The automation of business process modelling has become crucial for organizations seeking to improve their operational efficiency. This research presents a novel methodology that leverages fine-tuned GPT models to aut...
详细信息
The deep integration of IoT into our daily lives has made the security of IoT everyone's priority, from IoT device manufacturers to IoT developers and final customers. Even though every year millions of IoT device...
详细信息
ISBN:
(纸本)9798350369328
The deep integration of IoT into our daily lives has made the security of IoT everyone's priority, from IoT device manufacturers to IoT developers and final customers. Even though every year millions of IoT devices are introduced to the market, security, and privacy have not been competently addressed. Based on the survey of IoT challenges, IoT applications face many threats in Network communication, storage access, device identification and Authentication, program execution, firmware update, Secure Boot, etc. IoT devices are vulnerable to attacks, which breach the security and privacy of users and systems. Commonly most IoT applications are deployed using common operating systems that do not address IoT specialized security requirements. This paper introduces xPython, a novel secure-by-design operating system for IoT subsystems (devices and gateways). xPython provides transparent security solutions for common threats in addition to a security library for custom security implementation. xPython minimizes the time required to develop security features. xPython is secure by design to ensure security features are included at all stages of product creation and deployment. This paper proposes a new architecture for IoT operating systems, and it ends with a complete prototype implementation. The proposed architecture integrates security services inside operating system layers. It affects device initiation, communication protocols, application deployment, and application execution, ensuring software is executed securely, including non-secure applications (secure boot) and storage access. The proposed security solutions are inspired by previous work in Smart Cards. Smart Cards are considered a trusted environment for identification, authentication, and confidentiality. Finally, xPython is built over a real-time operating system to fulfill embedded systems requirements. The xPython development is also performed using Micro-Python to simplify the development process and reduc
Corporate Social Responsibility (CSR) is an increasingly relevant concept for companies as it improves competitiveness and market perception. Incorporating CSR elements in commercial operations requires considering va...
详细信息
The novel coronavirus (COVID-19) pandemic is a major global health threat that was spreading very quickly around the world. Many mathematical models are being formulated to study the spread of COVID-19 and to predict ...
详细信息
Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its *** integrated solutions are also a need to deal with ...
详细信息
Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its *** integrated solutions are also a need to deal with the social and environmental challenges,caused by increasing ***,the development of smart services’integrated network,within a city,is facing the bar-riers including;less efficient collection and sharing of data,along with inadequate collaboration of software and *** to resolve these issues,this paper recommended a solution for a synchronous functionality in the smart services’integration process through modeling *** this integration modeling solution,atfirst,the service participants,processes and tasks of smart services are identified and then standard illustrations are developed for the better understand-ing of the integrated service group *** process modeling and notation(BPMN)language based models are developed and discussed for a devised case study,to test and experiment i.e.,for remote healthcare from a smart *** research is concluded with the integration process model application for the required data sharing among different service *** outcomes of the modeling are better understanding and attaining maximum automation that can be referenced and replicated.
Probabilistic Error Cancellation (PEC) aims to improve the accuracy of expectation values for observables. This is accomplished using the probabilistic insertion of recovery gates, which correspond to the inverse of e...
详细信息
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computersystems. Lately, there have been a lot of reported issues of software vulnerabilit...
详细信息
As real-time data sources expand, the need for detecting anomalies in streaming data becomes increasingly critical for cutting edge data-driven applications. Real-time anomaly detection faces various challenges, requi...
详细信息
Light Field(LF)depth estimation is an important research direction in the area of computer vision and computational photography,which aims to infer the depth information of different objects in threedimensional scenes...
详细信息
Light Field(LF)depth estimation is an important research direction in the area of computer vision and computational photography,which aims to infer the depth information of different objects in threedimensional scenes by capturing LF *** this new era of significance,this article introduces a survey of the key concepts,methods,novel applications,and future trends in this *** summarize the LF depth estimation methods,which are usually based on the interaction of radiance from rays in all directions of the LF data,such as epipolar-plane,multi-view geometry,focal stack,and deep *** analyze the many challenges facing each of these approaches,including complex algorithms,large amounts of computation,and speed *** addition,this survey summarizes most of the currently available methods,conducts some comparative experiments,discusses the results,and investigates the novel directions in LF depth estimation.
With the emergence of 5G mobile multimedia services,end users’demand for high-speed,low-latency mobile communication network access is *** them,the device-to-device(D2D)communication is one of the considerable *** D2...
详细信息
With the emergence of 5G mobile multimedia services,end users’demand for high-speed,low-latency mobile communication network access is *** them,the device-to-device(D2D)communication is one of the considerable *** D2D communication,the data does not need to be relayed and forwarded by the base station,but under the control of the base station,a direct local link is allowed between two adjacent mobile *** flexible communicationmode reduces the processing bottlenecks and coverage blind spots of the base station,and can be widely used in dense user communication scenarios such as heterogeneous ultra-dense wireless *** of the important factors which affects the quality-of-service(QoS)of D2D communications is co-channel *** order to solve this problem of co-channel interference,this paper proposes a graph coloring based *** main idea is to utilize the weighted priority of spectrum resources and enables multiple D2D users to reuse the single cellular user *** proposed algorithm also provides simpler power *** heterogeneous pattern of interference is determined using different types of interferences and UE and the priority of color is *** results show that the proposed algorithm effectively reduced the co-channel interference,power consumption and improved the system throughput as compared with existing algorithms.
暂无评论