In the evolving landscape of Sri Lanka's apparel industry, the predominance of manual methods in the pre-production phase necessitates innovative technological interventions to enhance efficiency. This research ex...
详细信息
Sentiment analysis plays a crucial role in natural language processing, particularly in evaluating user comments and extracting valuable insights for classification tasks. This analysis can significantly impact custom...
详细信息
Introducing the emerging serverless paradigm into edge computing could avoid over- and under-provisioning of limited edge resources and make complex edge resource management transparent to application developers, whic...
详细信息
The Internet of Things is a network of physical objects like sensors, actuators, and software. The purpose of connecting is to exchange data with other objects and systems over the internet, enabling us to enhance dat...
详细信息
ISBN:
(纸本)9781450397063
The Internet of Things is a network of physical objects like sensors, actuators, and software. The purpose of connecting is to exchange data with other objects and systems over the internet, enabling us to enhance data collection, minimize human efforts, save time, and make decisions. Secure that network is the most important IoT challenge, so we use ways to securely access all objects in the IoT network that are known with IoT authentication. Most of the attacks come from plain security problems, for example, the weakness of passwords, these techniques have some disadvantages; Password depends on user memory, and most people use default password which is vulnerable to attacks. This paper compares different IoT authentication schemes. Also, present an analysis of the different generation One Time Password (OTP) schemes like Lamport OTP, Elliptic Curve, and HOTP. The paper provides a simple light model using OTP-based MBTS KHF (Moataz, Basheer, Tarek, Salwa keyed hashing function). our model achieves high-level security with a very shorter key size and solves key size and key store problems than the other algorithms. Also, the paper model prevents users from initializing multiple connections for authentication to prevent attackers from guessing OTP.
Virtual Reality (VR) and Augmented Reality (AR) have witnessed a surge in popularity, revolutionizing various industries and enhancing user experiences. As these technologies continue to evolve, ensuring secure user i...
详细信息
ISBN:
(数字)9798350367942
ISBN:
(纸本)9798350367959
Virtual Reality (VR) and Augmented Reality (AR) have witnessed a surge in popularity, revolutionizing various industries and enhancing user experiences. As these technologies continue to evolve, ensuring secure user identification becomes increasingly important. However, existing identification methods often come with vulnerabilities or require costly hardware implementations. To address these challenges, we propose a novel semi-biometric information-based user identification approach leveraging multimodal techniques. By analyzing the user’s viewing patterns and gaze behavior in the runtime, we can accurately identify individuals. This approach offers a promising solution for seamless user identification in VR and AR applications, without compromising on user experience or requiring expensive hardware modifications. To verify the efficiency of our proposed algorithm, we test our algorithm using a public dataset, the result of which shows a high classification accuracy. Additionally, beyond traditional evaluation metrics, we perform a transferability test, demonstrating the adaptability of our solution to new scenarios with robust generality.
In cricket training, preventing injuries and developing skills are of utmost importance, especially concerning the school cricketers. This research presents a web application, 'CricBoost' which would serve to ...
详细信息
software defect prediction is the methodical process of identifying code segments that are likely to have problems. This is done by analyzing software metrics and using categorization algorithms. This work introduces ...
详细信息
Estimation of depth map plays a key role in a number of computer vision applications. Shape from focus is a monocular approach that uses image focus as a cue to reconstruct 3D shapes. In the literature, a variety of g...
详细信息
Incorporating an active reconfigurable intelligent surface on an autonomous aerial vehicles (AAVs), denoted as an aerial reconfigurable intelligent surface (ARIS), introduces a novel dimension for secure transmissions...
详细信息
The adoption of automation in software testing presents challenges that can hinder its effectiveness and scalability. This study systematically investigates these challenges using a multi-phase research approach. Firs...
详细信息
暂无评论