemanuk method. We created this technique. That system is going to be known as the SoSha3 system. The design that has been proposed for the system deals with data in three different sizes: 128, 256, and 512 bits. In order to make these authentication systems suitable for cloud computing at high rates, some modifications were made to them. The three-dimensional chaotic system, also known as the Lorenz system, will be combined with the authentication architecture tha
We extend a recent model of temporal random hyperbolic graphs by allowing connections and disconnections to persist across network snapshots with different probabilities, ω1 and ω2. This extension, while conceptuall...
详细信息
The most recent proposals of Machine and Deep Learning algorithms for Network Intrusion Detection Systems (NIDS) leverage Graph Neural Networks (GNN). These techniques create a graph representation of network traffic ...
详细信息
Urban pluvial flooding causes threats to human lives, economy, infrastructure, and ecosystems around the world, particularly in developing countries. Pakistan is among those developing countries that have become vulne...
详细信息
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
详细信息
This research proposes a novel approach to addressing the issue of signature authenticity identification by implementing Deep Metric Learning (DML). The aim of this study is to develop a DML model with high accuracy i...
详细信息
ISBN:
(数字)9798350368802
ISBN:
(纸本)9798350368819
This research proposes a novel approach to addressing the issue of signature authenticity identification by implementing Deep Metric Learning (DML). The aim of this study is to develop a DML model with high accuracy in training and testing processes that can be integrated with a mobile application for signature authenticity verification. The data used in this research are signature images from 90 individuals, divided into two categories: genuine signatures and forged signatures. Testing results show that the developed model has an accuracy of 85.7 % , with high precision for the forged signature class at 95.9% and recall for the genuine signature class at 94.9%. The conclusion of this research is that the developed DML model is reliable for signature verification, although further development is needed to improve the model's performance, especially in detecting forged signatures. Suggestions for future research include increasing the amount and variety of training data, integrating the model with a mobile application, and testing the model under various conditions and on different devices.
With the advancement of cloud-based file management platforms, sharing and storing files in the company's area can be easily achieved through a variety of file-sharing platforms. However, these platforms often lac...
详细信息
ISBN:
(数字)9798350365191
ISBN:
(纸本)9798350365207
With the advancement of cloud-based file management platforms, sharing and storing files in the company's area can be easily achieved through a variety of file-sharing platforms. However, these platforms often lack of security and adequate access logs or activity records for the shared files, resulting in a lack of control and traceability for users. This research proposes an traceable and secure system for managing files in companies using blockchain and IPFS. The content ID of uploaded files to IPFS will be stored on the blockchain along with user access rights and access logs. Integration with the existing company file management system is also facilitated by the use of the change data capture method. Experimental findings demonstrate that the system offers the desired traceability of access and activity while also meeting data security requirements such as confidentiality, integrity, and availability. Furthermore, performance tests indicate satisfactory outcomes with 0.8 seconds per MB for file storage on IPFS, and 4.1 seconds per transaction for data storage on Blockchain. The experimental results revealed that the proposed system, integrating blockchain and IPFS, successfully addressed the need for traceability of access and activity for the company's data, providing a significant improvement in data security and management over existing solutions.
Poor Indoor Air Quality (IAQ) can contribute to airborne viruses remaining viable for longer time periods with the increased risk of infecting more people. Various methodologies, usually by considering CO2 concentrati...
详细信息
暂无评论