Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Nebraska - Lincoln (13)
- Singapore Management University (6)
- Old Dominion University (3)
- Portland State University (2)
- Technological University Dublin (2)
-
- University of Arkansas, Fayetteville (2)
- University of Pennsylvania Carey Law School (2)
- Aga Khan University (1)
- Air Force Institute of Technology (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- Sheridan College (1)
- Southwestern Oklahoma State University (1)
- Tennessee State University (1)
- University of South Carolina (1)
- Keyword
-
- Security (3)
- Bibliometric Analysis (2)
- Bibliometric analysis (2)
- Cloud Computing (2)
- Cybersecurity (2)
-
- Machine learning (2)
- Survey (2)
- ADL sequence (1)
- Academic Libraries (1)
- Activity pattern (1)
- Adaptive Routing (1)
- Adaptive System (1)
- Algorithm (1)
- Artificial Intelligence (1)
- Artificial Intelligence, Internet of Things, Edge AI (1)
- Artificial intelligence (1)
- Authentication (1)
- Authentication systems (1)
- Avatar (1)
- Backward stability (1)
- Benchmark testing (1)
- Benefit (1)
- Bibliometric survey (1)
- Bitcoin (1)
- Blockchain (1)
- COVID-19 pandemic (1)
- Cellular IoT (1)
- Chomsky (1)
- Cloud Based Library Services (1)
- Cloud computing (1)
- Publication
-
- Library Philosophy and Practice (e-journal) (12)
- Research Collection School Of Computing and Information Systems (5)
- All Faculty Scholarship (2)
- Mathematical Sciences Spring Lecture Series (2)
- Publications (2)
-
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer Science Faculty Publications and Presentations (1)
- Computer Science Faculty Research (1)
- Conference Papers (1)
- Conference papers (1)
- Engineering Technology Faculty Publications (1)
- FIU Electronic Theses and Dissertations (1)
- Faculty Books & Book Chapters (1)
- Faculty Publications (1)
- Information Technology & Decision Sciences Faculty Publications (1)
- Institute for Educational Development, Karachi (1)
- Publications and Scholarship (1)
- Research Collection School Of Accountancy (1)
- UNL Libraries: Faculty Publications (1)
- altREU Projects (1)
Articles 1 - 30 of 38
Full-Text Articles in Computer Engineering
Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry
Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry
Computer Science Faculty Research
The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specific type of attack, which may leave a system vulnerable to numerous other types of attacks. A generalizable IDS that can identify a wide range of attacks within the shortest possible time has more practical value than attack-specific IDSs, which is not a trivial task to accomplish. In this …
Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh
Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh
Institute for Educational Development, Karachi
Since half of the century, technology has dominated the modern era. The rapid advancement of technology has reached generating artificial intelligence and artificial realities. So, virtual reality is an emerging technology and is applicable in education as well. Virtual reality is a computer-generated simulation, where people can interact within an artificial environment. Moreover, in an educational setting, such an environment provides students with a chance to get experiential learning. This paper has a systematic literature review on emerging technologies, such as virtual reality as a pedagogical tool for enhancing students’ experiential learning. This review aims to explore and understand the …
Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M
Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M
Library Philosophy and Practice (e-journal)
This paper will discuss catastrophe recovery and likelihood development for digital library structures. The article establishes a foundation for establishing Library continuity and disaster recovery strategies through the use of best practices. Library continuity development and catastrophe recovery are critical modules of the planning stage for a virtual digital library. Few institutions that experience a catastrophic disaster occurrence are powerless to recover always, but libraries can suggestively boost the possibility of long-term recovery of institutional digital resources by drafting a continuity and recovery strategy in preparation. This article is intended for system designers and administrators, as well as high-ranking library …
A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner
FIU Electronic Theses and Dissertations
Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …
Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert
Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert
UNL Libraries: Faculty Publications
Introduction
In the first months of the COVID-19 pandemic, it was impossible to tell if we were at the crest of a wave of new transmissions, or a trough of a much larger wave, still yet to peak. As of this writing, as colleges and universities prepare for mostly in-person fall 2021 semesters, case counts in the United States are increasing again after a decline that coincided with easier access to the COVID vaccine. Plans for a return to campus made with confidence this spring may be in doubt, as we climb the curve of what is already the second …
Adopting A Risk-Intelligent Approach To Digital Transformation: Four Traits Of Digitally Mature Organisations, Clarence Goh, Gary Pan, Poh Sun Seow, Yuanto Kusnadi, Seah Gek Choo, Cheryl Lim
Adopting A Risk-Intelligent Approach To Digital Transformation: Four Traits Of Digitally Mature Organisations, Clarence Goh, Gary Pan, Poh Sun Seow, Yuanto Kusnadi, Seah Gek Choo, Cheryl Lim
Research Collection School Of Accountancy
Our objective is to understand how digitally mature organisations are managing the GRC aspects of their digital transformation programmes, and identify any traits or behaviours that could inform the development of best practices.
Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith
Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith
Faculty Publications
The introduction of automated satellite control systems into a space-mission environment historically dominated by human-in-the-loop operations will require a more focused understanding of cybersecurity measures to ensure space system safety and security. On the ground-segment side of satellite control, the debut of privately owned communication antennas for rent and a move to cloud-based operations or mission centers will bring new requirements for cyber protection for both Department of Defense and commercial satellite operations alike. It is no longer a matter of whether automation will be introduced to satellite operations, but how quickly satellite operators can adapt to the onset of …
What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo
What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo
All Faculty Scholarship
To date, copyright scholarship has almost completely overlooked the linguistics and cognitive psychology literature exploring the connection between language and thought. An exploration of the two major strains of this literature, known as universal grammar (associated with Noam Chomsky) and linguistic relativity (centered around the Sapir-Whorf hypothesis), offers insights into the copyrightability of constructed languages and of the type of software packages at issue in Google v. Oracle recently decided by the Supreme Court. It turns to modularity theory as the key idea unifying the analysis of both languages and software in ways that suggest that the information filtering associated …
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
The Impact Of Cloud Computing On Academic Libraries, Sivankalai S
Library Philosophy and Practice (e-journal)
With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …
Online Grocery Shopping: A Staple Of The Present -- And Maybe The Future?, Henry B. Chao
Online Grocery Shopping: A Staple Of The Present -- And Maybe The Future?, Henry B. Chao
altREU Projects
This project aims to understand how the COVID-19 pandemic has affected people's food shopping tendencies, specifically focusing on the use of online grocers. It uses data collected by a team of researchers led out of Portland State University. This data consists of roughly 8000 surveys distributed starting in September of 2020. The survey asks respondents to discuss their demographics, household resources, and shopping tendencies.
In particular, this project wants to understand how inclined a respondent is to use online grocers based on their personal experience with COVID-19. To do this, the project uses a Latent Class Model (LCM) to classify …
Estimating Homophily In Social Networks Using Dyadic Predictions, George Berry, Antonio Sirianni, Ingmar Weber, Jisun An, Michael Macy
Estimating Homophily In Social Networks Using Dyadic Predictions, George Berry, Antonio Sirianni, Ingmar Weber, Jisun An, Michael Macy
Research Collection School Of Computing and Information Systems
Predictions of node categories are commonly used to estimate homophily and other relational properties in networks. However, little is known about the validity of using predictions for this task. We show that estimating homophily in a network is a problem of predicting categories of dyads (edges) in the graph. Homophily estimates are unbiased when predictions of dyad categories are unbiased. Node-level prediction models, such as the use of names to classify ethnicity or gender, do not generally produce unbiased predictions of dyad categories and therefore produce biased homophily estimates. Bias comes from three sources: sampling bias, correlation between model errors …
Vibransee: Enabling Simultaneous Visible Light Communication And Sensing, Ila Nitin Gokarn, Archan Misra
Vibransee: Enabling Simultaneous Visible Light Communication And Sensing, Ila Nitin Gokarn, Archan Misra
Research Collection School Of Computing and Information Systems
Driven by the ubiquitous proliferation of low-cost LED luminaires, visible light communication (VLC) has been established as a high-speed communications technology based on the high-frequency modulation of an optical source. In parallel, Visible Light Sensing (VLS) has recently demonstrated how vision-based at-a-distance sensing of mechanical vibrations (e.g., of factory equipment) can be performed using high frequency optical strobing. However, to date, exemplars of VLC and VLS have been explored in isolation, without consideration of their mutual dependencies. In this work, we explore whether and how high-throughput VLC and high-coverage VLS can be simultaneously supported. We first demonstrate the existence of …
Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.
Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.
Library Philosophy and Practice (e-journal)
Working with sensors has become an area of expertise within the domain of electronic engineering. On a day to day basis, thousands of sensors are put to use around us, for instance, in smoke alarms, speedometers, motors, computers, radiators etc. to accumulate sensor data, cables that connect the sensors to the bottom station after which the information is worked on. But cabling is often expensive especially when handling large scale industrial applications [5]. For an equivalent reason, low-cost wireless networks came into the picture recently and are in high demand. A research paper we found during our review of …
Towards Adaptive, Self-Configuring Networked Unmanned Aerial Vehicles, Nirupama Bulusu, Ehsan Aryafar, Feng Liu
Towards Adaptive, Self-Configuring Networked Unmanned Aerial Vehicles, Nirupama Bulusu, Ehsan Aryafar, Feng Liu
Computer Science Faculty Publications and Presentations
Networked drones have the potential to transform various applications domains; yet their adoption particularly in indoor and forest environments has been stymied by the lack of accurate maps and autonomous navigation abilities in the absence of GPS, the lack of highly reliable, energy-efficient wireless communications, and the challenges of visually inferring and understanding an environment with resource-limited individual drones. We advocate a novel vision for the research community in the development of distributed, localized algorithms that enable the networked drones to dynamically coordinate to perform adaptive beam forming to achieve high capacity directional aerial communications, and collaborative machine learning to …
A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj
A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj
Library Philosophy and Practice (e-journal)
Broadcasting in Mobile ad hoc network is very crucial process and if not taken care led to Broadcast storm problem. Several Broadcasting techniques are proposed in the literature, but probabilistic broadcasting is the one the major technique which can really avoid the broadcasting storm problem. The protocols employing probabilistic broadcasting is surveyed in this bibliometric paper. The bibliometric survey aims to throw light on several types of protocols employed in Mobile ad hoc Network. The primary aim of this paper is to assess the amount of work done in the field of Probabilistic Broadcasting in Mobile ad hoc Network, as …
A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.
A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.
Library Philosophy and Practice (e-journal)
Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.
Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences, citation …
Ship-Gan: Generative Modeling Based Maritime Traffic Simulator, Chaithanya Shankaramurthy Basrur, Arambam James Singh, Arunesh Sinha, Akshat Kumar
Ship-Gan: Generative Modeling Based Maritime Traffic Simulator, Chaithanya Shankaramurthy Basrur, Arambam James Singh, Arunesh Sinha, Akshat Kumar
Research Collection School Of Computing and Information Systems
Modeling vessel movement in a maritime environment is an extremely challenging task given the complex nature of vessel behavior. Several existing multiagent maritime decision making frameworks require access to an accurate traffic simulator. We develop a system using electronic navigation charts to generate realistic and high fidelity vessel traffic data using Generative Adversarial Networks (GANs). Our proposed Ship-GAN uses a conditional Wasserstein GAN to model a vessel’s behavior. The generator can simulate the travel time of vessels across different maritime zones conditioned on vessels’ speeds and traffic intensity. Furthermore, it can be used as an accurate simulator for prior decision …
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang
Computational Modeling & Simulation Engineering Faculty Publications
Low power wide-area network (LPWAN) technology aims to provide long range and low power wireless communication. It can serve as an alternative technology for data transmissions in many application scenarios (e.g., parking monitoring and remote flood sensing). In order to explore its feasibility in transportation systems, this project conducted a review of relevant literature to understand the current status of LPWAN applications. An online survey that targeted professionals concerned with transportation was also developed to elicit input about their experiences in using LPWAN technology for their projects. The literature review and survey results showed that LPWAN’s application in the U.S. …
Bibliometric Analysis Of Particle Swarm Optimization Techniques Used To Enhance Low-Energy Adaptive Clustering Hierarchy Protocol For Wireless Sensor Networks, Anupkumar M. Bongale Dr.
Bibliometric Analysis Of Particle Swarm Optimization Techniques Used To Enhance Low-Energy Adaptive Clustering Hierarchy Protocol For Wireless Sensor Networks, Anupkumar M. Bongale Dr.
Library Philosophy and Practice (e-journal)
Wireless Sensor Network (WSN) is a network of tiny wireless sensor nodes. The sensor nodes sense information and transmit the sensed information to a data collection point known as Base Station. WSNs have gained massive popularity due to their incredible benefits, and active research is ongoing for the past two decades. The primary concern with WSN is that the sensor operates on a limited power supply. Due to the nature of applications of WSNs and the hostile environment where the sensors are deployed, providing unlimited power or energy supply is not an option. Hence, the research work mainly focuses on …
Owsnet: Towards Real-Time Offensive Words Spotting Network For Consumer Iot Devices, Bharath Sudharsan, Sweta Malik, Peter Corcoran, Pankesh Patel, John G. Breslin, Muhammad Intizar Ali
Owsnet: Towards Real-Time Offensive Words Spotting Network For Consumer Iot Devices, Bharath Sudharsan, Sweta Malik, Peter Corcoran, Pankesh Patel, John G. Breslin, Muhammad Intizar Ali
Publications
Every modern household owns at least a dozen of IoT devices like smart speakers, video doorbells, smartwatches, where most of them are equipped with a Keyword spotting(KWS) system-based digital voice assistant like Alexa. The state-of-the-art KWS systems require a large number of operations, higher computation, memory resources to show top performance. In this paper, in contrast to existing resource-demanding KWS systems, we propose a light-weight temporal convolution based KWS system named OWSNet, that can comfortably execute on a variety of IoT devices around us and can accurately spot multiple keywords in real-time without disturbing the device's routine functionalities.
When OWSNet …
Lecture 08: Partial Eigen Decomposition Of Large Symmetric Matrices Via Thick-Restart Lanczos With Explicit External Deflation And Its Communication-Avoiding Variant, Zhaojun Bai
Mathematical Sciences Spring Lecture Series
There are continual and compelling needs for computing many eigenpairs of very large Hermitian matrix in physical simulations and data analysis. Though the Lanczos method is effective for computing a few eigenvalues, it can be expensive for computing a large number of eigenvalues. To improve the performance of the Lanczos method, in this talk, we will present a combination of explicit external deflation (EED) with an s-step variant of thick-restart Lanczos (s-step TRLan). The s-step Lanczos method can achieve an order of s reduction in data movement while the EED enables to compute eigenpairs in batches along with a number …
Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni
Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni
Library Philosophy and Practice (e-journal)
Background: This study aims to analyze the work done in domain of cloud computing and edge computing using artificial intelligence from 2015 to 2021. Recent research shows the bibliometric methods are useful for such kind of analysis. Thus in this paper analysis is carried out using the bibliometric methods.
Methods: different articles on edge computing and edge intelligence were retrieved using one of the most popular database- Scopus. The research articles are considered between 2015 to 2021. Scopus analyzer is used for getting some analysis results such as documents by year, source, country and so on. VOSviewer Version 1.6.16 is …
Lecture 11: The Road To Exascale And Legacy Software For Dense Linear Algebra, Jack Dongarra
Lecture 11: The Road To Exascale And Legacy Software For Dense Linear Algebra, Jack Dongarra
Mathematical Sciences Spring Lecture Series
In this talk, we will look at the current state of high performance computing and look at the next stage of extreme computing. With extreme computing, there will be fundamental changes in the character of floating point arithmetic and data movement. In this talk, we will look at how extreme-scale computing has caused algorithm and software developers to change their way of thinking on implementing and program-specific applications.
Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina
Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina
Library Philosophy and Practice (e-journal)
This study aims to discuss digital government and regulation, analyzed through the bibliometric approach with the Scopus database for the last 20 years and visualized through the VOSviewer software version 1.6.16. The results indicate that the topic of e-government has become essentially prominent and has been the most discussed in the past two decades. Approximately 41.1% of digital government and regulation articles are classified under the subject area of 'Computer Science', continued by Social Sciences (18.3%), and Business, Management and Accounting (10.2%), with the majority of being 'All Open Access' (46%). The trend of publication in this field includes the …
Populist Supporters On Reddit: A Comparison Of Content And Behavioral Patterns Within Publics Of Supporters Of Donald Trump And Hillary Clinton, Andreas Jungherr, Oliver Posegga, Jisun An
Populist Supporters On Reddit: A Comparison Of Content And Behavioral Patterns Within Publics Of Supporters Of Donald Trump And Hillary Clinton, Andreas Jungherr, Oliver Posegga, Jisun An
Research Collection School Of Computing and Information Systems
The international rise of populism has been attributed, in part, to digital media. These media allow the backers of populists to share and distribute information independent of traditional media organizations or elites and offer communication spaces in which they can support each other and strengthen communal ties irrespective of their societal standing. Can we identify these functions in distinct usage patterns of digital media by supporters of populists? This could find expression through posting content that comports with the central tenets of populist ideology, higher activity levels, use of distinct vocabularies, and heightened levels of community building. We investigate differences …
Bibliometric Survey On Predictive Analysis Using Multiple Regression For Invoice Generation System, Chetana Nadekar, Subodh Awate, Dattatray Damse, Smita Khairnar
Bibliometric Survey On Predictive Analysis Using Multiple Regression For Invoice Generation System, Chetana Nadekar, Subodh Awate, Dattatray Damse, Smita Khairnar
Library Philosophy and Practice (e-journal)
The research is exploring the opportunities available for the application of Predictive analysis using multi regression for invoice generation systems. We work by analyzing the data generated and saved in the database of the clinic. This database contains the financial operations along and also contains other useful information that is being gathered about the patients.
We are proposing a different approach for a billing system to make the task easier for the generation of invoices for the clinic. The mapping of the relational data and using a predictive model that is based on a regression analysis that will predict the …
Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue
Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue
Publications
The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential …
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler
Engineering Technology Faculty Publications
In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from several other surveys and research papers regarding IoT, AI, and attacks with and against AI and explores the relationship between these …
Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite
Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite
Library Philosophy and Practice (e-journal)
Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …
Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil
Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil
Library Philosophy and Practice (e-journal)
The remaining useful life (RUL) estimations become one of the most essential aspects of predictive maintenance (PdM) in the era of industry 4.0. Predictive maintenance aims to minimize the downtime of machines or process, decreases maintenance costs, and increases the productivity of industries. The primary objective of this bibliometric paper is to understand the scope of literature available related to RUL prediction. Scopus database is used to perform the analysis of 1673 extracted scientific literature from the year 1985 to 2020. Based on available published documents, analysis is done on the year-wise publication data, document types, language-wise distribution of documents, …