Matthias R. Brust, Grégoire Danoy, Daniel H. Stolfi, Pascal Bouvry
AbstractUnmanned Aerial Vehicles (UAVs) have quickly become one of the promising
Internet-of-Things (IoT) devices for smart cities. Thanks to their mobility,
agility, and onboard sensors’ customizability, UAVs have already demonstrated
immense potential for numerous commercial applications. The UAVs expansion will
come at the price of a dense, high-speed and dynamic traffic prone to UAVs going
rog... hiện toàn bộ
Elisa Bertino, Mohammad R. Jahanshahi, Ankush Singla, Rih‐Teng Wu
AbstractThis paper addresses the problem of efficient and effective data
collection and analytics for applications such as civil infrastructure
monitoring and emergency management. Such problem requires the development of
techniques by which data acquisition devices, such as IoT devices, can: (a)
perform local analysis of collected data; and (b) based on the results of such
analysis, autonomously ... hiện toàn bộ
Ramzi Khezzar, Abdelrahman Moursi, Zaher Al Aghbari
AbstractHate speech has become a phenomenon on social media platforms, such as
Twitter. These websites and apps that were initially designed to facilitate our
expression of free speech, are sometimes being used to spread hate towards each
other. In the Arab region, Twitter is a very popular social media platform and
thus the number of tweets that contain hate speech is increasing rapidly. Many
twe... hiện toàn bộ
AbstractThe development of 5G has enabled the autonomous vehicles (AVs) to have
full control over all functions. The AV acts autonomously and collects travel
data based on various smart devices and sensors, with the goal of enabling it to
operate under its own power. However, the collected data is affected by several
sources that degrade the forecasting accuracy. To manage large amounts of
traffic... hiện toàn bộ
AbstractThe realm of cybersecurity places significant importance on early
ransomware detection. Feature selection is critical in this context, as it
enhances detection accuracy, mitigates overfitting, and reduces training time by
eliminating irrelevant and redundant data. However, iterative feature selection
techniques tend to select the best-performing subset of features through an
iterative proc... hiện toàn bộ
Zheng Xu, Deepak Kumar Jain, S. Neelakandan, Jemal Abawajy
The supply chain network is one of the most important areas of focus in the
majority of business circumstances. Blockchain technology is a feasible choice
for secure information sharing in a supply chain network. Despite the fact that
maintaining security at all levels of the blockchain is difficult, cryptographic
methods are commonly used in existing works. Effective supply chain management
(SCM)... hiện toàn bộ
Current mobile platforms pose many privacy risks for the users. Android
applications (apps) request access to device resources and data, such as
storage, GPS location, camera, microphone, SMS, phone identity, and network
information. Legitimate mobile apps, advertisements (ads), and malware all
require access to mobile resources and data to function properly. Therefore, it
is difficult for the use... hiện toàn bộ
Shatha Ghareeb, Abir Jaafar Hussain, Dhiya Al-Jumeily, Wasiq Khan, Rawaa Al-Jumeily, Thar Baker, Ahmed Al Shammaa, Mohammed Khalaf
In this paper, a novel application of machine learning algorithms is presented
for student levelling. In multicultural countries such as UAE, there are various
education curriculums where the sector of private schools and quality assurance
is supervising various private schools for many nationalities. As there are
various education curriculums in United Arab Emirates, specifically Abu Dhabi,
to me... hiện toàn bộ
Yunkai Bai, Jungmin Park, Mark Tehranipoor, Domenic Forte
In recent years, with the rise of IoT technology, wireless Cyber-Physical
Systems (CPS) have become widely deployed in critical infrastructure, including
power generation, military systems, and autonomous and unmanned vehicles. The
introduction of network connectivity for data transfer, cloud support, etc.,
into CPS, can lead to malware injection. Meanwhile, outsourcing of advanced
technology node... hiện toàn bộ
Awais Manzoor, Malik Ali Judge, Saif ul Islam, Nabil Neggaz, Laith Abulaigh, Ishfaq Ahmad
Energy management strategies are crucial to efficiently scheduling appliances
and preventing peak generation due to increased energy demand. It is essential
to manage the demand and supply of energy based on the consumer’s consumption
patterns using various heuristic optimization techniques. Additionally, the
end-user is more concerned with minimizing electricity costs and reducing
peak-to-average... hiện toàn bộ