Data’s role is pivotal in the era of internet technologies, but unstructured data poses comprehension challenges. Data visualizations like charts have emerged as crucial tools for condensing complex information. Clas...
详细信息
This paper solves the boundary value problem of the second-order differential equation under the neutrosophic fuzzy boundary condition. The proposed solution is approximated using the finite difference method but dene...
详细信息
Prior study has developed the RouteSegmentation algorithm to identify the perimeter area surrounding a route. In this study, a comparative experiment was carried out to investigate the performance of the RouteSegmenta...
详细信息
In light of this unmistakable exponential data expansion, visual media archiving must be rethought. Human generated meta-data might not be sufficient for efficient data retrieval. Object detection and object recogniti...
详细信息
COVID-19 is a respiratory disease for which reverse transcription-polymerase chain reaction (RT-PCR) is the standard detection method. This study introduces a hybrid deep learning approach to support the diagnosis of ...
详细信息
The increased quality and human-likeness of AI generated texts has resulted in a rising demand for neural text detectors, i.e. software that is able to detect whether a text was written by a human or generated by an A...
详细信息
In order to improve the operational strength and control precision of the DC motor, a double closed-loop control system based on TAIXIN TX8C1010 MCU is proposed. The single chip is based on a high-speed 8051 core, whi...
详细信息
作者:
Abu-Nassar, Ahmad M.Morsi, Walid G.
Electrical Computer and Software Engineering Department Faculty of Engineering and Applied Science OshawaONL1G 0C5 Canada
Transportation electrification plays an important role in the operation of the smart grid through the integration of the electric vehicle fast charging stations (EVFCSs), which allows the electric vehicles to provide ...
详细信息
The detection and tracking of changes in the progression of GI disease using endoscopic video analysis remains difficult due to temporal changes and image complexity. Proper models of prediction are critical in diagno...
详细信息
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ...
详细信息
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.
暂无评论