Automatic dietary monitoring has progressed significantly during the last years, offering a variety of solutions, both in terms of sensors and algorithms as well as in terms of what aspect or parameters of eating beha...
详细信息
In the era of Human-computer Interaction (HCI), understanding emotional responses through multimodal signals during interactive experiences, such as serious games (SG), is of high importance. In this work, we explore ...
详细信息
This paper presents the work conducted on providing an efficient solution to the Vehicle Routing Problem considering all stages of a delivery process. The results are promising when compared to real-life data and depi...
详细信息
Researchers often come under pressure when facing the ever-increasing demand to produce a progressive number of publications, resorting to hiring the services of paper mills. These are unofficial, and often illegitima...
详细信息
While extensively explored in text-based tasks, Named Entity Recognition (NER) remains largely neglected in spoken language understanding. Existing resources are limited to a single, English-only dataset. This paper a...
详细信息
Recently, the Internet of Things (IoT) has gained widespread popularity, yet its security remains a critical challenge due to the massive amount of information generated by connected devices. While encryption algorith...
详细信息
ISBN:
(数字)9798350350265
ISBN:
(纸本)9798350350272
Recently, the Internet of Things (IoT) has gained widespread popularity, yet its security remains a critical challenge due to the massive amount of information generated by connected devices. While encryption algorithms are commonly employed to protect this information, they are susceptible to various attacks. This paper introduces a novel encryption method to enhance data security in the Consumer IoT domain. The proposed approach combines DNA-inspired encryption with blockchain technology. The DNA encryption algorithm is utilized for the primary encryption phase, followed by the secure handling of encrypted data using blockchain. To evaluate the proposed scheme, a comparison is made with traditional techniques such as RSA, DNA, and a hybrid of both, considering encryption and decryption times. Simulations are conducted using MATLAB software, and an analytical study is performed to assess the performance of the suggested scheme.
Trust and security are critical deployment require-ments for Industrial Internet of Things (IIoT) networks. A recent protocol, called TRUTH, integrates security mechanisms for authentication and privacy alongside a De...
详细信息
It is cumbersome to collect data using a real robot in a physical environment, as it is very time consuming, not to mention costly in terms of human labor and hardware. As such, the use of simulation has become more p...
详细信息
Thermal properties of refractory nanocomposites with embedded single-walled carbon nanotubes were investigated using proposed automated approach. In this approach, differences in nanocomposites with varying parameters...
详细信息
While language technologies have advanced significantly, current approaches fail to address the complex sociocultural dimensions of linguistic preservation. AI Thinking proposes a meaning-centered framework that would...
暂无评论