|
|
|
Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask fo...
ver más
|
|
|
|
|
|
|
Hamed Raoofi, Asa Sabahnia, Daniel Barbeau and Ali Motamedi
Traditional methods of supervision in the construction industry are time-consuming and costly, requiring significant investments in skilled labor. However, with advancements in artificial intelligence, computer vision, and deep learning, these methods ca...
ver más
|
|
|
|
|
|
|
Paniti Netinant, Thitipong Utsanok, Meennapa Rukhiran and Suttipong Klongdee
With the rapid rise of digitalization in the global economy, home security systems have become increasingly important for personal comfort and property protection. The collaboration between humans, the Internet of Things (IoT), and smart homes can be hig...
ver más
|
|
|
|
|
|
|
Sakorn Mekruksavanich and Anuchit Jitpattanakul
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individ...
ver más
|
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Yibei Guo, Yijiang Pang, Joseph Lyons, Michael Lewis, Katia Sycara and Rui Liu
Due to the complexity of real-world deployments, a robot swarm is required to dynamically respond to tasks such as tracking multiple vehicles and continuously searching for victims. Frequent task assignments eliminate the need for system calibration time...
ver más
|
|
|
|
|
|
|
Mengchi Xing, Haojiang Deng and Rui Han
The 5G core network adopts a Control and User Plane Separation (CUPS) architecture to meet the challenges of low-latency business requirements. In this architecture, a balance between management costs and User Experience (UE) is achieved by moving User P...
ver más
|
|
|
|
|
|
|
Azizah Assiri and Hassen Sallay
Opportunistic mobile social networks (OMSNs) have become increasingly popular in recent years due to the rise of social media and smartphones. However, message forwarding and sharing social information through intermediary nodes on OMSNs raises privacy c...
ver más
|
|
|
|
|
|
|
Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola and Francesco Pascale
Nowadays, a vehicle can contain from 20 to 100 ECUs, which are responsible for ordering, controlling and monitoring all the components of the vehicle itself. Each of these units can also send and receive information to other units on the network or exter...
ver más
|
|
|
|
|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|