Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Series

2021

Institution
Keyword
Publication

Articles 1 - 30 of 38

Full-Text Articles in Computer Engineering

Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry Nov 2021

Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry

Computer Science Faculty Research

The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specific type of attack, which may leave a system vulnerable to numerous other types of attacks. A generalizable IDS that can identify a wide range of attacks within the shortest possible time has more practical value than attack-specific IDSs, which is not a trivial task to accomplish. In this …


Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh Nov 2021

Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh

Institute for Educational Development, Karachi

Since half of the century, technology has dominated the modern era. The rapid advancement of technology has reached generating artificial intelligence and artificial realities. So, virtual reality is an emerging technology and is applicable in education as well. Virtual reality is a computer-generated simulation, where people can interact within an artificial environment. Moreover, in an educational setting, such an environment provides students with a chance to get experiential learning. This paper has a systematic literature review on emerging technologies, such as virtual reality as a pedagogical tool for enhancing students’ experiential learning. This review aims to explore and understand the …


Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M Nov 2021

Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M

Library Philosophy and Practice (e-journal)

This paper will discuss catastrophe recovery and likelihood development for digital library structures. The article establishes a foundation for establishing Library continuity and disaster recovery strategies through the use of best practices. Library continuity development and catastrophe recovery are critical modules of the planning stage for a virtual digital library. Few institutions that experience a catastrophic disaster occurrence are powerless to recover always, but libraries can suggestively boost the possibility of long-term recovery of institutional digital resources by drafting a continuity and recovery strategy in preparation. This article is intended for system designers and administrators, as well as high-ranking library …


A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner Nov 2021

A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner

FIU Electronic Theses and Dissertations

Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …


Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert Oct 2021

Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert

UNL Libraries: Faculty Publications

Introduction

In the first months of the COVID-19 pandemic, it was impossible to tell if we were at the crest of a wave of new transmissions, or a trough of a much larger wave, still yet to peak. As of this writing, as colleges and universities prepare for mostly in-person fall 2021 semesters, case counts in the United States are increasing again after a decline that coincided with easier access to the COVID vaccine. Plans for a return to campus made with confidence this spring may be in doubt, as we climb the curve of what is already the second …


Adopting A Risk-Intelligent Approach To Digital Transformation: Four Traits Of Digitally Mature Organisations, Clarence Goh, Gary Pan, Poh Sun Seow, Yuanto Kusnadi, Seah Gek Choo, Cheryl Lim Oct 2021

Adopting A Risk-Intelligent Approach To Digital Transformation: Four Traits Of Digitally Mature Organisations, Clarence Goh, Gary Pan, Poh Sun Seow, Yuanto Kusnadi, Seah Gek Choo, Cheryl Lim

Research Collection School Of Accountancy

Our objective is to understand how digitally mature organisations are managing the GRC aspects of their digital transformation programmes, and identify any traits or behaviours that could inform the development of best practices.


Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith Oct 2021

Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith

Faculty Publications

The introduction of automated satellite control systems into a space-mission environment historically dominated by human-in-the-loop operations will require a more focused understanding of cybersecurity measures to ensure space system safety and security. On the ground-segment side of satellite control, the debut of privately owned communication antennas for rent and a move to cloud-based operations or mission centers will bring new requirements for cyber protection for both Department of Defense and commercial satellite operations alike. It is no longer a matter of whether automation will be introduced to satellite operations, but how quickly satellite operators can adapt to the onset of …


What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo Sep 2021

What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo

All Faculty Scholarship

To date, copyright scholarship has almost completely overlooked the linguistics and cognitive psychology literature exploring the connection between language and thought. An exploration of the two major strains of this literature, known as universal grammar (associated with Noam Chomsky) and linguistic relativity (centered around the Sapir-Whorf hypothesis), offers insights into the copyrightability of constructed languages and of the type of software packages at issue in Google v. Oracle recently decided by the Supreme Court. It turns to modularity theory as the key idea unifying the analysis of both languages and software in ways that suggest that the information filtering associated …


The Impact Of Cloud Computing On Academic Libraries, Sivankalai S Sep 2021

The Impact Of Cloud Computing On Academic Libraries, Sivankalai S

Library Philosophy and Practice (e-journal)

With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …


Online Grocery Shopping: A Staple Of The Present -- And Maybe The Future?, Henry B. Chao Aug 2021

Online Grocery Shopping: A Staple Of The Present -- And Maybe The Future?, Henry B. Chao

altREU Projects

This project aims to understand how the COVID-19 pandemic has affected people's food shopping tendencies, specifically focusing on the use of online grocers. It uses data collected by a team of researchers led out of Portland State University. This data consists of roughly 8000 surveys distributed starting in September of 2020. The survey asks respondents to discuss their demographics, household resources, and shopping tendencies.

In particular, this project wants to understand how inclined a respondent is to use online grocers based on their personal experience with COVID-19. To do this, the project uses a Latent Class Model (LCM) to classify …


Estimating Homophily In Social Networks Using Dyadic Predictions, George Berry, Antonio Sirianni, Ingmar Weber, Jisun An, Michael Macy Aug 2021

Estimating Homophily In Social Networks Using Dyadic Predictions, George Berry, Antonio Sirianni, Ingmar Weber, Jisun An, Michael Macy

Research Collection School Of Computing and Information Systems

Predictions of node categories are commonly used to estimate homophily and other relational properties in networks. However, little is known about the validity of using predictions for this task. We show that estimating homophily in a network is a problem of predicting categories of dyads (edges) in the graph. Homophily estimates are unbiased when predictions of dyad categories are unbiased. Node-level prediction models, such as the use of names to classify ethnicity or gender, do not generally produce unbiased predictions of dyad categories and therefore produce biased homophily estimates. Bias comes from three sources: sampling bias, correlation between model errors …


Vibransee: Enabling Simultaneous Visible Light Communication And Sensing, Ila Nitin Gokarn, Archan Misra Jul 2021

Vibransee: Enabling Simultaneous Visible Light Communication And Sensing, Ila Nitin Gokarn, Archan Misra

Research Collection School Of Computing and Information Systems

Driven by the ubiquitous proliferation of low-cost LED luminaires, visible light communication (VLC) has been established as a high-speed communications technology based on the high-frequency modulation of an optical source. In parallel, Visible Light Sensing (VLS) has recently demonstrated how vision-based at-a-distance sensing of mechanical vibrations (e.g., of factory equipment) can be performed using high frequency optical strobing. However, to date, exemplars of VLC and VLS have been explored in isolation, without consideration of their mutual dependencies. In this work, we explore whether and how high-throughput VLC and high-coverage VLS can be simultaneously supported. We first demonstrate the existence of …


Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr. Jun 2021

Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.

Library Philosophy and Practice (e-journal)

Working with sensors has become an area of expertise within the domain of electronic engineering. On a day to day basis, thousands of sensors are put to use around us, for instance, in smoke alarms, speedometers, motors, computers, radiators etc. to accumulate sensor data, cables that connect the sensors to the bottom station after which the information is worked on. But cabling is often expensive especially when handling large scale industrial applications [5]. For an equivalent reason, low-cost wireless networks came into the picture recently and are in high demand. A research paper we found during our review of …


Towards Adaptive, Self-Configuring Networked Unmanned Aerial Vehicles, Nirupama Bulusu, Ehsan Aryafar, Feng Liu Jun 2021

Towards Adaptive, Self-Configuring Networked Unmanned Aerial Vehicles, Nirupama Bulusu, Ehsan Aryafar, Feng Liu

Computer Science Faculty Publications and Presentations

Networked drones have the potential to transform various applications domains; yet their adoption particularly in indoor and forest environments has been stymied by the lack of accurate maps and autonomous navigation abilities in the absence of GPS, the lack of highly reliable, energy-efficient wireless communications, and the challenges of visually inferring and understanding an environment with resource-limited individual drones. We advocate a novel vision for the research community in the development of distributed, localized algorithms that enable the networked drones to dynamically coordinate to perform adaptive beam forming to achieve high capacity directional aerial communications, and collaborative machine learning to …


A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj May 2021

A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj

Library Philosophy and Practice (e-journal)

Broadcasting in Mobile ad hoc network is very crucial process and if not taken care led to Broadcast storm problem. Several Broadcasting techniques are proposed in the literature, but probabilistic broadcasting is the one the major technique which can really avoid the broadcasting storm problem. The protocols employing probabilistic broadcasting is surveyed in this bibliometric paper. The bibliometric survey aims to throw light on several types of protocols employed in Mobile ad hoc Network. The primary aim of this paper is to assess the amount of work done in the field of Probabilistic Broadcasting in Mobile ad hoc Network, as …


A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr. May 2021

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.

Library Philosophy and Practice (e-journal)

Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.

Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences, citation …


Ship-Gan: Generative Modeling Based Maritime Traffic Simulator, Chaithanya Shankaramurthy Basrur, Arambam James Singh, Arunesh Sinha, Akshat Kumar May 2021

Ship-Gan: Generative Modeling Based Maritime Traffic Simulator, Chaithanya Shankaramurthy Basrur, Arambam James Singh, Arunesh Sinha, Akshat Kumar

Research Collection School Of Computing and Information Systems

Modeling vessel movement in a maritime environment is an extremely challenging task given the complex nature of vessel behavior. Several existing multiagent maritime decision making frameworks require access to an accurate traffic simulator. We develop a system using electronic navigation charts to generate realistic and high fidelity vessel traffic data using Generative Adversarial Networks (GANs). Our proposed Ship-GAN uses a conditional Wasserstein GAN to model a vessel’s behavior. The generator can simulate the travel time of vessels across different maritime zones conditioned on vessels’ speeds and traffic intensity. Furthermore, it can be used as an accurate simulator for prior decision …


Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang May 2021

Supporting Transportation System Management And Operations Using Internet Of Things Technology, Hong Yang, Yuzhong Shen, Mecit Cetin, Zhenyu Wang

Computational Modeling & Simulation Engineering Faculty Publications

Low power wide-area network (LPWAN) technology aims to provide long range and low power wireless communication. It can serve as an alternative technology for data transmissions in many application scenarios (e.g., parking monitoring and remote flood sensing). In order to explore its feasibility in transportation systems, this project conducted a review of relevant literature to understand the current status of LPWAN applications. An online survey that targeted professionals concerned with transportation was also developed to elicit input about their experiences in using LPWAN technology for their projects. The literature review and survey results showed that LPWAN’s application in the U.S. …


Bibliometric Analysis Of Particle Swarm Optimization Techniques Used To Enhance Low-Energy Adaptive Clustering Hierarchy Protocol For Wireless Sensor Networks, Anupkumar M. Bongale Dr. Apr 2021

Bibliometric Analysis Of Particle Swarm Optimization Techniques Used To Enhance Low-Energy Adaptive Clustering Hierarchy Protocol For Wireless Sensor Networks, Anupkumar M. Bongale Dr.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network (WSN) is a network of tiny wireless sensor nodes. The sensor nodes sense information and transmit the sensed information to a data collection point known as Base Station. WSNs have gained massive popularity due to their incredible benefits, and active research is ongoing for the past two decades. The primary concern with WSN is that the sensor operates on a limited power supply. Due to the nature of applications of WSNs and the hostile environment where the sensors are deployed, providing unlimited power or energy supply is not an option. Hence, the research work mainly focuses on …


Owsnet: Towards Real-Time Offensive Words Spotting Network For Consumer Iot Devices, Bharath Sudharsan, Sweta Malik, Peter Corcoran, Pankesh Patel, John G. Breslin, Muhammad Intizar Ali Apr 2021

Owsnet: Towards Real-Time Offensive Words Spotting Network For Consumer Iot Devices, Bharath Sudharsan, Sweta Malik, Peter Corcoran, Pankesh Patel, John G. Breslin, Muhammad Intizar Ali

Publications

Every modern household owns at least a dozen of IoT devices like smart speakers, video doorbells, smartwatches, where most of them are equipped with a Keyword spotting(KWS) system-based digital voice assistant like Alexa. The state-of-the-art KWS systems require a large number of operations, higher computation, memory resources to show top performance. In this paper, in contrast to existing resource-demanding KWS systems, we propose a light-weight temporal convolution based KWS system named OWSNet, that can comfortably execute on a variety of IoT devices around us and can accurately spot multiple keywords in real-time without disturbing the device's routine functionalities.

When OWSNet …


Lecture 08: Partial Eigen Decomposition Of Large Symmetric Matrices Via Thick-Restart Lanczos With Explicit External Deflation And Its Communication-Avoiding Variant, Zhaojun Bai Apr 2021

Lecture 08: Partial Eigen Decomposition Of Large Symmetric Matrices Via Thick-Restart Lanczos With Explicit External Deflation And Its Communication-Avoiding Variant, Zhaojun Bai

Mathematical Sciences Spring Lecture Series

There are continual and compelling needs for computing many eigenpairs of very large Hermitian matrix in physical simulations and data analysis. Though the Lanczos method is effective for computing a few eigenvalues, it can be expensive for computing a large number of eigenvalues. To improve the performance of the Lanczos method, in this talk, we will present a combination of explicit external deflation (EED) with an s-step variant of thick-restart Lanczos (s-step TRLan). The s-step Lanczos method can achieve an order of s reduction in data movement while the EED enables to compute eigenpairs in batches along with a number …


Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni Apr 2021

Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni

Library Philosophy and Practice (e-journal)

Background: This study aims to analyze the work done in domain of cloud computing and edge computing using artificial intelligence from 2015 to 2021. Recent research shows the bibliometric methods are useful for such kind of analysis. Thus in this paper analysis is carried out using the bibliometric methods.

Methods: different articles on edge computing and edge intelligence were retrieved using one of the most popular database- Scopus. The research articles are considered between 2015 to 2021. Scopus analyzer is used for getting some analysis results such as documents by year, source, country and so on. VOSviewer Version 1.6.16 is …


Lecture 11: The Road To Exascale And Legacy Software For Dense Linear Algebra, Jack Dongarra Apr 2021

Lecture 11: The Road To Exascale And Legacy Software For Dense Linear Algebra, Jack Dongarra

Mathematical Sciences Spring Lecture Series

In this talk, we will look at the current state of high performance computing and look at the next stage of extreme computing. With extreme computing, there will be fundamental changes in the character of floating point arithmetic and data movement. In this talk, we will look at how extreme-scale computing has caused algorithm and software developers to change their way of thinking on implementing and program-specific applications.


Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina Apr 2021

Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina

Library Philosophy and Practice (e-journal)

This study aims to discuss digital government and regulation, analyzed through the bibliometric approach with the Scopus database for the last 20 years and visualized through the VOSviewer software version 1.6.16. The results indicate that the topic of e-government has become essentially prominent and has been the most discussed in the past two decades. Approximately 41.1% of digital government and regulation articles are classified under the subject area of 'Computer Science', continued by Social Sciences (18.3%), and Business, Management and Accounting (10.2%), with the majority of being 'All Open Access' (46%). The trend of publication in this field includes the …


Populist Supporters On Reddit: A Comparison Of Content And Behavioral Patterns Within Publics Of Supporters Of Donald Trump And Hillary Clinton, Andreas Jungherr, Oliver Posegga, Jisun An Mar 2021

Populist Supporters On Reddit: A Comparison Of Content And Behavioral Patterns Within Publics Of Supporters Of Donald Trump And Hillary Clinton, Andreas Jungherr, Oliver Posegga, Jisun An

Research Collection School Of Computing and Information Systems

The international rise of populism has been attributed, in part, to digital media. These media allow the backers of populists to share and distribute information independent of traditional media organizations or elites and offer communication spaces in which they can support each other and strengthen communal ties irrespective of their societal standing. Can we identify these functions in distinct usage patterns of digital media by supporters of populists? This could find expression through posting content that comports with the central tenets of populist ideology, higher activity levels, use of distinct vocabularies, and heightened levels of community building. We investigate differences …


Bibliometric Survey On Predictive Analysis Using Multiple Regression For Invoice Generation System, Chetana Nadekar, Subodh Awate, Dattatray Damse, Smita Khairnar Feb 2021

Bibliometric Survey On Predictive Analysis Using Multiple Regression For Invoice Generation System, Chetana Nadekar, Subodh Awate, Dattatray Damse, Smita Khairnar

Library Philosophy and Practice (e-journal)

The research is exploring the opportunities available for the application of Predictive analysis using multi regression for invoice generation systems. We work by analyzing the data generated and saved in the database of the clinic. This database contains the financial operations along and also contains other useful information that is being gathered about the patients.

We are proposing a different approach for a billing system to make the task easier for the generation of invoices for the clinic. The mapping of the relational data and using a predictive model that is based on a regression analysis that will predict the …


Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue Feb 2021

Differential Privacy For Industrial Internet Of Things: Opportunities, Applications And Challenges, Bin Jiang, Houbing Song, Jianqiang Li, Guanghui Yue

Publications

The development of Internet of Things (IoT) brings new changes to various fields. Particularly, industrial Internet of Things (IIoT) is promoting a new round of industrial revolution. With more applications of IIoT, privacy protection issues are emerging. Specially, some common algorithms in IIoT technology such as deep models strongly rely on data collection, which leads to the risk of privacy disclosure. Recently, differential privacy has been used to protect user-terminal privacy in IIoT, so it is necessary to make in-depth research on this topic. In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential …


Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler Feb 2021

Role Of Artificial Intelligence In The Internet Of Things (Iot) Cybersecurity, Murat Kuzlu, Corinne Fair, Ozgur Guler

Engineering Technology Faculty Publications

In recent years, the use of the Internet of Things (IoT) has increased exponentially, and cybersecurity concerns have increased along with it. On the cutting edge of cybersecurity is Artificial Intelligence (AI), which is used for the development of complex algorithms to protect networks and systems, including IoT systems. However, cyber-attackers have figured out how to exploit AI and have even begun to use adversarial AI in order to carry out cybersecurity attacks. This review paper compiles information from several other surveys and research papers regarding IoT, AI, and attacks with and against AI and explores the relationship between these …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …


Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil Jan 2021

Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil

Library Philosophy and Practice (e-journal)

The remaining useful life (RUL) estimations become one of the most essential aspects of predictive maintenance (PdM) in the era of industry 4.0. Predictive maintenance aims to minimize the downtime of machines or process, decreases maintenance costs, and increases the productivity of industries. The primary objective of this bibliometric paper is to understand the scope of literature available related to RUL prediction. Scopus database is used to perform the analysis of 1673 extracted scientific literature from the year 1985 to 2020. Based on available published documents, analysis is done on the year-wise publication data, document types, language-wise distribution of documents, …