Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine learning (11)
- Security (4)
- Web archiving (4)
- Artificial intelligence (3)
- Deep learning (3)
-
- Privacy (3)
- Web archives (3)
- ADHD (2)
- Algorithms (2)
- Big data (2)
- Classification (2)
- Computer science (2)
- Cybersecurity (2)
- Data modeling (2)
- Engineering (2)
- Framework (2)
- GDPR (2)
- Geophysical image processing (2)
- High performance computing (2)
- Image fusion (2)
- Image resolution (2)
- Neural networks (2)
- Performance modeling (2)
- Pragmatism (2)
- Robotics (2)
- Telecommunications (2)
- Text mining (2)
- AI Ethics (1)
- AVISPA (1)
- Adoption (1)
- Publication
-
- Computer Ethics - Philosophical Enquiry (CEPE) Proceedings (13)
- Computer Science Faculty Publications (13)
- Computer Science Theses & Dissertations (6)
- Computational Modeling & Simulation Engineering Faculty Publications (5)
- Computational Modeling & Simulation Engineering Theses & Dissertations (4)
-
- Electrical & Computer Engineering Theses & Dissertations (4)
- Electrical & Computer Engineering Faculty Publications (3)
- VMASC Publications (3)
- Civil & Environmental Engineering Theses & Dissertations (2)
- Engineering Management & Systems Engineering Theses & Dissertations (2)
- Information Technology & Decision Sciences Faculty Publications (2)
- Theses and Dissertations in Business Administration (2)
- Bioelectrics Publications (1)
- Communication Disorders & Special Education Faculty Publications (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- Engineering Technology Faculty Publications (1)
- Graduate Program in International Studies Theses & Dissertations (1)
- Mathematics & Statistics Faculty Publications (1)
- News Items (1)
- OES Faculty Publications (1)
- STEMPS Faculty Publications (1)
- Virginia Journal of Science (1)
- Publication Type
Articles 1 - 30 of 69
Full-Text Articles in Physical Sciences and Mathematics
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
Ldakm-Eiot: Lightweight Device Authentication And Key Management Mechanism For Edge-Based Iot Deployment, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park
VMASC Publications
In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication …
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
Iomt Malware Detection Approaches: Analysis And Research Challenges, Mohammad Wazid, Ashok Kumar Das, Joel J.P.C. Rodrigues, Sachin Shetty, Youngho Park
VMASC Publications
The advancement in Information and Communications Technology (ICT) has changed the entire paradigm of computing. Because of such advancement, we have new types of computing and communication environments, for example, Internet of Things (IoT) that is a collection of smart IoT devices. The Internet of Medical Things (IoMT) is a specific type of IoT communication environment which deals with communication through the smart healthcare (medical) devices. Though IoT communication environment facilitates and supports our day-to-day activities, but at the same time it has also certain drawbacks as it suffers from several security and privacy issues, such as replay, man-in-the-middle, impersonation, …
Overlap Matrix Completion For Predicting Drug-Associated Indications, Menhyun Yang, Huimin Luo, Yaohang Li, Fang-Xiang Wu, Jianxin Wang
Overlap Matrix Completion For Predicting Drug-Associated Indications, Menhyun Yang, Huimin Luo, Yaohang Li, Fang-Xiang Wu, Jianxin Wang
Computer Science Faculty Publications
Identification of potential drug-associated indications is critical for either approved or novel drugs in drug repositioning. Current computational methods based on drug similarity and disease similarity have been developed to predict drug-disease associations. When more reliable drug- or disease-related information becomes available and is integrated, the prediction precision can be continuously improved. However, it is a challenging problem to effectively incorporate multiple types of prior information, representing different characteristics of drugs and diseases, to identify promising drug-disease associations. In this study, we propose an overlap matrix completion (OMC) for bilayer networks (OMC2) and tri-layer networks (OMC3) to predict potential drug-associated …
A Transformative Concept: From Data Being Passive Objects To Data Being Active Subjects, Hans-Peter Plag, Shelley-Ann Jules-Plag
A Transformative Concept: From Data Being Passive Objects To Data Being Active Subjects, Hans-Peter Plag, Shelley-Ann Jules-Plag
OES Faculty Publications
The exploitation of potential societal benefits of Earth observations is hampered by users having to engage in often tedious processes to discover data and extract information and knowledge. A concept is introduced for a transition from the current perception of data as passive objects (DPO) to a new perception of data as active subjects (DAS). This transition would greatly increase data usage and exploitation, and support the extraction of knowledge from data products. Enabling the data subjects to actively reach out to potential users would revolutionize data dissemination and sharing and facilitate collaboration in user communities. The three core elements …
Epa Bus Tour Showcases Hampton Roads Region Is A Living Laboratory For Coastal Resilience, News @ Odu
Epa Bus Tour Showcases Hampton Roads Region Is A Living Laboratory For Coastal Resilience, News @ Odu
News Items
No abstract provided.
A Study Of Existing Cross-Site Scripting Detection And Prevention Techniques Using Xampp And Virtualbox, Jalen Mack, Yen-Hung (Frank) Hu, Mary Ann Hoppa
A Study Of Existing Cross-Site Scripting Detection And Prevention Techniques Using Xampp And Virtualbox, Jalen Mack, Yen-Hung (Frank) Hu, Mary Ann Hoppa
Virginia Journal of Science
Most operating websites experience a cyber-attack at some point. Cross-site Scripting (XSS) attacks are cited as the top website risk. More than 60 percent of web applications are vulnerable to them, and they ultimately are responsible for over 30 percent of all web application attacks. XSS attacks are complicated, and they often are used in conjunction with social engineering techniques to cause even more damage. Although prevention techniques exist, hackers still find points of vulnerability to launch their attacks. This project explored what XSS attacks are, examples of popular attacks, and ways to detect and prevent them. Using knowledge gained …
Paper-Based Flexible Electrode Using Chemically-Modified Graphene And Functionalized Multiwalled Carbon Nanotube Composites For Electrophysiological Signal Sensing, Md Faruk Hossain, Jae Sang Heo, John Nelson, Insoo Kim
Paper-Based Flexible Electrode Using Chemically-Modified Graphene And Functionalized Multiwalled Carbon Nanotube Composites For Electrophysiological Signal Sensing, Md Faruk Hossain, Jae Sang Heo, John Nelson, Insoo Kim
Bioelectrics Publications
Flexible paper-based physiological sensor electrodes were developed using chemically-modified graphene (CG) and carboxylic-functionalized multiwalled carbon nanotube composites (f@MWCNTs). A solvothermal process with additional treatment was conducted to synthesize CG and f@MWCNTs to make CG-f@MWCNT composites. The composite was sonicated in an appropriate solvent to make a uniform suspension, and then it was drop cast on a nylon membrane in a vacuum filter. A number of batches (0%~35% f@MWCNTs) were prepared to investigate the performance of the physical characteristics. The 25% f@MWCNT-loaded composite showed the best adhesion on the paper substrate. The surface topography and chemical bonding of the proposed CG-f@MWCNT …
Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson
Demonstration Of Visible And Near Infrared Raman Spectrometers And Improved Matched Filter Model For Analysis Of Combined Raman Signals, Alexander Matthew Atkinson
Electrical & Computer Engineering Theses & Dissertations
Raman spectroscopy is a powerful analysis technique that has found applications in fields such as analytical chemistry, planetary sciences, and medical diagnostics. Recent studies have shown that analysis of Raman spectral profiles can be greatly assisted by use of computational models with achievements including high accuracy pure sample classification with imbalanced data sets and detection of ideal sample deviations for pharmaceutical quality control. The adoption of automated methods is a necessary step in streamlining the analysis process as Raman hardware becomes more advanced. Due to limits in the architectures of current machine learning based Raman classification models, transfer from pure …
Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin
Computational Analysis Of Antipode Algorithms For The Output Feedback Hopf Algebra, Lance Berlin
Electrical & Computer Engineering Theses & Dissertations
The feedback interconnection of two systems written in terms of Chen-Fliess series can be described explicitly in terms of the antipode of the output feedback Hopf algebra. At present, there are three known computational approaches to calculating this antipode: the left coproduct method, the right coproduct method, and the derivation method. Each of these algorithms is defined recursively, and thus becomes computationally expensive quite quickly. This motivates the need for a more complete understanding of the algorithmic complexity of these methods, as well as the development of new approaches for determining the Hopf algebra antipode. The main goals of this …
Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti
Communication Capability For A Simulation-Based Test And Evaluation Framework For Autonomous Systems, Ntiana Sakioti
Computational Modeling & Simulation Engineering Theses & Dissertations
The design and testing process for collaborative autonomous systems can be extremely complex and time-consuming, so it is advantageous to begin testing early in the design. A Test & Evaluation (T&E) Framework was previously developed to enable the testing of autonomous software at various levels of mixed reality. The Framework assumes a modular approach to autonomous software development, which introduces the possibility that components are not in the same stage of development. The T&E Framework allows testing to begin early in a simulated environment, with the autonomous software methodically migrating from virtual to augmented to physical environments as component development …
A Low-Cost Soft Robotic Hand Exoskeleton For Use In Therapy Of Limited Hand–Motor Function, Grant Rudd, Liam Daly, Vukica Jovanovic, Filip Cukov
A Low-Cost Soft Robotic Hand Exoskeleton For Use In Therapy Of Limited Hand–Motor Function, Grant Rudd, Liam Daly, Vukica Jovanovic, Filip Cukov
Engineering Technology Faculty Publications
We present the design and validation of a low-cost, customizable and 3D-printed anthropomorphic soft robotic hand exoskeleton for rehabilitation of hand injuries using remotely administered physical therapy regimens. The design builds upon previous work done on cable actuated exoskeleton designs by implementing the same kinematic functionality, but with the focus shifted to ease of assembly and cost effectiveness as to allow patients and physicians to manufacture and assemble the hardware necessary to implement treatment. The exoskeleton was constructed solely from 3D-printed and widely available of-the-shelf components. Control of the actuators was realized using an Arduino microcontroller, with a custom-designed shield …
Success Factors Impacting Artificial Intelligence Adoption --- Perspective From The Telecom Industry In China, Hong Chen
Theses and Dissertations in Business Administration
As the core driving force of the new round of informatization development and the industrial revolution, the disruptive achievements of artificial intelligence (AI) are rapidly and comprehensively infiltrating into various fields of human activities. Although technologies and applications of AI have been widely studied, and factors that affect AI adoption are identified in existing literature, the impact of success factors on AI adoption remains unknown. Accordingly, the main study of this paper proposes a framework to explore the effects of success factors on AI adoption by integrating the technology, organization, and environment (TOE) framework and diffusion of innovation (DOI) theory. …
Early Information Access To Alleviate Emergency Department Congestion, Anjee Gorkhali
Early Information Access To Alleviate Emergency Department Congestion, Anjee Gorkhali
Theses and Dissertations in Business Administration
Alleviating Emergency Department (ED) congestion results in shorter hospital stay which not only reduces the cost of medical procedure but also increase the hospital performance. Length of patient stay is used to determine the hospital performance. Organization Information Processing (OIPT) Theory is used to explain the impact of information access and availability on the information processing need and ability of a hospital. Technical devices such as RFID that works as “Auto Identification tags” is suggested to increase the information availability as well as the information processing capability of the hospitals. This study suggests that the OIPT needs to be further …
Novel Use Of Neural Networks To Identify And Detect Electrical Infrastructure Performance, Evan Pierre Savaria
Novel Use Of Neural Networks To Identify And Detect Electrical Infrastructure Performance, Evan Pierre Savaria
Computer Science Theses & Dissertations
Electrical grid maintenance and repairs are crucial services that keep America’s lights on. Electrical service providers make it their priority to uphold minimal interruptions to this service. Electricity is essential for modern technology within the home, such as cooking, refrigeration, and hot water. Organizations, such as schools, hospitals, and military bases, cannot properly function or operate without power. When analyzing the current electrical infrastructure, it is evident that considerable components of the power grid are aging and in need of replacement. Additionally, threats and damage continue to occur. These damages occur not only due to simple, single power line failure …
Scalable Parallel Delaunay Image-To-Mesh Conversion For Shared And Distributed Memory Architectures, Daming Feng
Scalable Parallel Delaunay Image-To-Mesh Conversion For Shared And Distributed Memory Architectures, Daming Feng
Computer Science Theses & Dissertations
Mesh generation is an essential component for many engineering applications. The ability to generate meshes in parallel is critical for the scalability of the entire Finite Element Method (FEM) pipeline. However, parallel mesh generation applications belong to the broader class of adaptive and irregular problems, and are among the most complex, challenging, and labor intensive to develop and maintain. In this thesis, we summarize several years of the progress that we made in a novel framework for highly scalable and guaranteed quality mesh generation for finite element analysis in three dimensions. We studied and developed parallel mesh generation algorithms on …
Using Feature Extraction From Deep Convolutional Neural Networks For Pathological Image Analysis And Its Visual Interpretability, Wei-Wen Hsu
Electrical & Computer Engineering Theses & Dissertations
This dissertation presents a computer-aided diagnosis (CAD) system using deep learning approaches for lesion detection and classification on whole-slide images (WSIs) with breast cancer. The deep features being distinguishing in classification from the convolutional neural networks (CNN) are demonstrated in this study to provide comprehensive interpretability for the proposed CAD system using the domain knowledge in pathology. In the experiment, a total of 186 slides of WSIs were collected and classified into three categories: Non-Carcinoma, Ductal Carcinoma in Situ (DCIS), and Invasive Ductal Carcinoma (IDC). Instead of conducting pixel-wise classification (segmentation) into three classes directly, a hierarchical framework with the …
Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly
Aggregating Private And Public Web Archives Using The Mementity Framework, Matthew R. Kelly
Computer Science Theses & Dissertations
Web archives preserve the live Web for posterity, but the content on the Web one cares about may not be preserved. The ability to access this content in the future requires the assurance that those sites will continue to exist on the Web until the content is requested and that the content will remain accessible. It is ultimately the responsibility of the individual to preserve this content, but attempting to replay personally preserved pages segregates archived pages by individuals and organizations of personal, private, and public Web content. This is misrepresentative of the Web as it was. While the Memento …
Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari
Developing Algorithms To Detect Incidents On Freeways From Loop Detector And Vehicle Re-Identification Data, Biraj Adhikari
Civil & Environmental Engineering Theses & Dissertations
A new approach for testing incident detection algorithms has been developed and is presented in this thesis. Two new algorithms were developed and tested taking California #7, which is the most widely used algorithm to date, and SVM (Support Vector Machine), which is considered one of the best performing classifiers, as the baseline for comparisons. Algorithm #B in this study uses data from Vehicle Re-Identification whereas the other three algorithms (California #7, SVM and Algorithm #A) use data from a double loop detector for detection of an incident. A microscopic traffic simulator is used for modeling three types of incident …
Mementomap: An Archive Profile Dissemination Framework, Sawood Alam, Michele C. Weigle, Michael L. Nelson
Mementomap: An Archive Profile Dissemination Framework, Sawood Alam, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
We introduce MementoMap, a framework to express and disseminate holdings of web archives (archive profiles) by themselves or third parties. The framework allows arbitrary, flexible, and dynamic levels of details in its entries that fit the needs of archives of different scales. This enables Memento aggregators to significantly reduce wasted traffic to web archives.
Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson
Impact Of Http Cookie Violations In Web Archives, Sawood Alam, Michele C. Weigle, Michael L. Nelson
Computer Science Faculty Publications
Certain HTTP Cookies on certain sites can be a source of content bias in archival crawls. Accommodating Cookies at crawl time, but not utilizing them at replay time may cause cookie violations, resulting in defaced composite mementos that never existed on the live web. To address these issues, we propose that crawlers store Cookies with short expiration time and archival replay systems account for values in the Vary header along with URIs.
Hacking The Extended Mind: The Security Implications Of The New Metaphysics, Robin L. Zebrowski
Hacking The Extended Mind: The Security Implications Of The New Metaphysics, Robin L. Zebrowski
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Computer security expert Paul Syverson has argued that there is a computer security equivalent of gaslighting: where a clever adversary could convince some system that some component that is not really a part of the system is in fact a part of the system. If non-biological items from our environments (or even pieces of our environments themselves) can be part of our minds (the standard Extended Mind hypothesis, EM), they are therefore part of our selves, and therefore subject to Syverson’s worry about boundary in a way that has not been explored before. If some version of EM holds, then …
Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen
Confucian Robot Ethics, Qin Zhu, Tom Williams, Ruchen Wen
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In the literature of artificial moral agents (AMAs), most work is influenced by either deontological or utilitarian frameworks. It has also been widely acknowledged that these Western “rule-based” ethical theories have encountered both philosophical and computing challenges. To tackle these challenges, this paper explores a non-Western, role-based, Confucian approach to robot ethics. In this paper, we start by providing a short introduction to some theoretical fundamentals of Confucian ethics. Then, we discuss some very preliminary ideas for constructing a Confucian approach to robot ethics. Lastly, we briefly share a couple of empirical studies our research group has recently conducted that …
Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider
Difference Between Algorithmic Processing And The Process Of Lifeworld (Lebenswelt), Domenico Schneider
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The following article compares the temporality of the life-world with the digital processing. The temporality of the life-world is determined to be stretched and spontaneous. The temporality of the digital is given by discrete step-by-step points of time. Most ethical issues can be traced back to a mismatch of these two ways of processing. This creates a foundation for the ethics of the digital processing. Methodologically, phenomenological considerations are merged with media-philosophical considerations in the article.
Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers
Rethinking Algorithmic Bias Through Phenomenology And Pragmatism, Johnathan C. Flowers
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In 2017, Amazon discontinued an attempt at developing a hiring algorithm which would enable the company to streamline its hiring processes due to apparent gender discrimination. Specifically, the algorithm, trained on over a decade’s worth of resumes submitted to Amazon, learned to penalize applications that contained references to women, that indicated graduation from all women’s colleges, or otherwise indicated that an applicant was not male. Amazon’s algorithm took up the history of Amazon’s applicant pool and integrated it into its present “problematic situation,” for the purposes of future action. Consequently, Amazon declared the project a failure: even after attempting to …
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith W. Miller
Autonomous Vehicles And The Ethical Tension Between Occupant And Non-Occupant Safety, Jason Borenstein, Joseph Herkert, Keith W. Miller
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Autonomous vehicle manufacturers, people inside an autonomous vehicle (occupants), and people outside the vehicle (non-occupants) are among the distinct stakeholders when addressing ethical issues inherent in systems that include autonomous vehicles. As responses to recent tragic cases illustrate, advocates for autonomous vehicles tend to focus on occupant safety, sometimes to the exclusion of non-occupant safety. Thus, we aim to examine ethical issues associated with non-occupant safety, including pedestrians, bicyclists, motorcyclists, and riders of motorized scooters. We also explore the ethical implications of technical and policy ideas that some might propose to improve non-occupant safety. In addition, if safety (writ large) …
What To Do When Privacy Is Gone, James Brusseau
What To Do When Privacy Is Gone, James Brusseau
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Today’s ethics of privacy is largely dedicated to defending personal information from big data technologies. This essay goes in the other direction. It considers the struggle to be lost, and explores two strategies for living after privacy is gone. First, total exposure embraces privacy’s decline, and then contributes to the process with transparency. All personal information is shared without reservation. The resulting ethics is explored through a big data version of Robert Nozick’s Experience Machine thought experiment. Second, transient existence responds to privacy’s loss by ceaselessly generating new personal identities, which translates into constantly producing temporarily unviolated private information. The …
Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky
Responding To Some Challenges Posed By The Re-Identification Of Anonymized Personal Data, Herman T. Tavani, Frances S. Grodzinsky
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
In this paper, we examine a cluster of ethical controversies generated by the re-identification of anonymized personal data in the context of big data analytics, with particular attention to the implications for personal privacy. Our paper is organized into two main parts. Part One examines some ethical problems involving re-identification of personally identifiable information (PII) in large data sets. Part Two begins with a brief description of Moor and Weckert’s Dynamic Ethics (DE) and Nissenbaum’s Contextual Integrity (CI) Frameworks. We then investigate whether these frameworks, used together, can provide us with a more robust scheme for analyzing privacy concerns that …
Information Privacy: Not Just Gdpr, Danilo Bruschi
Information Privacy: Not Just Gdpr, Danilo Bruschi
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The "information rush" which is characterizing the current phase of the information age calls for actions aimed at enforcing the citizens' right to privacy. Since the entire information life-cycle (collection, manipulation, storing) is now carried out by digital technologies, most of such actions consists of the adoption of severe measures (both organizational and technological) aimed at improving the security of computer systems, as in the case of the EU General Data Protection Regulation. Usually, data processors which comply with these requirements are exempted by any other duty. Unfortunately recent trends in the computer attack field show that even the adoption …
Human Supremacy As Posthuman Risk, Daniel Estrada
Human Supremacy As Posthuman Risk, Daniel Estrada
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of public policy. Posthumanism is an historical and cultural situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on Rosi Braidotti’s critical posthumanism and the critique of ideal theory in Charles Mills and Serene Khader to address the use of human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis leads to identifying a set of risks posed by human supremacist policy in a posthuman context, specifically …
Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie
Keeping Anonymity At The Consumer Behavior On The Internet: Proof Of Sacrifice, Sachio Horie
Computer Ethics - Philosophical Enquiry (CEPE) Proceedings
The evolution of the Internet and AI technology has made it possible for the government and the businesses to keep track of their personal lives. GAFA continues to collect information unintended by the individuals. It is a threat that our privacy is violated in this way. In order to solute such problems, it is important to consider a mechanism that enables us to be peaceful lives while protecting privacy in the Internet society.
This paper focuses on the consumption behavior on the Internet and addresses anonymity. We consider some network protocols that enable sustainable consensus by combining anonymity methods such …