Results (241)
Search Parameters:
Section: cisDetection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase
Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…
Read MorePerfVis+: From Timestamps to Insight through Integration of Visual and Statistical Analysis
Complex networked systems provide a cornucopia of network statistics, many of which relate to the temporal behaviour of subsystems, devices, or even individual protocol layers. Different and flexible visualizations can play a crucial role in discovering and making patterns, relations, and trends tangible. We developed PerfVis, a tool that visualizes timestamp data to aid in…
Read MoreUtilization of Generative Artificial Intelligence to Improve Students’ Visual Literacy Skills
This study aims to examine the impact of Gen AI utilization on students’ visual literacy skills using a quantitative approach and data instruments in the form of post-test scores of the control class and experimental class which are analyzed to measure the effectiveness of GEN AI in improving students’ visual literacy skills at four universities.…
Read MoreIoT and Business Intelligence Based Model Design for Liquefied Petroleum Gas (LPG) Distribution Monitoring
Gas leakage caused by various causes poses significant risks to public safety. To address this problem, an intelligent model is proposed for the accurate monitoring of Liquefied Petroleum Gas (LPG) distribution based on the integration of Internet of Things (IoT) and Business Intelli- gence (BI) technologies. Through the use of sensors and actuators, it seeks…
Read MoreEfficient Deep Learning-Based Viewport Estimation for 360-Degree Video Streaming
While Virtual reality is becoming more popular, 360-degree video transmission over the Internet is challenging due to the video bandwidth. Viewport Adaptive Streaming (VAS) was proposed to reduce the network capacity demand of 360-degree video by transmitting lower quality video for the parts of the video that are not in the current viewport. Understanding how…
Read MoreInfrastructure-as-a-Service Ontology for Consumer-Centric Assessment
In the context of adopting cloud Infrastructure-as-a-Service (IaaS), prospective consumers need to consider a wide array of both business and technical factors associated with the service. The development of an intelligent tool to aid in the assessment of IaaS offerings is highly desirable. However, the creation of such a tool requires a robust foundation of…
Read MoreSocial Media Text Summarization: A Survey Towards a Transformer-based System Design
Daily life is characterized by a great explosion of abundance of information available on the internet and social media. Smart technology has radically changed our lives, giving a leading role to social media for communication, advertising, information and exchange of opinions. Managing this huge amount of data by humans is an almost impossible task. Adequacy…
Read MoreColorized iVAT Images for Labeled Data
A 2-dimensional numerical data set X = {x1,…,xn} with associated category labels {l1,…,ln} can be accurately represented in a 2-dimensional scatterplot where color is used to represent each datum’s label. The colorized scatterplot indicates the presence or absence of spatial clusters in X and any special distribution of labels among those clusters. The same approach…
Read MoreThe Influence Analysis of Internet Finance on China’s Banking Industry Development
This article presented an overview of the evolution of China’s internet financial industry, emphasizing the critical importance of fintech, a novel economic sector improving the efficiency of financial services through innovative technology applications. The systems referred to encompass those technologies, applications, and tools that enhance the efficiency and accessibility of financial services. The historical trajectory…
Read MoreForecasting Bitcoin Prices: An LSTM Deep-Learning Approach Using On-Chain Data
Over the past decade, Bitcoin’s unprecedented performance has underscored its po-sition as the premier asset class. Starting from an insignificant value and reaching an astounding high of around 65,000 U.S dollars in 2021 – all without a central con-trolling authority – Bitcoin’s trajectory is undoubtedly a historical feat. Its intangible nature, initially a subject of…
Read MoreDesign and Implementation of an Automated Medicinal-Pill Dispenser with Wireless and Cellular Connectivity
Medical adherence is a major concern globally and is increasing with improved access to medication. Unfortunately, patients taking multiple medications often struggle with confusion about when and how to take each medication. To address this issue, an inexpensive domestic device has been proposed to improve medication adherence. This device uses Wi-Fi and cellular Internet of…
Read MoreHistoChain: Improving Consortium Blockchain Scalability using Historical Blockchains
Blockchain technology has been successfully applied in many fields for immutable and secure data storage. However, for applications with on-chain big data, blockchain scalability remains to be a main concern. In this paper, we propose a novel scalable storage scheme, called HistoChain, for a consortium blockchain network to manage blockchain data. We use a current…
Read MoreA Multiplatform Application for Automatic Recognition of Personality Traits in Learning Environments
The present work shows the development of a data collection platform that allows the researcher to collect new video and voice data sets in Spanish. It also allows the application of a standardized personality test and stores this information to analyze the effectiveness of the automatic personality recognizers concerning the results of a standardized personality…
Read MorePrototype to Identify the Capacity in Cybersecurity Management for a Public Organization
Public organizations are subjected to a complex security situation, which can be addressed by permanently strengthening and evaluating their cybersecurity capabilities. The objective of this research is to develop a model to identify the cybersecurity management capacity of public organizations. The deductive method was applied for the review and analysis of criteria, factors and variables…
Read MoreIntegrated GIS-SUE Map Cost Estimation System Prototype for Designing a Decision Support System
Subsurface Utility Engineering (SUE) is an international model for mapping and classifying underground surfaces according to their accuracy (acquisition method). Utilizing Geographic Information System (GIS) to map and present the SUE levels paved the way for producing a new Decision Support System (DSS) for the utility mapping process. The proposed system represents an efficient tool…
Read MoreTransfer and Ensemble Learning in Real-time Accurate Age and Age-group Estimation
Aging is considered to be a complex process in almost every species’ life, which can be studied at a variety of levels of abstraction as well as in different organs. Not surprisingly, biometric characteristics from facial images play a significant role in predicting human’s age. Specifically, automatic age estimation in real-time situation has begun to…
Read MoreConsideration of Ambiguity in the Analysis Phase of Data Warehouses
We are interested in taking into account ambiguity in the analysis phase of data warehouses, using fuzzy logic. We want to offer decision makers the possibility of using natural language in this phase. We created in a previous work the Baccalaureate fuzzy data warehouse which we were able to query with seven natural language terms…
Read MoreOperating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021
This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…
Read MoreA Structuration View of the South African National Health Insurance Readiness
The South African government has embarked on the implementation of the National Health Insurance (NHI), to increase access to healthcare and improve service delivery. However, the project has being encountering various challenges, which are not empirically known. The aim of the study is to identify the factors that influence the implementation of the NHI from…
Read MorePrototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity
The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…
Read MoreRedesign and Improvement in the Management of the Raw Material Inventory Control Process with Oracle APEX
Having reasonable inventory control is a priority for any company because a lack of inventory could incur economic losses. Not having the necessary stock for the timely production of your orders could generate dissatisfaction in your customers and possibly cause them to lose them. Likewise, reasonable inventory control allows quick decision-making for the company’s benefit.…
Read MoreAssociation Rules for Knowledge Discovery From E-News Articles: A Review of Apriori and FP-Growth Algorithms
Owing to technological development, the internet has become the world’s largest platform where an unaccountable amount of e-news information is freely available to use. Most of the time, e-newspaper readers have to examine the massive collection of e-news articles to locate necessary information relevant to them. Massive semi-structured and unstructured texts usually mislead the readers…
Read MoreBlockchain Applications in Suning and PingAn
The emergence of blockchain technology has facilitated the digital transformation of many businesses and thereby increased the competitiveness of China in the global market. As a cutting-edge technology, Blockchain has significantly influenced the practices across all business sectors. Focusing on the retail and insurance sectors, this paper analyzes the blockchain technology applications in two companies…
Read MoreDeep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies
Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read More
