The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, I...
详细信息
The Internet of Things (IoT) is a large-scale network of devices capable of sensing, data processing, and communicating with each other through different communication protocols. In today's technology ecosystem, IoT interacts with many application areas such as smart city, smart building, security, traffic, remote monitoring, health, energy, disaster, agriculture, industry. The IoT network in these scenarios comprises tiny devices, gateways, and cloud platforms. An IoT network is able to keep these fundamental components in transmission under many conditions with lightweight communication protocols taking into account the limited hardware features (memory, processor, energy, etc.) of tiny devices. These lightweight communication protocols affect the network traffic, reliability, bandwidth, and energy consumption of the IoT application. Therefore, determining the most proper communication protocol for application developers emerges as an important engineering problem. This paper presents a straightforward overview of the lightweight communication protocols, technological advancements in application layer for the IoT ecosystem. The survey then analyzes various recent lightweight communication protocols and reviews their strengths and limitations. In addition, the paper explains the experimental comparison of Constrained Applications Protocol (CoAP), Message Queuing Telemetry (MQTT), and WebSocket protocols, more convenient for tiny IoT devices. Finally, we discuss future research directions of communication protocols for IoT.
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a...
详细信息
The malfunctioning of cardiac autonomic control in epileptic patients develops ventricular tachyarrhythmia and causes sudden unexpected death in epilepsy patients (SUDEP). Various clinical studies investigated the eff...
详细信息
The malfunctioning of cardiac autonomic control in epileptic patients develops ventricular tachyarrhythmia and causes sudden unexpected death in epilepsy patients (SUDEP). Various clinical studies investigated the effect of epilepsy on cardiac autonomic control by performing heart rate variability (HRV) analysis;however, results are unclear regarding whether sympathetic, parasympathetic, or both branches of the autonomic nervous system (ANS) are affected in epilepsy and also the impact of anticonvulsant treatment on the ANS. This study follows the systematic protocols to investigate epilepsy and its anticonvulsant treatment on cardiac autonomic control by using linear and nonlinear HRV analysis measures. The electronic databases of PubMed, Embase, and Cochrane Library were used for the collection of studies. Initially, 1475 articles were identified whereas after 2-staged exclusion criteria, 33 studies were selected for execution of the review process and meta-analysis. For meta-analysis, four comparisons were performed (epilepsy patients): (1) controls (healthy subject with no history of epilepsy) versus untreated patients;(2) treated (patients under treatment that have a seizure) versus untreated patients;(3) controls versus treated patients;and (4) refractory versus well-controlled (epilepsy patients that were seizure-free for last 1 year). For treated and untreated patients, there was no significant difference whereas well-controlled patients presented higher values as compared to refractory patients. Meta-analysis was performed for the time-domain, frequency-domain, and nonlinear parameters. Untreated patients in comparison with controls presented significantly lower HF (high-frequency) and LF (low-frequency) values. These LF (g = − 0.9;95% CI − 1.48 to − 0.37) and HF (g = − 0.69;95% confidence interval (CI) − 1.24 to − 0.16) values were affirming suppressed both, vagal and sympathetic activity, respectively. Additionally, LF and HF value was increased in most o
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS...
详细信息
ISBN:
(纸本)9798331508692
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS) face several issues, including data privacy concerns and high-power consumption due to centralized data processing. These challenges increase the risks of unauthorized access, data breaches, and privacy violations, undermining user trust and compliance with privacy regulations. Additionally, the centralization of data and processing leads to higher power consumption, making these systems less sustainable for widespread deployment in smart cities. This research addresses these issues by proposing a Federated Learning (FL)based intrusion detection framework for smart cities. FL enables collaborative and privacy-preserving model training across distributed IoT devices, mitigating the need to share sensitive data centrally. By aggregating local model updates, FL ensures data privacy and distributes the computational workload, significantly reducing power consumption compared to traditional centralized systems. The proposed model leverages advanced AI techniques and is trained using the IoTID20 dataset. The Flower framework, utilizing the FedAvg algorithm, facilitates the federated learning process. Our experimental results demonstrate that the global model achieves 98% accuracy, with individual clients achieving accuracies of around 85% to 98%. This approach provides continuous learning mechanisms, anomaly detection, and ensemble learning capabilities, enhancing the resilience of federated intrusion detection systems against emerging threats and adversarial attacks. This research systematically investigates the application of federated learning for intrusion detection in smart city networks, addressing key challenges and advancing the state-of-the-art in decentralized cybersecurity solutions. The proposed framework offers a robust, scalable, and privacyco
Sri Lankan students, especially those from rural and low-income backgrounds, face significant challenges in accessing higher education, including university applications, career planning, and financial aid. This resea...
详细信息
Protein-protein interactions (PPI) are essential in keeping the cells functioning properly. Identifying PPI binding sites is a fundamental problem in system Biology, and it contributes to a better understanding of low...
详细信息
Large Language Models(LLMs) have become widely recognized in recent years for their exceptional performance in language generation capabilities. As a result, an unprecedented rise is seen in its use cases in various d...
详细信息
ISBN:
(纸本)9798331508692
Large Language Models(LLMs) have become widely recognized in recent years for their exceptional performance in language generation capabilities. As a result, an unprecedented rise is seen in its use cases in various domains specifically involving Natural Language Processing(NLP). These models however perform suboptimally when exploited in the field of studies where authenticity of the generated content is a critical aspect. One such domain is usage of LLM for exploration of the life of Prophet Muhammad S.A.W(commonly referred to as Seerah). It is of utmost significance to ensure the authenticity and reliability in the sources used and reported by the LLM due to the sensitive nature of the domain. The contemporary LLMs, however, lack the explainability in their response due to their inherent black-box nature. In our study, we have presented a novel LLM named SeerahGPT that addresses this challenge with the help of retrieval-augmented generation (RAG). This technique enables the model to utilize both parametric and nonparametric memories for generating response of queries. Our model, built on the Llama-2-7b architecture, employs Sentence Transformer embedding to effectively retrieve relevant information. The model's capabilities are augmented by integrating it with a corpus having Islamic texts such as the Quranic translation and Hadith collections, and historical accounts. The model's performance is benchmarked against its base model using both quantitative and qualitative metrics. The comparative analysis with Llama-2-7b revealed that SeerahGPT incorporation with external knowledge sources, provided more authentic and verifiable responses, despite the others exhibiting greater fluency. Performance metrics such as BLEU, ROUGE, and METEOR indicated SeerahGPT's better accuracy and contextual handling. This study paves way for analysis of such sensitive domains in more efficient way that can be utilized in other complex domains such as Islamic theology and Fiqh or legal
Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definition...
详细信息
Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definitions could hardly reach universal *** than providing a formal definition of the Metaverse,we list four must-have characteristics of the Metaverse:socialization,immersive interaction,real world-building,and *** characteristics not only carve the Metaverse into a novel and fantastic digital world,but also make it suffer from all security/privacy risks,such as personal information leakage,eavesdropping,unauthorized access,phishing,data injection,broken authentication,insecure design,and *** paper first introduces the four characteristics,then the current progress and typical applications of the Metaverse are surveyed and categorized into four economic *** on the four characteristics and the findings of the current progress,the security and privacy issues in the Metaverse are *** then identify and discuss more potential critical security and privacy issues that can be caused by combining the four ***,the paper also raises some other concerns regarding society and humanity.
The perception of offensive language varies based on cultural, social, and individual perspectives. With the spread of social media, there has been an increase in offensive content online, necessitating advanced solut...
详细信息
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need...
详细信息
暂无评论