Device-to-Device (D2D) communication is critical in many public safety scenarios where access to network infrastructure is not guaranteed. In such out-of-coverage situations, random resource allocation is a straightfo...
详细信息
In recent times, appropriate decision-making in challenging and critical situations has been very well supported by multicriteria decision-making (MCDM) methods. The technique for order of preference by similarity to ...
详细信息
The transition towards Industry 4.0 is taking place nowadays, with fundamental technologies such as CPSs (Cyber-Physical System) and Digital Twins enabling it. For this, a variety of maturity models have been presente...
详细信息
Wireless data communications are always facing the risk of eavesdropping and interception. Conventional protection solutions which are based on encryption may not always be practical as is the case for wireless IoT ne...
详细信息
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ...
详细信息
Efficient message dissemination in Vehicular Ad Hoc Networks (VANETs) relies on robust connectivity between neighboring vehicular nodes, yet it is often compromised by malicious intruders. While recent literature prop...
详细信息
Due to the global pandemic that was experienced in 2020, the Small and Medium Enterprises (SMEs) sector in Peru chose to store all their information in cloud services. However, a 2021 Kaspersky study indicates that SM...
详细信息
The district of San Juan de Lurigancho (SJL) in Lima—Peru, is one of the districts crowed in the capital and has one of the highest amounts solid domestic wastes. To fix this problem, a model was developed to map the...
详细信息
In this modern era, traffic congestion has become a major source of negative economic and environmental impact for urban areas worldwide. One of the most efficient ways to mitigate this issue is through traffic predic...
详细信息
With the exponential growth of IoT devices, ensuring efficient and accurate network anomaly detection in resource-constrained environments has become a pressing challenge. A lightweight dual distillation approach is p...
详细信息
暂无评论