The development of blockchain has allowed for the development of new concepts and ideas. A completely immutable ledger might not be appropriate for all new applications that are being envisaged for the blockchain. One...
详细信息
Systematic management of all phases of the lifecycle of an industrial control system, recently referred to as operational technology or OT for short, ensures that the system is up to date, compliant with regulations a...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Inte...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Internet of Things(IoT)connects numerous devices to the Internet,enabling autonomous interactions with minimal human ***,implementing and managing an SDN-IoT system is inherently complex,particularly for those with limited resources,as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN *** findings of this study underscore the primary security and privacy challenges across application,control,and data planes.A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy *** investigations have explored cutting-edge methods,such as leveraging blockchain for transaction recording to enhance security and privacy,along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service(DoS)and Distributed DoS(DDoS)***,the analysis indicates that encryption and hashing techniques are prevalent in the data plane,whereas access control and certificate authorization are prominently considered in the control plane,and authentication is commonly employed within the application ***,this paper outlines future directions,offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.
The advent of the new industrial revolution has led to a surge in the number of self-driving and assisted-driving vehicles on the roads. Although this development enhances the overall quality of life, it also poses ne...
详细信息
Project-and Problem-Based Learning has been subject to research and implementation in engineering and computerscience curricula for about the last 20 years. However, the projects and problems focused on in education ...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical...
详细信息
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical images against impostors and *** this paper,an optical medical image security approach is *** is based on the optical bit-plane Jigsaw Transform(JT)and Fractional Fourier Transform(FFT).Different kernels with a lone lens and a single arbitrary phase code are exploited in this security approach.A preceding bit-plane scrambling process is conducted on the input color medical images prior to the JT and FFT processes to accomplish a tremendous level of robustness and *** confirm the efficiency of the suggested security approach for secure color medical image communication,various assessments on different color medical images are examined based on different statistical security ***,a comparative analysis is introduced between the suggested security approach and other conventional cryptography *** simulation outcomes acquired for performance assessment demonstrate that the suggested security approach is highly *** has excellent encryption/decryption performance and superior security results compared to conventional cryptography approaches with achieving recommended values of average entropy and correlation coefficient of 7.63 and 0.0103 for encrypted images.
Pulsed electromagnetic (EM) field signal transfer from a general EM source distribution to a transmission line (TL) is analyzed with the aid of Lorentz's reciprocity theorem. In this fashion, the transient voltage...
详细信息
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with...
详细信息
作者:
Anwar, AymanKhalifa, YassinLucatorto, ErinCoyle, James L.Sejdic, ErvinUniversity of Toronto
Faculty of Applied Science & Engineering Department of Electrical and Computer Engineering TorontoON Canada University of Pittsburgh
Center for Research Computing and Information Technology Analytics PittsburghPA United States Cairo University
Faculty of Engineering Systems and Biomedical Engineering Department Giza Egypt University of Pittsburgh
School of Health and Rehabilitation Sciences Department of Communication Science and Disorders PittsburghPA United States University of Toronto
North York General Hospital Faculty of Applied Science & Engineering Department of Electrical and Computer Engineering TorontoON Canada
Swallowing assessment is a crucial task to reveal swallowing abnormalities. There are multiple modalities to analyze swallowing kinematics, such as videofluoroscopic swallow studies (VFSS), which is the gold standard ...
详细信息
Bremsstrahlung—the spontaneous emission of broadband radiation from free electrons that are deflected by atomic nuclei—contributes to the majority of X-rays emitted from X-ray tubes and used in applications ranging ...
详细信息
Bremsstrahlung—the spontaneous emission of broadband radiation from free electrons that are deflected by atomic nuclei—contributes to the majority of X-rays emitted from X-ray tubes and used in applications ranging from medical imaging to semiconductor chip ***,we show that the bremsstrahlung intensity can be enhanced significantly—by more than three orders of magnitude—through shaping the electron wavefunction to periodically overlap with atoms in crystalline ***,we show how to shape the bremsstrahlung X-ray emission pattern into arbitrary angular emission profiles for purposes such as unidirectionality and ***,we find that these enhancements and shaped emission profiles cannot be attributed solely to the spatial overlap between the electron probability distribution and the atomic centers,as predicted by the paraxial and nonrecoil theory for free electron light *** work highlights an unprecedented regime of free electron light emission where electron waveshaping provides multi-dimensional control over practical radiation processes like *** results pave the way towards greater versatility in table-top X-ray sources and improved fundamental understanding of quantum electron-light interactions.
暂无评论