Remote keyless entry (RKE) systems have become a standard feature in modern vehicles, offering the convenience of wireless control. However, this convenience is accompanied by significant security vulnerabilities, par...
详细信息
Effective requirements gathering and management tools are key factors for sustainable smart cities. These tools enable stakeholders including government officials, private sector partners, and citizens to identify and...
详细信息
As much as they have positioned Android among the most widely used operating systems, Android applications have helped malware creators to break in and infect its devices. A long list of threats caused by downloaded a...
详细信息
In this paper, we present a novel deep learning model medical network (MedNetV3) developed for brain tumor detection. It incorporates advanced data augmentation techniques based on the MobileNetV3 architecture. MedNet...
详细信息
This paper presents an innovative Smart Traffic Light System designed to assess Emotional Expression in enclosed settings such as corporate offices and educational facilities. The system combines artificial intelligen...
详细信息
This paper proposes an innovative decision support system based on sentiment analysis, specifically designed for the transportation sector. The system employs an aspect-based sentiment analysis approach, which accurat...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
Stress is a significant concern in the work-place, as it contributes to 80% of workplace injuries, and medical professionals are particularly susceptible, especially during emergencies such as the Covid-19 outbreak. N...
详细信息
As e-Health systems become more widely used starting with COVID-19 pandemic, the amount of data they collect increases significantly. The volume, diversity, and unpredictability of patient data necessitate distinct st...
详细信息
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip...
详细信息
暂无评论