Results (56)
Search Parameters:
Keyword: ISMSComparative Analysis and Modern Applications of PoW, PoS, PPoS Blockchain Consensus Mechanisms and New Distributed Ledger Technologies
Central authorities have registered economic transactions based on trust since the dawn of time. With the advent of paper, methods for documenting transactions and records became more difficult and detailed. With the widespread use of computers in recent years, digital recording has made record keeping easier and since then every technical advancement has made data…
Read MoreEliminating Target Anopheles Proteins to Non-Target Organisms based on Posterior Probability Algorithm
Capturing similarity in gene sequences of a target organism to detect significant regions of comparison will most likely occur because genes share a related descendant. Local sequence alignment for the targeted organisms can help preserve associations among sequences of related organisms. Such homologous genes possess identical sequences with common ancestral genes. The genes may be…
Read MoreUnderstanding the usage, Modifications, Limitations and Criticisms of Technology Acceptance Model (TAM)
Technology Acceptance Model (TAM) is broadly accepted and has proved applicable in identifying consumers’ willingness to utilize information and communication technology (ICT). The theory proposes that Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) are actually determining factors of individual attitudes, while attitude is a determining factor of Behavioural Intention (BI) and Behavioural Intention…
Read MoreEnhancing an SDN Architecture with DoS Attack Detection Mechanisms
A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…
Read MoreTrust and Reputation Mechanisms in Vehicular Ad-Hoc Networks: A Systematic Review
An emerging trend has been observed in the Trust and Reputation (T & R) systems in field of decision-making support for a majority of the provisions propagated by the Internet. It is the extreme importance that peers (users) are able to trust each other and rely on them for file sharing and for services. This…
Read MoreAttacks classification and security mechanisms in Wireless Sensor Networks
This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, on the attack impacts and on the attack target. Then, it presents and classifies the most known attacks in WSNs based the proposed model. Simulations…
Read MoreAdaptive and Non Adaptive LTE Fractional Frequency Reuse Mechanisms Mobility Performance
Mobile broadband has gained momentum with the growing demand of user data rates. Long Term Evolution (LTE) technology is the step in mobile communications evolution, developed to satisfy high data rate demand, and meet better spectral efficiency requirements. Effective radio resource management and inter cell interferences are the major challenges. Fractional Frequency Reuse (FFR) is…
Read MoreFederated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review
The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…
Read MoreSystem-Level Test Case Design for Field Reliability Alignment in Complex Products
Achieving targeted reliability for complex products in real-world field environments remains a persistent challenge, even when laboratory validation suggests high performance. A significant reliability gap often emerges during the initial deployment phase, typically within the first one to five years where field failure rates can be up to twice those predicted in controlled settings. Compounding…
Read MoreTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read MoreIntegration and Innovation of a Micro-Topic-Pedagogy Teaching Model under the New Engineering Education Paradigm
The rapid evolution of global technologies and industrial restructuring demands innovative pedagogical approaches to foster interdisciplinary engineering expertise. This research pioneers a blended instructional framework anchored in micro-topic pedagogy under the New Engineering Education (NEE) paradigm, orchestrating case studies, heuristic scaffolding, and research-driven inquiry strategies within digitally augmented learning ecosystems. A quasi-experimental study was conducted…
Read MoreCooperative Game Theory for Grid Service Pricing: A Utility-Centric Approach
This study presents a novel alternative to traditional Net Energy Metering (NEM) by proposing a set of innovative pricing schemes for solar customers participating in utility-led grid service programs through the aggregation of Distributed Energy Resources (DERs). Grounded in cooperative game theory, the proposed framework facilitates equitable and efficient value allocation among key stakeholders, namely…
Read MoreLeveraging Machine Learning for a Comprehensive Assessment of PFAS Nephrotoxicity
Polyfluoroalkyl substances (PFAS) are persistent chemicals that accumulate in the body and environment. Although recent studies have indicated that PFAS may disrupt kidney function, the underlying mechanisms and overall effects on the organ remain unclear. Therefore, this study aims to elucidate the impact of PFAS on kidney health using machine learning techniques. Utilizing a dataset…
Read MoreDetailed Study of a Proposal for a Computer Based Tutoring Strategy
In this article, we propose a new tutoring strategy to combat school dropout in Morocco. This strategy is based on a collaborative approach involving educational administration and teachers at the national level to ensure equity and equal opportunities for all Moroccan students, on the one hand, and the quality of the training, on the other.…
Read MoreHow a Design-Based Research Approach Supported the Development and Rapid Adaptation Needed to Provide Enriching Rural STEM Camps During COVID and Beyond
Like many STEM research projects, the members of the National Science Foundation-funded STEM SEALS project dramatically shifted from in-person delivery of a summer institute to distance-learning with minimal time for preparation. However, the daunting challenge also offered the unique opportunity to apply Design-based Research within an exploratory study to inform and document the progression and…
Read MoreSocial Financial Technologies for the Development of Enterprises and the Russian Economy
The main contradiction identified in the study is that the existing scientific and methodological solves of economy development management processes does not create prerequisites for improving the efficiency of their work, the introduction of progressive technologies for material and moral stimulation of the work of performers and administrative and managerial personnel, advanced social mechanisms for…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreiDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem
The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…
Read MoreEvaluation Studies of Motion Sickness Visually Induced by Stereoscopic Films
Humans have experienced motion sickness and possessed the knowledge of stereopsis since classical antiquity. Knowledge of stereopsis dates back to approximately 300 B.C., when Euclid first recognized the concept of depth perception in human vision. Further, the motion sickness is including a sensation of wooziness and nausea that has been documented since approximately 400 B.C.,…
Read MoreActual Traffic Based Load-Aware Dynamic Point Selection for LTE-Advanced System
Coordinated MultiPoint (CoMP) has been introduced for LTE-Advanced system to overcome the inter-cell interference problems and enhance the signal quality of cell-edge UEs (User Equipments). With such concept, the overall system performance should be improved considerably to support the significantly increasing amount of demand on data transmission via mobile communication that happens nowadays. Dynamic Point…
Read MoreExposure to Optical Radiation and Electromagnetic Fields at the Workplace: Criteria for Occupational Health Surveillance According to Current European Legislation
A very large number of workers is occupationally exposed to Optical Radiation (OR) worldwide, while indeed nowadays an exposure to Electromagnetic fields (EMF) can occur in almost all workplaces. OR origin can be natural, including the most relevant source, i.e. the sun, or artificial, that can be further classified in incoherent and coherent, i.e. the…
Read MoreA Surface Plasmon Resonance (SPR) and Water Quality Monitoring: A System for Detecting Harmful Algal Bloom
Harmful algal blooms (HAB) or “Red tides” are organisms which produce toxins which are harmful to humans, fish, and other marine mammals. The said toxins come from dinoflagellates of genus Pyrodinium Bahamense var Compressum that cause Paralytic Shellfish Poisoning (PSP) and Dinophysis Caudata and Prorocentrum lima which results to Diarrhetic Shellfish Poisoning (DSP). In the…
Read MoreRecent Impediments in Deploying IPv6
Internet Protocol version 6 is being adopted on slow pace and it is taking a long time. This paper intends to discuss the transition process between IPv4 and IPv6 and the major obstacles that prevent deploying IPv6 worldwide. It presents the IPv4 exhaustion reports results and where are the IPv4 address pool. Then it presents…
Read MoreImpact of Salinity on Stabilized Leachate Treatment from Ozonation Process
Leachate generated from landfill Indonesia is typical has high salinity and organic matters during the dry season, potentially contaminating water and the environment. An increase in salinity might deteriorate the activity of the microorganisms on the decomposition process. This research aims to study the feasibility of the ozonation technique for treating stabilized leachate. The parameters…
Read More
