Showing 801 - 820 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))', query time: 0.16s Refine Results
  1. 801

    CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES by Petro Klimushyn, Tetiana Solianyk, Oleksandr Mozhaiev, Yurii Gnusov, Oleksandr Manzhai, Vitaliy Svitlychny

    Published 2022-06-01
    “…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
    Get full text
    Article
  2. 802
  3. 803

    A hybrid data-driven method for voltage state prediction and fault warning of Li-ion batteries by Yufeng Huang, Xuejian Gong, Zhiyu Lin, Lei Xu

    Published 2024-12-01
    “…As the extensive application of electrochemical energy storage (EES), Li-ion battery fault is a key factor reference to the reliable operation and system security, influencing by the environment temperature and battery voltage. …”
    Get full text
    Article
  4. 804

    Through-wall Human Pose Reconstruction and Action Recognition Using Four-dimensional Imaging Radar by Rui ZHANG, Hanqin GONG, Ruiyuan SONG, Yadong LI, Zhi LU, Dongheng ZHANG, Yang HU, Yan CHEN

    Published 2025-02-01
    “…Through-wall human pose reconstruction and behavior recognition have enormous potential in fields like intelligent security and virtual reality. However, existing methods for through-wall human sensing often fail to adequately model four-Dimensional (4D) spatiotemporal features and overlook the influence of walls on signal quality. …”
    Get full text
    Article
  5. 805
  6. 806

    Improving internet of vehicles research: A systematic preprocessing framework for the VeReMi datasetZenodo by Aparup Roy, Debotosh Bhattacharjee, Ondrej Krejcar

    Published 2025-06-01
    “…The optimized dataset is well-suited for ITS and IoV applications, such as anomaly detection and network security, underscoring the crucial role of preprocessing in overcoming real-world constraints and enhancing model performance.…”
    Get full text
    Article
  7. 807

    Classification Model for Bot-IoT Attack Detection Using Correlation and Analysis of Variance by Firgiawan Faira, Dandy Pramana Hostiadi

    Published 2025-04-01
    “…Industry 4.0 requires secure networks as the advancements in IoT and AI exacerbate the challenges and vulnerabilities in data security. …”
    Get full text
    Article
  8. 808

    Survey of deep fake audio generation and detection techniques by ZENG Zhiping, ZHANG Xulong, QU Xiaoyang, XIAO Chunguang, WANG Jianzong

    Published 2025-01-01
    “…Subsequently, an in-depth analysis was conducted on both acoustic feature-based and end-to-end model-based fake audio detection strategies, delving into details such as deep acoustic feature detection, pre-trained neural network feature detection, end-to-end model optimization, generalization enhancement techniques, and the enhancement of real-time detection. …”
    Get full text
    Article
  9. 809

    InterAcT: A generic keypoints-based lightweight transformer model for recognition of human solo actions and interactions in aerial videos. by Mubashir Shah, Tahir Nawaz, Rab Nawaz, Nasir Rashid, Muhammad Osama Ali

    Published 2025-01-01
    “…To this end, this paper presents a generic lightweight and computationally efficient Transformer network-based model, referred to as InterAcT, that relies on extracted bodily keypoints using YOLO v8 to recognize human solo actions as well as interactions in aerial videos. …”
    Get full text
    Article
  10. 810

    Issues, Challenges, and Solution Options for On-Grid Multi-Microgrid Game Theory: A Systematic Review by Dimas Jalaluddin Ahmad, Nanang Hariyanto, Umar Khayam

    Published 2025-01-01
    “…This connection provides more flexibility in operation and various features, including multi-level interactions beyond peer-to-peer, asymmetric agents, the presence of distribution network operator, support and backup power from the grid, and an energy market pool. …”
    Get full text
    Article
  11. 811

    LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification by Yongqi Xu, Dongcheng Li, Changcheng Li, Zheming Yuan, Zhijun Dai

    Published 2025-08-01
    “…In the context of intelligent agriculture in China, rapid and accurate identification of crop diseases is essential for ensuring food security and improving crop yield. Although lightweight convolutional neural networks (CNNs) are widely adopted for plant disease recognition due to their computational efficiency, they often suffer from limited feature representation and classification accuracy. …”
    Get full text
    Article
  12. 812

    MA-YOLO: A Pest Target Detection Algorithm with Multi-Scale Fusion and Attention Mechanism by Yongzong Lu, Pengfei Liu, Chong Tan

    Published 2025-06-01
    “…To address the high computational complexity and inadequate feature representation in traditional convolutional networks, this study proposes MA-YOLO, an agricultural pest detection model based on multi-scale fusion and attention mechanisms. …”
    Get full text
    Article
  13. 813
  14. 814
  15. 815

    An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm by Marwa Obayya, Fahd N. Al-Wesabi, Menwa Alshammeri, Huda G. Iskandar

    Published 2025-05-01
    “…Furthermore, the MobileNetV3 model is utilized for the feature extraction process. The temporal convolutional network (TCN) model is implemented for classification. …”
    Get full text
    Article
  16. 816

    PHRF-RTDETR: a lightweight weed detection method for upland rice based on RT-DETR by Xianjin Jin, Jinheng Zhang, Fei Wang, Mengyan Zhao, Yunshuang Wang, Jianping Yang, Jinfeng Wu, Bing Zhou

    Published 2025-06-01
    “…To address this issue, we enhanced the baseline model RT-DETR and proposed a lightweight weed detection model for upland rice, named PHRF-RTDETR.MethodsFirst, we propose a novel lightweight backbone network, termed PGRNet, to replace the original computationally intensive feature extraction network in RT-DETR. …”
    Get full text
    Article
  17. 817
  18. 818

    A survey of data-driven fault-diagnosis methods for large-scale industrial production processes by Qianxiang YU, Qing LI, Linlin LI, Yixuan WANG

    Published 2025-04-01
    “…The usual fault-diagnosis methods for large-scale systems rely on centralized sensor network monitoring. Centralization necessitates consolidated data processing, which can create immense computational stress. …”
    Get full text
    Article
  19. 819
  20. 820

    Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints by Javad Forough, Hamed Haddadi, Monowar Bhuyan, Erik Elmroth

    Published 2024-01-01
    “…Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. …”
    Get full text
    Article