More than a year has passed since reports of ChatGPT-3.5’s capability to pass exams sent shockwaves through education circles. These initial concerns led to a multi-institutional and multi-disciplinary study to asses...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on...
详细信息
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to *** authentication works via OpenID,Kerberos,password authentication protocols,***,there are still some limitations present in the reported security *** this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern *** proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and *** first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication *** Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing *** study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and *** experimental sites were examined by 72 information technology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via *** proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere.
Many BDS is doomed to failure because of the missing knowledge on measuring the performance of BDS. The failure to identify the performance measurement and correct will make the problems worsen. This will complicate t...
详细信息
Wireless Body Area Network (WBAN) is a vital application of the Internet of Things (IoT) that plays a significant role in gathering a patient's healthcare information. This collected data helps special professiona...
详细信息
Blockchain technology is widely used to develop software systems in different industries such as finance, healthcare, supply chain management, data management, Internet of Things (IoT). To adopt blockchain, some criti...
详细信息
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enabl...
详细信息
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enable faster response time for latency-sensitive *** fundamental problem is where and how to offload and schedule multi-dependent tasks so as to minimize their collective execution time and to achieve high resource *** approaches randomly dispatch tasks naively to available edge nodes without considering the resource demands of tasks,inter-dependencies of tasks and edge resource *** approaches can result in the longer waiting time for tasks due to insufficient resource availability or dependency support,as well as provider ***,we present Edge Colla,which is based on the integration of edge resources running across multi-edge *** Colla leverages learning techniques to intelligently dispatch multidependent tasks,and a variant bin-packing optimization method to co-locate these tasks firmly on available nodes to optimally utilize *** experiments on real-world datasets from Alibaba on task dependencies show that our approach can achieve optimal performance than the baseline schemes.
With the ongoing advancements in science and technology and the increasing research focus on cancer-related issues, there has been a proliferation of omics-related resources for in-depth analysis and exploration. This...
详细信息
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s...
详细信息
Light Field(LF)depth estimation is an important research direction in the area of computer vision and computational photography,which aims to infer the depth information of different objects in threedimensional scenes...
详细信息
Light Field(LF)depth estimation is an important research direction in the area of computer vision and computational photography,which aims to infer the depth information of different objects in threedimensional scenes by capturing LF *** this new era of significance,this article introduces a survey of the key concepts,methods,novel applications,and future trends in this *** summarize the LF depth estimation methods,which are usually based on the interaction of radiance from rays in all directions of the LF data,such as epipolar-plane,multi-view geometry,focal stack,and deep *** analyze the many challenges facing each of these approaches,including complex algorithms,large amounts of computation,and speed *** addition,this survey summarizes most of the currently available methods,conducts some comparative experiments,discusses the results,and investigates the novel directions in LF depth estimation.
This paper focuses on how to use continuous integration (CI) and continuous Delivery (CD) methodology in DevOps to reduce the developer-operator gap. It also, shows how CI can be a CD bridge. The paper review DevOps a...
详细信息
暂无评论