An Intrusion Detection System monitors the network for any malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
In Federated Learning (FL), devices that participate in the training usually have heterogeneous resources, i.e., energy availability. In current deployments of FL, devices that do not fulfill certain hardware requirem...
详细信息
Within the domain of image encryption, an intrinsic trade-off emerges between computational complexity and the integrity of data transmission security. Protecting digital images often requires extensive mathematical o...
详细信息
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in c...
详细信息
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,parti...
详细信息
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,particularly in the context of knowledge‐based learning *** healthcare systems leverage knowledge‐based learning to become more context‐aware,adaptable,and auditable while maintain-ing the ability to learn from historical *** smart healthcare systems,devices capture images,such as X‐rays,Magnetic Resonance *** security and integrity of these images are crucial for the databases used in knowledge‐based learning systems to foster structured decision‐making and enhance the learning abilities of ***,in knowledge‐driven systems,the storage and transmission of HD medical images exert a burden on the limited bandwidth of the communication channel,leading to data trans-mission *** address the security and latency concerns,this paper presents a lightweight medical image encryption scheme utilising bit‐plane decomposition and chaos *** results of the experiment yield entropy,energy,and correlation values of 7.999,0.0156,and 0.0001,*** validates the effectiveness of the encryption system proposed in this paper,which offers high‐quality encryption,a large key space,key sensitivity,and resistance to statistical attacks.
Over the past few years, blockchain technology has gained significant attention. This surge in popularity can be attributed to the emergence of cryptocurrencies and the development of smart contracts. Cryptocurrency i...
详细信息
Existing terramechanics-based dynamic models for tracked vehicles (TRVs) are widely used in dynamics analysis. However, these models are incompatible with model-based controller design due to their high complexity and...
详细信息
Existing terramechanics-based dynamic models for tracked vehicles (TRVs) are widely used in dynamics analysis. However, these models are incompatible with model-based controller design due to their high complexity and computational costs. This study presents a novel and simplified terramechanics-based dynamic model for TRVs that can be used in optimization-based real-time motion controller design. To this end, we approximated the track-ground interactions with an averaged term of the track-ground shear stresses to make the model computationally efficient and linearizable. By introducing the concepts of slip ratio and slip angle in the field of wheeled vehicles, the terramechanics-based dynamic model was finally simplified into a compact and practical single-track dynamic model reducing the demand for precise slip ratio measurements. The single-track model enables us to design an efficient motion control scheme by considering lateral and longitudinal dynamics separately. Finally, the proposed dynamic model was verified and validated under various road conditions using a real TRV. Additionally, the performance of different models was compared in simulation as an example to demonstrate that the proposed model outperforms the existing ones in TRV path-following tasks. IEEE
Remote intelligence in the application of robotics and the autonomous system relies heavily on seamless wireless connections. The 5G mobile network technology meets traditional manufacturing enterprises' applicati...
详细信息
Remote intelligence in the application of robotics and the autonomous system relies heavily on seamless wireless connections. The 5G mobile network technology meets traditional manufacturing enterprises' application requirements for wireless networks based on robot transformation and upgrading, robot interconnection, and remote interactive applications in production. However, there exists many challenging 5G communication issues, such as different communication protocols in the system varies with different robots and no dis-ruptive changes to the physical layer.
Unmanned aerial vehicles (UAVs) have garnered significant attention from the research community during the last decade, due to their diverse capabilities and potential applications. One of the most critical functions ...
详细信息
暂无评论