Showing 201 - 218 results of 218 for search '"Tampere"', query time: 0.04s Refine Results
  1. 201

    Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-01-01
    “…Yet, decentralization introduces security vulnerabilities, including spoofing, tampering, and denial-of-service attacks, which can compromise the reliability and safety of vehicular communications. …”
    Get full text
    Article
  2. 202

    Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources by Jianpeng Zhang

    Published 2021-01-01
    “…This paper sorts according to the value of the Internet information security model, obtains the optimal model to avoid human tampering, and designs the information resource acquisition process to ensure the reliability of the source data. …”
    Get full text
    Article
  3. 203

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. …”
    Get full text
    Article
  4. 204

    Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data by Youssra Cheriguene, Wael Jaafar, Halim Yanikomeroglu, Chaker Abdelaziz Kerrache

    Published 2024-01-01
    “…Indeed, FL can be targeted by poisoning attacks, in which malicious UAVs upload poisonous local models to the FL server, by either providing targeted false predictions for specifically chosen inputs or by compromising the global model's accuracy through tampering with the local model. Hence, we propose in this article a novel client selection scheme that enhances convergence by prioritizing fast UAVs with high-reliability scores, while eliminating malicious UAVs from training. …”
    Get full text
    Article
  5. 205

    Is there a risk of esketamine misuse in clinical practice? by Carlos Roncero, Milton Merizalde-Torres, Néstor Szerman, Marta Torrens, Pablo Vega, Pilar Andres-Olivera, Francisco Javier Álvarez

    Published 2025-01-01
    “…More importantly, no register of illicit acquisition of esketamine or its tampering for obtaining ketamine or other altered products was found in our search. …”
    Get full text
    Article
  6. 206

    Dual medical image watermarking using SRU-enhanced network and EICC chaotic map by Fei Yan, Zeqian Wang, Kaoru Hirota

    Published 2024-12-01
    “…In this study, a dual watermarking scheme based on SRU-ConvNeXt V2 (SCNeXt) model and exponential iterative-cubic-cosine (EICC) chaotic map is proposed for medical image integrity verification, tamper localization, and copyright protection. A logo image for integrity verification is embedded into the region of interest within the medical image, and a text image containing copyright information is combined with the feature vectors extracted by SCNeXt for generating zero-watermark information. …”
    Get full text
    Article
  7. 207

    A literature review on transformative impacts of blockchain technology on manufacturing management and industrial engineering practices by Dharmendra Hariyani, Poonam Hariyani, Sanjeev Mishra, Milind Kumar Sharma

    Published 2025-07-01
    “…As business performance increasingly depends on decentralized, tamper-proof records to manage transactions and data flows, adopting blockchain technology (BCT) is becoming crucial for remaining competitive in the digital and globalized economy. …”
    Get full text
    Article
  8. 208

    Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment by Mimouna Abdullah Alkhonaini, Manal Abdullah Alohali, Mohammed Aljebreen, Majdy M. Eltahir, Meshari H. Alanazi, Ayman Yafoz, Raed Alsini, Alaa O. Khadidos

    Published 2025-01-01
    “…Blockchain (BC) aided intrusion detection from IoT platforms provides many benefits, including better data integrity, transparency, and resistance to tampering. This paper projects a novel sandpiper optimizer with hybrid deep learning-based intrusion detection (SPOHDL-ID) from the BC-assisted IoT platform. …”
    Get full text
    Article
  9. 209

    Research on Public Administration and Resource Allocation Based on Blockchain and Structured Occupational Therapy by Qiyou Zhu

    Published 2022-01-01
    “…In the original trust system of resource allocation, the blockchain and structured occupational therapy realizes the reconstruction of the trust system by preventing information tampering, using information encryption technology, and using information traceability technology. …”
    Get full text
    Article
  10. 210

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. …”
    Get full text
    Article
  11. 211

    Enhancing Digital Identity and Access Control in Event Management Systems Using Sui Blockchain by Suthir Sriram, P. R. Tharaniesh, Priyanka Saraf, Nivethitha Vijayaraj, Thangavel Murugan

    Published 2025-01-01
    “…The proposed system incorporates several innovative features: Tickets to the System: Utilizing the concept of NFT, the system guarantees that each ticket is unique, is tamper proof and cannot be forged. It also ensures the validity of tickets and at the same time ensures that the ticket is transferable back and forth while the ownership of the ticket is wholly and clearly disclosed. zkLogin for Seamless User Authentication: zkLogin is then implemented in the platform to ensure users can be authenticated in a Privacy-Preserving manner while at the same time having High Security. …”
    Get full text
    Article
  12. 212

    A multi-model feature fusion based transfer learning with heuristic search for copy-move video forgery detection by Hessa Alfraihi, Muhammad Swaileh A. Alzaidi, Hamed Alqahtani, Abdulbasit A. Darem, Ali M. Al-Sharafi, Ahmad A. Alzahrani, Menwa Alshammeri, Abdulwhab Alkharashi

    Published 2025-02-01
    “…Next, the ECMVFD-FTLTDO technique employs a fusion-based transfer learning (TL) process comprising three models: ResNet50, MobileNetV3, and EfficientNetB7 to capture diverse spatial features across various scales, thereby enhancing the capability of the model to distinguish authentic content from tampered regions. The ECMVFD-FTLTDO approach utilizes an Elman recurrent neural network (ERNN) classifier for the detection process. …”
    Get full text
    Article
  13. 213

    Smart blockchain-powered natural resource asset management and ecological governance countermeasures by Wende Huang, Yuan Han, Qiang Gu, Xiaolong Han, Tiansheng Gao

    Published 2025-01-01
    “…Firstly, the necessity and feasibility of blockchain empowering resource-based urban ecological governance are analyzed, demonstrating its unique potential in addressing traditional governance challenges through decentralization, transparency, and tamper resistance. Secondly, a framework for natural resource management services based on blockchain is constructed, offering new technological support for ecological governance. …”
    Get full text
    Article
  14. 214

    Enhancing privacy and traceability of public health insurance claim system using blockchain technology by Andry Alamsyah, I. Putu Sadhu Setiawan

    Published 2025-02-01
    “…The system’s layered design and use of smart contracts guarantee transparent, tamper-proof record-keeping, while parallelized processes in the logical architecture streamline claims handling. …”
    Get full text
    Article
  15. 215

    Implementasi Teknik Enkripsi dan Dekripsi dI File Video Menggunakan Algoritma Blowfish by Nuniek Fahriani, Harunur Rosyid

    Published 2019-12-01
    “…This type of data in the form of files that have the potential to be "tampered" illegally not only with the .doc extension can be the file type with the video file extension. …”
    Get full text
    Article
  16. 216

    Impact of road infrastructure equipment on the environment and surroundings by N. Robinah, A. Safiki, O. Thomas, B. Annette

    Published 2022-04-01
    “…The emissions of carbon dioxide, carbon monoxide, nitrogen dioxide, hydrocarbons, and particulate matter were analyzed.METHODS: Six road infrastructure equipment were sampled consisting of an excavator, roller, grader, concrete mixer, tamper, and wheel loader, obtained from a case study project in Kampala city, Uganda. …”
    Get full text
    Article
  17. 217

    Yoruba Epistemology, Art, Language and the Universe of Meanings: A Meta-Analysis by Michael O. Afolayan

    Published 2021-12-01
    “…The corollary is that such attempt will of necessity tamper with the sacred epistemological authenticity of the language-art-culture continuum. …”
    Get full text
    Article
  18. 218

    Blockchain-Based Value-Added Tax System: A Systematic Review by Vahideh Ghanooni Shishavan, Shaban Elahi, Sadegh Dorri Nogoorani, Ali Yazdian Varjani

    Published 2024-06-01
    “…By identifying existing challenges in electronic invoices, such as transaction forgery, the long process of issuing electronic invoices, and hacking of the central database, blockchain technology, with its features like decentralization, tamper-proofness, transparency, and automation, emerges as a suitable solution. …”
    Get full text
    Article