-
801
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
802
OPTISTACK: A Hybrid Ensemble Learning and XAI-Based Approach for Malware Detection in Compressed Files
Published 2025-01-01Get full text
Article -
803
A hybrid data-driven method for voltage state prediction and fault warning of Li-ion batteries
Published 2024-12-01“…As the extensive application of electrochemical energy storage (EES), Li-ion battery fault is a key factor reference to the reliable operation and system security, influencing by the environment temperature and battery voltage. …”
Get full text
Article -
804
Through-wall Human Pose Reconstruction and Action Recognition Using Four-dimensional Imaging Radar
Published 2025-02-01“…Through-wall human pose reconstruction and behavior recognition have enormous potential in fields like intelligent security and virtual reality. However, existing methods for through-wall human sensing often fail to adequately model four-Dimensional (4D) spatiotemporal features and overlook the influence of walls on signal quality. …”
Get full text
Article -
805
Machine Learning and Deep Learning for Crop Disease Diagnosis: Performance Analysis and Review
Published 2024-12-01Get full text
Article -
806
Improving internet of vehicles research: A systematic preprocessing framework for the VeReMi datasetZenodo
Published 2025-06-01“…The optimized dataset is well-suited for ITS and IoV applications, such as anomaly detection and network security, underscoring the crucial role of preprocessing in overcoming real-world constraints and enhancing model performance.…”
Get full text
Article -
807
Classification Model for Bot-IoT Attack Detection Using Correlation and Analysis of Variance
Published 2025-04-01“…Industry 4.0 requires secure networks as the advancements in IoT and AI exacerbate the challenges and vulnerabilities in data security. …”
Get full text
Article -
808
Survey of deep fake audio generation and detection techniques
Published 2025-01-01“…Subsequently, an in-depth analysis was conducted on both acoustic feature-based and end-to-end model-based fake audio detection strategies, delving into details such as deep acoustic feature detection, pre-trained neural network feature detection, end-to-end model optimization, generalization enhancement techniques, and the enhancement of real-time detection. …”
Get full text
Article -
809
InterAcT: A generic keypoints-based lightweight transformer model for recognition of human solo actions and interactions in aerial videos.
Published 2025-01-01“…To this end, this paper presents a generic lightweight and computationally efficient Transformer network-based model, referred to as InterAcT, that relies on extracted bodily keypoints using YOLO v8 to recognize human solo actions as well as interactions in aerial videos. …”
Get full text
Article -
810
Issues, Challenges, and Solution Options for On-Grid Multi-Microgrid Game Theory: A Systematic Review
Published 2025-01-01“…This connection provides more flexibility in operation and various features, including multi-level interactions beyond peer-to-peer, asymmetric agents, the presence of distribution network operator, support and backup power from the grid, and an energy market pool. …”
Get full text
Article -
811
LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification
Published 2025-08-01“…In the context of intelligent agriculture in China, rapid and accurate identification of crop diseases is essential for ensuring food security and improving crop yield. Although lightweight convolutional neural networks (CNNs) are widely adopted for plant disease recognition due to their computational efficiency, they often suffer from limited feature representation and classification accuracy. …”
Get full text
Article -
812
MA-YOLO: A Pest Target Detection Algorithm with Multi-Scale Fusion and Attention Mechanism
Published 2025-06-01“…To address the high computational complexity and inadequate feature representation in traditional convolutional networks, this study proposes MA-YOLO, an agricultural pest detection model based on multi-scale fusion and attention mechanisms. …”
Get full text
Article -
813
An effective PO-RSNN and FZCIS based diabetes prediction and stroke analysis in the metaverse environment
Published 2025-04-01Get full text
Article -
814
Crop yield prediction using machine learning: An extensive and systematic literature review
Published 2025-03-01Get full text
Article -
815
An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm
Published 2025-05-01“…Furthermore, the MobileNetV3 model is utilized for the feature extraction process. The temporal convolutional network (TCN) model is implemented for classification. …”
Get full text
Article -
816
PHRF-RTDETR: a lightweight weed detection method for upland rice based on RT-DETR
Published 2025-06-01“…To address this issue, we enhanced the baseline model RT-DETR and proposed a lightweight weed detection model for upland rice, named PHRF-RTDETR.MethodsFirst, we propose a novel lightweight backbone network, termed PGRNet, to replace the original computationally intensive feature extraction network in RT-DETR. …”
Get full text
Article -
817
-
818
A survey of data-driven fault-diagnosis methods for large-scale industrial production processes
Published 2025-04-01“…The usual fault-diagnosis methods for large-scale systems rely on centralized sensor network monitoring. Centralization necessitates consolidated data processing, which can create immense computational stress. …”
Get full text
Article -
819
-
820
Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints
Published 2024-01-01“…Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. …”
Get full text
Article