This paper reviews the use of Minikube in multi-node mode to work with the ETSI MEC Sandbox as a lightweight multi-access edge computing platform simulator (LWMECPS). The work included a comparative analysis of MEC pl...
详细信息
The rapid proliferation of Internet of Things (IoT) systems, encompassing a wide range of devices and sensors with limited battery life, has highlighted the critical need for energy-efficient solutions to extend the o...
详细信息
ISBN:
(数字)9798350387025
ISBN:
(纸本)9798350387032
The rapid proliferation of Internet of Things (IoT) systems, encompassing a wide range of devices and sensors with limited battery life, has highlighted the critical need for energy-efficient solutions to extend the operational lifespan of these battery-powered *** effective strategy for reducing energy consumption is minimizing the number and size of retransmitted packets in case of communication errors. Among the potential solutions, Incremental Redundancy Hybrid Automatic Repeat reQuest (IR-HARQ) communication schemes have emerged as particularly compelling options by adopting the best aspects of error control, namely, automatic repetition and variable *** work addresses the challenge by developing a simulator capable of executing and analysing several (H)ARQ schemes using different channel models, such as the Additive White Gaussian Noise (AWGN) and Gilbert-Elliott (GE) models. The primary objective is to compare their performance across multiple metrics, enabling a thorough evaluation of their *** results indicate that IR-HARQ outperforms alternative methods, especially in the presence of burst errors. Furthermore, its potential for further adaptation and enhancement opens up new ways for optimizing energy consumption and extending the lifespan of battery-powered IoT devices.
Tetun is one of Timor-Leste’s official languages alongside Portuguese. It is a low-resource language with over 932,400 speakers that started developing when Timor-Leste restored its independence in 2002. The media ma...
详细信息
Wilga 2022 Summer Symposium on Photonics Applications and Web engineering was the 50th edition of the research and technical meetings series. Traditionally, the whole week lasting annual series of technical conference...
详细信息
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research *** main challenges faced by researchers are how to hid...
详细信息
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research *** main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital *** this paper,an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on theArabic text transmitted online via an Internet *** this purpose,the accuracy of tampering detection and watermark robustness has been improved of the proposed method as compared with the existing *** the proposed method,both embedding and extracting of the watermark are logically implemented,which causes no change in the digital *** is achieved by using the third level and alphanumeric strategy of the Markov model as a text analysis technique for analyzing the Arabic contents to obtain its features which are considered as the digital *** digital watermark will be used later to detecting any tampering of illegal attack on the received Arabic *** extensive set of experiments using four data sets of varying lengths proves the effectiveness of our approach in terms of detection accuracy,robustness,and effectiveness under multiple random locations of the common tampering attacks.
The rapid increase in employing smart Internet of Things $(\text{IoT})$ systems in different domains, including critical national infrastructure and vital services has raised the need for robust security measures, e...
详细信息
ISBN:
(数字)9798350378511
ISBN:
(纸本)9798350378528
The rapid increase in employing smart Internet of Things
$(\text{IoT})$
systems in different domains, including critical national infrastructure and vital services has raised the need for robust security measures, especially against physical fault injection attacks. These attacks, involving techniques like voltage glitches and electromagnetic interference, can disrupt device operations, leading to unauthorized access, data extraction, or the disabling of security features, introducing a significant threat to the integrity and reliability of critical IoT-based applications. This paper proposes a novel framework for assessing the security of
$\text{IoT}$
devices against fault injection attacks. The framework employs multiple techniques, specifically voltage and electromagnetic attacks, to evaluate system resilience by targeting different fault models such as instruction skipping and bypassing security features. It is designed to be extensible for future fault models and microcontroller targets in the future. The framework is validated on the NXP LPC1343 microcontroller, demonstrating its effectiveness in bypassing debug interface protection. This framework enables systematic evaluation of
$\text{IoT}$
device robustness, helping identify vulnerabilities and develop more effective countermeasures to enhance the security of embedded systems and
$\text{IoT}$
devices.
Cellular automata can simulate many complex physical phenomena using the power of simple rules. The presented methodological platform expresses the concept of programmable matter in which Newton’s laws of motion are ...
详细信息
Load balancing is a technique for identifying overloaded and underloaded nodes and balancing the load between *** maximize various performance parameters in cloud computing,researchers suggested various load balancing...
详细信息
Load balancing is a technique for identifying overloaded and underloaded nodes and balancing the load between *** maximize various performance parameters in cloud computing,researchers suggested various load balancing *** store and access data and services provided by the different service providers through the network over different regions,cloud computing is one of the latest technology systems for both end-users and service *** volume of data is increasing due to the pandemic and a significant increase in usage of the internet has also been *** of the cloud are looking for services that are intelligent,and,can balance the traffic load by service providers,resulting in seamless and uninterrupted *** types of algorithms and techniques are available that can manage the load balancing in the cloud *** this paper,a newly proposed method for load balancing in cloud computing at the database level is *** database cloud services are frequently employed by companies of all sizes,for application development and business *** balancing for distributed applications can be used to maintain an efficient task scheduling process that also meets the user requirements and improves resource *** balancing is the process of distributing the load on various nodes to ensure that no single node is *** avoid the nodes from being overloaded,the load balancer divides an equal amount of computing time to all *** results of two different scenarios showed the cross-region traffic management and significant growth in revenue of restaurants by using load balancer decisions on application traffic gateways.
Linear projects are a special type of repetitive projects. When critical path method (CPM) was used to analyze linear projects, it showed major disadvantages;so, to overcome these shortcomings linear scheduling method...
详细信息
作者:
de Jesus, GabrielNunes, SérgioINESC TEC
Institute for Systems and Computer Engineering Technology and Science Portugal FEUP
Faculty of Engineering University of Porto Portugal
The Cranfield paradigm has served as a foundational approach for developing test collections, with relevance judgments typically conducted by human assessors. However, the emergence of large language models (LLMs) has...
详细信息
暂无评论