— Cloud architecture has become a valuable solution for different applications, such as big data analytics, due to its high-degree of availability, scalability and strategic value. However, there still remain challen...
详细信息
Recent research on vehicular cybersecurity has highlighted the known vulnerabilities and exploits that plague in-vehicular networks; in particular, the communication protocol governing the in-vehicular network, the Co...
详细信息
ISBN:
(数字)9781728167411
ISBN:
(纸本)9781728167428
Recent research on vehicular cybersecurity has highlighted the known vulnerabilities and exploits that plague in-vehicular networks; in particular, the communication protocol governing the in-vehicular network, the Control Area Network (CAN), has been a frequent and often fruitful target of related attacks. Accordingly, the focus of this project is to investigate the application of encryption algorithms to the in-vehicular network and evaluate the performance characteristics of said algorithms when used in this context. This current paper includes examination of a) the maximum acceptable latency based on the vehicular requirements as well as b) the latency in communication when employing various encryption algorithms. In Hardware-In-the-Loop (HIL) simulations, our work suggests that in-vehicular networks can absorb the latencies introduced by select encryption approaches and still satisfy the real-time requirements needed by the intra-vehicular communication system to avoid collisions and the like.
We investigate the temporal and spatial scales of resistance fluctuations (R-fluctuations) at the superconducting resistive transition accessed through voltage fluctuations measurements in thin epitaxial TiN films. Th...
详细信息
Location sharing applications are becoming increasingly common. These applications allow users to share their own locations and view contacts’ current locations on a map. Location applications are commonly used by fr...
详细信息
Prevalence of social media has driven a growing number of health related applications with the information shared by online users. It is well known that a gap exists between healthcare professionals and laypeople in e...
详细信息
This paper presents an advanced fuzzy C-means(FCM) clustering algorithm to overcome the weakness of the traditional FCM algorithm, including the instability of random selecting of initial center and the limitation of ...
详细信息
This paper presents an advanced fuzzy C-means(FCM) clustering algorithm to overcome the weakness of the traditional FCM algorithm, including the instability of random selecting of initial center and the limitation of the data separation or the size of clusters. The advanced FCM algorithm combines the distance with density and improves the objective function so that the performance of the algorithm can be improved. The experimental results show that the proposed FCM algorithm requires fewer iterations yet provides higher accuracy than the traditional FCM algorithm. The advanced algorithm is applied to the influence of stars' box-office data, and the classification accuracy of the first class stars achieves 92.625%.
Tunneling is a fundamental quantum process with no classical equivalent, which can compete with Coulomb interactions to give rise to complex phenomena. Phosphorus dopants in silicon can be placed with atomic precision...
详细信息
In this work, we introduce convolutional neural networks designed to predict and analyze damage patterns on a disk resulting from molecular dynamic (MD) collision simulations. The simulations under consideration are s...
详细信息
The recent emergence of gig economy facilitates the exchange of skilled labor by allowing workers to showcase and sell their skills to a global market. Despite the recent effort on thoroughly examining who workers in ...
详细信息
Social data from city level provides unprecedented opportunities to identify urban attributes from various angles. Citizens are likely to evaluate the quality of the neighborhood and make important decisions by their ...
详细信息
暂无评论