Software-Defined Networking (SDN) represents a significant shift in network architecture, providing exceptional programmability, flexibility, and simplified management. However, this paradigm shift introduces a unique...
详细信息
ISBN:
(数字)9798331540388
ISBN:
(纸本)9798331540395
Software-Defined Networking (SDN) represents a significant shift in network architecture, providing exceptional programmability, flexibility, and simplified management. However, this paradigm shift introduces a unique set of security challenges that must be addressed to fully realize the potential of SDN. This paper examines the security issues in SDN environments, detailing the threats and vulnerabilities at various layers of the SDN architecture, including the control plane, data plane, and application plane. Through an extensive review of current literature, critical security challenges such as controller attacks, data plane breaches, and vulnerabilities in inter-plane communications are identified. Existing security solutions and mitigation strategies, such as authentication and authorization mechanisms, encryption techniques, and intrusion detection systems, are also explored. Furthermore, the paper discusses recent advances and emerging trends in SDN security, offering insights into ongoing research and future directions. The findings underscore the importance of robust security measures in ensuring the reliability and integrity of SDN deployments, providing a foundation for future innovation and development in this dynamic field.
The evolution of web technologies has brought to the fore new solutions for content management and distribution. The development of these new technologies has managed to lay the foundations of a strong web industry an...
详细信息
With the purpose of increasing the security of physical access in restricted areas, the paper proposes the use of the Linqstat material for a touch sensor keyboard consisting of 19 keys with the possibility of expansi...
详细信息
ISBN:
(数字)9798350352078
ISBN:
(纸本)9798350352085
With the purpose of increasing the security of physical access in restricted areas, the paper proposes the use of the Linqstat material for a touch sensor keyboard consisting of 19 keys with the possibility of expansion for later versions, model that is missing from the specialized literature. The advantage of this type of sensor is that it can also be applied to a curved surface, with the necessary calibration. The construction method of the keyboard including the touch sensor is presented. First, a neural network (NN) is used to locate the touch on the keyboard, then a second method detects each pressed key individually.
The article presents results of experimental identification of MR (magnetorheological) damper model for an off-road vehicle. Original shock-absorbers of the vehicle were replaced by suspension MR dampers supplied by a...
详细信息
In this paper, we show the performance benefits of connecting multiple observers within a control system. We focus here on a particular observer-based control approach, namely the active disturbance rejection control ...
详细信息
The development area of web technologies has gained great popularity due to the power with which these new technologies can manage resources and due to developers or experts of various types who can build applications...
详细信息
This study proposes methods that can be used to examine and interpret comments that users have made after watching videos on YouTube on a particular topic. YouTube tutorials are very popular among young people. They h...
详细信息
ISBN:
(数字)9798350371154
ISBN:
(纸本)9798350371161
This study proposes methods that can be used to examine and interpret comments that users have made after watching videos on YouTube on a particular topic. YouTube tutorials are very popular among young people. They have become an important pillar in informal education, thus contributing to the rapid acquisition of skills and knowledge. Under these circumstances, we were interested in analysing the YouTube videos comments, knowing that the platform has a continuous increase in popularity, which is also due to the opportunities of sharing them. Since ChatGPT-themed YouTube videos have seen a significant surge in popularity since 2022, we were interested to analyse some videos that approach the topics of “ChatGPT, AI clone, AI robot and Deep Learning.”
Lip reading or visual speech recognition has gained significant attention in recent years, particularly because of hardware development and innovations in computer vision. While considerable progress has been obtained...
Lip reading or visual speech recognition has gained significant attention in recent years, particularly because of hardware development and innovations in computer vision. While considerable progress has been obtained, most models have only been tested on a few large-scale datasets. This work addresses this shortcoming by analyzing several architectures and optimizations on the underrepresented, short-scale Romanian language dataset called Wild LRRo. Most notably, we compare different backend modules, demonstrating the effectiveness of adding ample regularization methods. We obtain state-of-the-art results using our proposed method, namely cross-lingual domain adaptation and unlabeled videos from English and German datasets to help the model learn language-invariant features. Lastly, we assess the performance of adding a layer inspired by the neural inhibition mechanism.
Technological advance within IT & C may and will have an increasing impact over environment protection. Currently, a major issue for society in the field of environmental protection is the sustainable management o...
详细信息
Technological advance within IT & C may and will have an increasing impact over environment protection. Currently, a major issue for society in the field of environmental protection is the sustainable management of waste. This has been debated at EU level, leading to the issue of several directives for regulating, monitoring, controlling, and mitigating the impact of pollution. After joining the EU, Romania had to make serious efforts for implementing waste management by adopting European directives or transposing them into national law. As a result, private or state-owned companies involved in selling various categories of products must pay attention to waste collecting and meeting specific recycling quotas. Unfortunately, in Romania there is no software application that offers all the facilities needed by those companies. This paper presents an open system application dedicated to waste management.
In this article we corrected the trilinear formula for triple disjoint matrix multiplication given in the article ‘J. Laderman, V. Pan, X. H. Sha, On practical Algorithms for Accelerated Matrix Multiplication, Linear...
详细信息
暂无评论