-
81
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
Published 2016-12-01“…In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. …”
Get full text
Article -
82
Sistem Kendali Perangkat Elektronik Jarak Jauh Berbasis Jaringan Nirkabel Menggunakan Secure Shell (SSH) dan robot Operating System (ROS)
Published 2020-12-01“…Metodologi yang digunakan untuk mengontrol perangkat elektronik pada penelitian ini adalah menggunakan Remote Access Control (RAC) berbasis protokol SSH. Pemanfaatan wireless tethering dan aplikasi mobile SSH dapat digunakan untuk mengirim perintah ROS message dari smartphone ke Raspberry Pi untuk mengontrol pin GPIO Raspberry Pi agar aktif high atau aktif low. …”
Get full text
Article -
83
Integration of Artificial Intelligence and Blockchain Technology in Healthcare and Agriculture
Published 2022-01-01“…Recently, blockchain technology has emerged as a potentially transformative option for enhancing data management, access control, and integrity inside healthcare systems. …”
Get full text
Article -
84
Multiorder Fusion Data Privacy-Preserving Scheme for Wireless Sensor Networks
Published 2017-01-01“…At present, the technology of data privacy protection in wireless sensor networks has become a hot research topic, mainly for data aggregation, data query, and access control of data privacy protection. In this paper, multiorder fusion data privacy-preserving scheme (MOFDAP) is proposed. …”
Get full text
Article -
85
Facial Recognition Databases: Recent Developments and Review of Methods
Published 2023-12-01“… Facial recognition is one of the most important biometrics that many researchers are increasingly studying, as it is used in various applications such as surveillance, security, law enforcement, information, person identification, smart cards, access control, etc. There is a fundamental relationship between the development of facial recognition algorithms and the possibility of the existence of databases of different faces that influence the appearance of the face in a constrained manner. …”
Get full text
Article -
86
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01“…Furthermore, the model overcomes the static access control limitations of MLS by incorporating ZT’s automated dynamic access capabilities, significantly improving responsiveness to anomalous behaviours. …”
Get full text
Article -
87
A REAL TIME FACE RECOGNITION SYSTEM USING ALEXNET DEEP CONVOLUTIONAL NETWORK TRANSFER LEARNING MODEL
Published 2021-10-01“…In various applications such as access control system, security, attendance management etc., it has been widely used for authentication and identification purposes. …”
Get full text
Article -
88
Personal Authentication Using Multifeatures Multispectral Palm Print Traits
Published 2015-01-01“…Multispectral palm print biometric system is a promising biometric technology for use in various applications including banking solutions, access control, hospital, construction, and forensic applications. …”
Get full text
Article -
89
Optimization of cyber security through the implementation of AI technologies
Published 2025-02-01“…For example, threats and attacks may be caused in the absence of legislation, ethical standardization, support system, and lack of access control. The governance system, therefore, will put a lot of effort into communicating, identifying, and enforcing the principles of security to moderate risk. …”
Get full text
Article -
90
AN ENHANCED MULTIMODAL BIOMETRIC SYSTEM BASED ON CONVOLUTIONAL NEURAL NETWORK
Published 2021-10-01“…In this paper, we developed a face-iris multimodal biometric recognition system based on convolutional neural network for feature extraction, fusion at feature level, training and matching to reduce dimensionality, error rate and improve the recognition accuracy suitable for an access control. Convolutional Neural Network is based on deep supervised learning model and was employed for training, classification, and testing of the system. …”
Get full text
Article -
91
A virtual slotframe technique for reliable multi-hop IEEE 802.15.4e time-slotted channel hopping network
Published 2018-07-01“…Time-slotted channel hopping is one of the medium access control modes defined in IEEE 802.15.4e. Although time-slotted channel hopping provides high reliability, it cannot be achieved automatically. …”
Get full text
Article -
92
A Digital Twin Comprehensive Monitoring System for Ship Equipment
Published 2024-12-01“…In addition, the system optimises the user experience through multi-round feedback testing, and ensures data security and privacy protection through multi-layer encryption, identity verification, and role-based access control. A case study indicates that the proposed system effectively monitors equipment status and provides fault warnings, and has broad application prospects and practical value. …”
Get full text
Article -
93
Assessment of Records Management Practices at Uganda College of Commerce Kabale.
Published 2024“…Findings revealed various aspects of records management practices, including creation, storage, access control, retention, monitoring, and disposal procedures. …”
Get full text
Thesis -
94
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
Published 2019-01-01“…Integration of authentication technologies with IoT ensures secure data retrieval and robust access control. This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature. …”
Get full text
Article -
95
دور تحلیلات البیانات الضخمة فى انترنت الأشیاء : دراسة تحلیلیة مقارنة
Published 2020-04-01“…. One of the most common security problems in IoT applications with bigdata is data center security, access control, redundant data filtering. One of the standards of open source Internet of Things platforms isstandards of integration, security and confidentiality, protocols,visualization support, databases. One of the most used big data analytics platforms is Hadoop, with apercentage of 90%, followed by Map R with 72.3%. …”
Get full text
Article -
96
Reliable and Energy Efficient Protocol for MANET Multicasting
Published 2016-01-01“…Our proposal is based on a tone system to provide more efficiency and better performance, and it combines solutions over the Medium Access Control (MAC) layer. The protocol consists of a new construction method for mobile nodes using a clustering approach that depends on distance and remaining energy to provide more stability and to reduce energy consumption. …”
Get full text
Article -
97
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 84% of the surveyed companies have information system access control. About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
98
INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK
Published 2017-11-01“…About 84% of the surveyed companies have information system access control. About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
Get full text
Article -
99
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks
Published 2018-11-01“…The current and comprehensive communication quality of nodes are employed to reflect the short- and long-term forwarding behaviors of nodes, and the normal packet loss caused by unstable channels and medium-access-control layer collisions is considered. The adaptive reward and penalty parameters of a detection learning automata are determined by the comprehensive communication quality of the node and the voting of its neighbors to reward normal nodes or punish malicious ones. …”
Get full text
Article -
100
Performance Evaluation of a Communication Protocol for Vital Signs Sensors Used for the Monitoring of Athletes
Published 2014-06-01“…In this paper, we present results of system's performance evaluation for the IEEE 802.15.4 standard, including the physical (PHY) layer and media access control (MAC) sublayer, in order to collect and store large sets of athletes’ data as well as providing results about network values such as end-to-end delay, load, and throughput captured from global and objects statistics.…”
Get full text
Article