Data integrity becomes paramount as the number of Internet of Things (ioT) sensor deployments increases. Sensor data can be altered by benign causes or malicious actions. Mechanisms that detect drifts and irregulariti...
详细信息
Data integrity becomes paramount as the number of Internet of Things (ioT) sensor deployments increases. Sensor data can be altered by benign causes or malicious actions. Mechanisms that detect drifts and irregularities can prevent disruptions and data bias in the state of an IoT application. This paper presents LE3D, an ensemble framework of data drift estimators capable of detecting abnormal sensor behaviours. Working collaboratively with surrounding ioT devices, the type of drift (natural/abnormal) can also be identified and reported to the end-user. The proposed framework is a lightweight and unsupervised implementation able to run on resource-constrained IoT devices. Our framework is also generalisable, adapting to new sensor streams and environments with minimal online reconfiguration. We compare our method against state-of-the-art ensemble data drift detection frameworks, evaluating both the real-world detection accuracy as well as the resource utilisation of the implementation. Experimenting with real-world data and emulated drifts, we show the effectiveness of our method, which achieves up to 97% of detection accuracy while requiring minimal resources to run.
The building sector along with more and more inside or nearby-supplied EV mobility are a key pillar in the efforts of decarbonisation and achieving a Net Zero Emissions scenario by 2050 and even earlier. Without immed...
The building sector along with more and more inside or nearby-supplied EV mobility are a key pillar in the efforts of decarbonisation and achieving a Net Zero Emissions scenario by 2050 and even earlier. Without immediate action in the energy management and control automated systems, the building sector will not align with the decarbonisation goals. Energy management systems play a crucial role in managing energy usage and rely on forecasting algorithms and energy management schemes. A case study on a demo site pilot was conducted on the main building of the Faculty of Building engineering Services at the Technical University of Cluj-Napoca, Romania. The study aims to assess electrical energy consumption and bidirectional flows, and to identify key correlations between factors, using multilinear regression as well as consumption pattern identification. Two scenarios are proposed and assessed.
The cloud computing adoption in e-health has improved health services and research. An e-health cloud deployment model for Indonesia have been proposed. In this work, we simulated the e-health cloud model and implemen...
详细信息
ISBN:
(纸本)9781665493970
The cloud computing adoption in e-health has improved health services and research. An e-health cloud deployment model for Indonesia have been proposed. In this work, we simulated the e-health cloud model and implemented virtual firewalls to enhance its security. We examined the performance of the firewalls under a distributed denial of service (DDoS) attacks. The virtualization environment for the cloud utilized Proxmox VE, and the firewalls applied a modified ConfigServer & Firewall (CSF). DDoS-blocking scripts are modified to block IPs from attackers. First, we investigated the cloud without virtual firewalls. The average time a server could survive a DDoS attack is examined. Second, the virtual firewall capability is verified. The result shows that the average time of a server surviving a DDoS attack is 197.26 seconds, with a standard deviation is 52.99 seconds. The virtual firewall managed to block the attacker's IP address, and the server could cope a DDoS attack.
In the realm of data privacy, the ability to effectively anonymise text is paramount. With the proliferation of deep learning and, in particular, transformer architectures, there is a burgeoning interest in leveraging...
详细信息
ISBN:
(数字)9798350385427
ISBN:
(纸本)9798350385434
In the realm of data privacy, the ability to effectively anonymise text is paramount. With the proliferation of deep learning and, in particular, transformer architectures, there is a burgeoning interest in leveraging these advanced models for text anonymisation tasks. This paper presents a comprehensive benchmarking study comparing the performance of transformer-based models and Large Language Models(LLM) against traditional architectures for text anonymisation. Utilising the CoNLL-2003 dataset, known for its robustness and diversity, we evaluate several models. Our results showcase the strengths and weaknesses of each approach, offering a clear perspective on the efficacy of modern versus traditional methods. Notably, while modern models exhibit advanced capabilities in capturing contextual nuances, certain traditional architectures still keep high performance. This work aims to guide researchers in selecting the most suitable model for their anonymisation needs, while also shedding light on potential paths for future advancements in the field.
This paper presents the results of a study on modified transimpedance amplifier circuits aimed at expanding their functionality. Using SPICE simulations, the impact of varying reference voltages on the output signal o...
详细信息
ISBN:
(数字)9798331520564
ISBN:
(纸本)9798331520571
This paper presents the results of a study on modified transimpedance amplifier circuits aimed at expanding their functionality. Using SPICE simulations, the impact of varying reference voltages on the output signal of the amplifiers was analyzed, allowing for the isolation and quantitative evaluation of the contributions of the photodiode and photo resistive conversion mechanisms. The results demonstrate that the proposed modifications enable the acquisition of informative signals carrying information about the photodiode and photoresistive components of the photocurrent. Additionally, it was found that the modifications affect the stability of transient processes and the impedance characteristics of the amplifiers. Based on the conducted research, a method for in-situ diagnostics of organic structures with the selection of the photodiode and photoresistive components of organic photostructures has been developed.
This study clarifies the data error rates optimization for OFC/OWC channels based on different transmission codes. These codes that are namely multi bits/symbol digital pulse interval modulation (DPIM), multi bits/sym...
详细信息
Spectrum Sharing Data Falsification (SSDF) attacks can cause heavy performance degradation to Cognitive Radio (CR) based Internet of Battlefield Things (IoBT) networks. The challenge in such networks is to handle this...
详细信息
We demonstrate a wide gamut of color generation by large-scale, lithography-free, and environment-friendly plasmonic structures with a resolution of 100 urn for macroscopic color printing by utilizing femtosecond lase...
详细信息
This research aims to explore the application of deep learning in autonomous driving computer vision technology and its impact on improving system performance. By using advanced technologies such as convolutional neur...
详细信息
In this paper a detailed description of the design and implementation of a system capable of detecting various obstacles for wheelchairs is provided. This system is part of a larger project that its goal is to create ...
详细信息
暂无评论