|
|
|
Yogeswaranathan Kalyani, Liam Vorster, Rebecca Whetton and Rem Collier
In the last decade, digital twin (DT) technology has received considerable attention across various domains, such as manufacturing, smart healthcare, and smart cities. The digital twin represents a digital representation of a physical entity, object, sys...
ver más
|
|
|
|
|
|
|
Rafael Moreno-Vozmediano, Rubén S. Montero, Eduardo Huedo and Ignacio M. Llorente
The adoption of edge infrastructure in 5G environments stands out as a transformative technology aimed at meeting the increasing demands of latency-sensitive and data-intensive applications. This research paper presents a comprehensive study on the intel...
ver más
|
|
|
|
|
|
|
Yi Liu, Yiting Deng, Zhen Liu and Mohamed Osmani
At present, increased modes of transport have facilitated daily life. Building information modeling (BIM) integration has become a key strategy to foster efficiency, collaboration, and sustainability in the fields of buildings, transport, and facilities....
ver más
|
|
|
|
|
|
|
Herve M. Kabamba, Matthew Khouzam and Michel R. Dagenais
Tracing serves as a key method for evaluating the performance of microservices-based architectures, which are renowned for their scalability, resource efficiency, and high availability. Despite their advantages, these architectures often pose unique debu...
ver más
|
|
|
|
|
|
|
Ali Eghmazi, Mohammadhossein Ataei, René Jr Landry and Guy Chevrette
The Internet of Things (IoT) is a technology that can connect billions of devices or ?things? to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart hou...
ver más
|
|
|
|
|
|
|
F. Necati Catbas, Jacob Anthony Cano, Furkan Luleci, Lori C. Walters and Robert Michlowitz
This study investigates the capture of digital data and the development of models for structures with incomplete documentation and plans. LiDAR technology is utilized to obtain the point clouds of a pedestrian bridge structure. Two different point clouds...
ver más
|
|
|
|
|
|
|
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad...
ver más
|
|
|
|
|
|
|
Xiaonan Wang, Yang Guo and Yuan Gao
Non-terrestrial network (NTN) is a trending topic in the field of communication, as it shows promise for scenarios in which terrestrial infrastructure is unavailable. Unmanned autonomous intelligent systems (UAISs), as a physical form of artificial intel...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|