Previous studies have demonstrated the effectiveness of point-based neural models on the point cloud analysis task. However, there remains a crucial issue on producing the efficient input embedding for raw point coord...
详细信息
In the expanding field of the Internet of Things (IoT), wireless channel estimation is a significant challenge. This is specifically true for low-power IoT (LP-IoT) communication, where efficiency and accuracy are ext...
详细信息
The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and secu...
详细信息
ISBN:
(数字)9798350395914
ISBN:
(纸本)9798350395921
The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and security of data collected and transmitted by IoT devices, it is hazardous to assume that all LEAs are secure and exhibit similar levels of protection. To improve encryption strength, cryptanalysts and algorithm designers routinely probe LEAs using various cryptanalysis techniques to identify vulnerabilities and limitations of LEAs. Despite recent improvements in the efficiency of cryptanalysis utilising heuristic methods and a Partial Difference Distribution Table (PDDT), the process remains inefficient, with the random nature of the heuristic inhibiting reproducible results. However, the use of a PDDT presents opportunities to identify relationships between differentials utilising knowledge graphs, leading to the identification of efficient paths throughout the PDDT. This paper introduces the novel use of knowledge graphs to identify intricate relationships between differentials in the SIMON LEA, allowing for the identification of optimal paths throughout the differentials, and increasing the effectiveness of the differential security analyses of SIMON.
The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and secu...
详细信息
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which ...
详细信息
In the rapidly growing development of the Internet of Things (IoT) infrastructure, achieving reliable wireless communication is a challenge. IoT devices operate in diverse environments with common signal interference ...
详细信息
Given the increasing number of elderly individuals, it's essential to implement multi-device monitoring to keep a record of older adults' Activities of Daily Living (ADL). This approach is crucial for supporti...
详细信息
Given the increasing number of elderly individuals, it's essential to implement multi-device monitoring to keep a record of older adults' Activities of Daily Living (ADL). This approach is crucial for supporting independent living and early detection of mental disorders such as depression and Alzheimer's disease. Early signs of these disorders can be identified through deviations in standard behaviour patterns, including reduced attention to personal hygiene, changes in sleep habits, and a decline in social engagement. However, these deviations (also known as anomalies) are often subtle and challenging to detect. The use of non-intrusive monitoring devices, in particular, poses the risk of generating false positives or overlooking significant signs due to the limitations of anomaly detectors. This issue may deter caregivers from adopting these technological solutions. Besides, the definition of an anomaly depends on the individual's situation, requiring approaches that can adapt to unique cases. Existing anomaly detection techniques, which mainly utilise traditional Machine Learning (ML) and Deep Learning (DL) models, face two significant challenges: (i) the lack of complete ground truth data since activities are recorded over time, and (ii) the restricted memory capacity, which limits the amount of ADL data that can be stored for model training. Additionally, these methods can only classify an activity as normal or abnormal without providing further details about the nature of the anomaly, such as disruptions in sleep patterns or personal hygiene, nor can they explain the underlying factors of the anomaly. To address these challenges, this paper introduces an incremental learning system named the Adaptive Learning system for Detecting unusual behaviour of older adults, abbreviated as LeaD. Our proposed method employs an existing methodology to facilitate incremental learning, enabling it to accommodate new anomalies by leveraging past data. LeaD incorporates user f
The development of low-cost sensor networks (LCSNs) has facilitated the generation of vast amounts of environmental monitoring data in air quality monitoring stations. State-of-the-art research has focused on developi...
详细信息
The present study utilizes the support vector regression (SVR) technique with a cubic kernel to forecast the performance of a double-pipe heat exchanger using T-W tape inserts with wing-width ratios of 0.31, 0.47, and...
详细信息
This study explores the limitations of traditional Cybersecurity Awareness and Training (CSAT) programs and proposes an innovative solution using Generative Pre-Trained Transformers (GPT) to address these shortcomings...
详细信息
暂无评论