Pedestrian intention prediction can be used in Advanced Driver Assistance Systems to prevent pedestrian-vehicle collision in case of driver distractions. The use of these tools will reduce pedestrian fatalities in tra...
详细信息
In Wireless Sensor Networks (WSNs), the relay nodes deployment problem is essential, as the relay nodes serve as cluster heads aggregating the data packages from sensors. Further, the relay nodes transmit collected pa...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web o...
详细信息
The Internet of Things (IoT) stands as a revolutionary leap in digital connectivity, envisioning a future network connecting billions of devices, seamlessly. Amidst the myriad benefits, there arises an intricate web of challenges, prominently centered around potential threats and data security implications. Recent cryptography techniques, such as DNA-based cryptography, 3D chaos-based cryptography, and optical cryptography, face challenges including large encryption times, high energy consumption, and suboptimal rather than optimal performance. Particularly, the burden of long encryption cycles strains the energy resources of typical low-power and compact IoT devices. These challenges render the devices vulnerable to unauthorized breaches, despite large storage capacities. The hallmark of the IoT ecosystem, characterized by its low-power compact devices, is the burgeoning volume of data they generate. This escalating data influx, while necessitating expansive storage, remains vulnerable to unauthorized access and breaches. Historically, encryption algorithms, with their multifaceted architectures, have been the bulwark against such intrusions. However, their inherently-complex nature, entailing multiple encryption cycles, strains the limited energy reserves of typical IoT devices. In response to this intricate dilemma, we present a hybrid lightweight encryption strategy. Our algorithm innovatively leverages both one-dimensional (1D) and two-dimensional (2D) chaotic key generators. Furthermore, it amalgamates a classical encryption philosophy, harmonizing the strengths of Feistel and substitution-permutation networks. The centerpiece of our strategy is achieving effective encryption in merely three rounds, tailored expressly for compressed Three-Dimensional Video (3DV) frames, ensuring their unwavering integrity. Our workflow commences with the H.264/MVC compression algorithm, setting the stage for the subsequent encryption phase. Through rigorous MATLAB simulations,
Due to the nature of monetary and spatial constrictions, larger systems on small satellites are getting replaced by smaller but more inaccurate sensors. To improve the satellite orientation estimate, multiple differen...
详细信息
The emergence of the Internet of Vehicles (IoV) as a driver for the new age of Intelligent Transportation Systems (ITS) provides an opportunity for a wide range of services and applications driven by the various inter...
详细信息
The demand for more efficient and reliable elevator monitoring systems has increased due to security and safety issues in high-mobility buildings. This paper proposes a microservice architecture for an elevator monito...
详细信息
This study investigates the pre-existing knowledge of first-year students in computer Programming courses, analysing the impact of secondary education backgrounds on their learning experiences. Over the course of five...
详细信息
In the present study we present a numerical modeling of a laminate magnetic material using an homogenization technique which exploit an inverse problem resolution. The laminate magnetic material is consisting of an al...
详细信息
Simple proportional and integral controller is employed to control benchmark hydrodynamic process, a coupled tanks system. The proportional part of the controller is placed in the feedback path to avoid an overshoot i...
详细信息
In the domain of software development, it is crucial to maintain high quality in order to meet the increasing demands of users and the rapid pace of technological advancement. This paper explores the concept of qualit...
详细信息
暂无评论