Results (32)
Search Parameters:
Keyword: VerificationSecured Multi-Layer Blockchain Framework for IoT Aggregate Verification
Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…
Read MoreWireless Sensor Networks Simulation Model to Compute Verification Time in Terms of Groups for Massive Crowd
Everyone needs fast response or output against its request or need. Therefore, technologies are used to make the processing fast and accurate according to our needs. But in some situations, still we need to do more. Especially, when we need to process a massive or huge crowd of people in limited time frame such as…
Read MoreOffline Signature Recognition and Verification Using ORB Key Point Matching Techniques
An extensive work has been carried out in the field of human transcribe-verification and transcribe-recognition by extensive scholars across the globe from past decades. In order to demeanour immense experiments for considering the performance of the newly intended models and to substantiate the efficacy of the proposed model which is moderately required. This paper monologue…
Read MoreVerification of the Usefulness of Personal Authentication with Aerial Input Numerals Using Leap Motion
With the progress of IoT, everything is going to be connected to the network. It will bring us a lot of benefits however some security risks will be occurred by connecting network. To avoid such problems, it is indispensable to strengthen security more than now. We focus on personal authentication as one of the security.…
Read MoreFramework for the Formal Specification and Verification of Security Guidelines
Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle…
Read MoreAn Efficient Authentication Method For Smart Card Verification In Online
The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and…
Read MoreTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read MoreHybrid Neural Network Method for Predicting the SOH and RUL of Lithium-Ion Batteries
The use of a battery to power an electrical or electronic system is accompanied by battery management, i.e. a set of measures intended to preserve it for preventative maintenance, thus the cost reduction. This management is generally based on two key parameters, the (remaining useful life) RUL and the (State-of-health) SOH, which relate respectively to…
Read MoreA Study on Novel Hand Hygiene Evaluation System using pix2pix
The novel coronavirus infection (COVID-19), which appeared at the end of 2019 has developed into a global pandemic with numerous deaths, and has also become a serious social concern. The most important and basic measure for preventing infection is hand hygiene. In this study, by photographing palm images of nursing students after hand-washing, using fluorescent…
Read MoreEfficient Publicly Verifiable Proofs of Data Replication and Retrievability Applicable for Cloud Storage
Using Proofs of Retrievability (PORs), a file owner is able to check that a cloud server correctly stores her files. Using Proofs of Retrievability and Reliability (PORRs), she can even verify at the same time that the cloud server correctly stores both her original files and their replicas. In 2020, a new PORR combined with…
Read MoreThe Influence of Online Learning on Learning Interest and Motivation and Their Impact on Student Achievement at Educational Technology Study Program – Ibn Khaldun University Bogor
The aim of this research was to prove the effect of online learning on interest and motivation to learn and its effect on student achievement in the Educational Technology Study Program – Ibnu Khaldun University, Bogor. This research method uses descriptive analysis and verification with a quantitative approach. The source of this research uses primary…
Read MoreModelling and Testing Services with Continuous Time SRML
The SENSORIA Reference Modeling Language (SRML) aims at modelling composite services at a high level. Continuous time SRML extends SRML so that it can model services whose components can perform both discrete processes and continuous processes. In order to show how continuous time SRML is applied, in this paper, we systematically introduce our study on…
Read MoreUsing Formal Methods to Model a Smart School System via TLA+ and its TLC Model Checker for Validation
Formal methods are one of the efficient tools to verify and validate designs for different kinds of systems. Smart systems are attracting researchers’ attention due to the rapid spread of new technologies all over the world. Modeling a smart system requires connecting heterogeneous subsystems together to build it. Our contribution to this work is in…
Read MoreAn Operational Responsibility and Task Monitoring Method: A Data Breach Case Study
As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…
Read MoreFormal Proof of Properties of a Syntax-Oriented Editor of Robotic Missions Plans
This article copes with the formal verification of properties of the missions building module of PILOT’s software. PILOT is a language dedicated to remote control of robots. An incremental syntax-oriented editor was built in order to increase the dependability of PILOT’s missions and we showed that, under a maximum size of plan, this editor allows…
Read MoreCyclic Evaluation of Capacity of Recovered Traction Battery after Short-Circuit Damage
Presented paper discusses possibilities related to the recovery of the damaged lithium batteries after the short-circuit. The recovery procedure was applied on the selected traction LiFePO4 40Ah cell which was initially short-circuited. After the short-circuit, the damaged cell has visible damage of the electro-mechanical properties. For the recovery of damaged traction cell as much as…
Read MoreModified Blockchain based Hardware Paradigm for Data Provenance in Academia
Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…
Read MoreDesign and Implementation of DFT Technique to Verify LBIST at RTL Level
According to IEC 61805 and ISO 26262 standards requirement inclusion of LBIST (Logic Built in Self-Test) became mandatory to achieve safety critical application such as automotive field. In such systems, once device is switched ON LBIST (Logic Built in Self-Test) is activated and testing of digital logic is performed. After safety subsystem says that the…
Read MorePrediction of Vessel Dynamic Model Parameters using Computational Fluid Dynamics Simulation
Dynamic positioning, a system to maintain vessel position and heading, is a technology that is used in many vessels and being intensively used as research topic in marine engineering. In order to make this system work properly, an accurate parameters value is needed. This research focuses on finding several parameters needed in this control system,…
Read MoreBlockchain Application in Higher Education Diploma Management and Results Analysis
Academic certifications are achievements desired by people, because they have a direct impact, positively, on their social lives. Such an important document, still widely issued in paper format, may be subject to forgery or impossibility of verification due to the unavailability of the issuing entity. This work consists of identifying, analyzing and testing some of…
Read MoreHand-Based Biometric Recognition Technique – Survey
In today’s modern world, reliable automatic personal recognition is a crucial area of discussion, primarily because of the increased security risks. A large number of systems first require the recognition of a person before they can access their services. Biometric recognition can be used, which can be understood as automatic identification or automatic verification of…
Read MoreSharpniZer: A C# Static Code Analysis Tool for Mission Critical Systems
Until recent years, code quality was not given due significance, as long as the system produced accurate results. Taking into account the implications and recent losses in critical systems, developers have started making use of static code analysis tools, to assess the eminence of source code in terms of quality. Static code analysis is conducted…
Read MoreCombination of Salient Object Detection and Image Matching for Object Instance Recognition
Object Instance Recognition aims to classify objects specifically and usually use a single reference image. It is possible to be used in many applications such as visual search, information retrieval and augmented reality. However, various things affect the appearance of the objects, which makes the recognition process harder, especially if a single reference image is…
Read MoreMulti Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms
Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…
Read MoreEvent Monitoring using Distributed Pattern Recognition Approach on Integrated IoT-Blockchain Network
With the advancement in the field of Internet-of-Things (IoT), event monitoring applications have rapidly evolved from a simple event data acquisition towards predictive event analytics involving multi-sensory data aggregation in a distributed environment. Existing event monitoring schemes are mainly relying on ine_cient centralized processing mechanism, which may lead to the common single-point of failure for…
Read More
