Engineering Applications of Artificial Intelligence, Journal Year: 2024, Volume and Issue: 139, P. 109509 - 109509
Published: Oct. 28, 2024
Language: Английский
Engineering Applications of Artificial Intelligence, Journal Year: 2024, Volume and Issue: 139, P. 109509 - 109509
Published: Oct. 28, 2024
Language: Английский
Engineering Applications of Artificial Intelligence, Journal Year: 2025, Volume and Issue: 147, P. 110260 - 110260
Published: Feb. 25, 2025
Language: Английский
Citations
3Engineering Applications of Artificial Intelligence, Journal Year: 2024, Volume and Issue: 137, P. 109082 - 109082
Published: Aug. 3, 2024
Language: Английский
Citations
11Technological Forecasting and Social Change, Journal Year: 2024, Volume and Issue: 208, P. 123720 - 123720
Published: Sept. 4, 2024
Language: Английский
Citations
10Journal of Internet Commerce, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 32
Published: March 19, 2025
Language: Английский
Citations
1Electronics, Journal Year: 2024, Volume and Issue: 13(16), P. 3343 - 3343
Published: Aug. 22, 2024
As the Internet of Things (IoT) continues to revolutionize way we interact with our living spaces, concept smart homes has become increasingly prevalent. However, along convenience and connectivity offered by IoT-enabled devices in comes a range security challenges. This paper explores landscape smart-home security. In contrast similar surveys, this study also examines particularities popular categories devices, like home assistants, TVs, AR/VR, locks, sensors, etc. It various threats vulnerabilities inherent ecosystems, including unauthorized access, data breaches, device tampering. Additionally, discusses existing mechanisms protocols designed mitigate these risks, such as encryption, authentication, intrusion-detection systems. Furthermore, it highlights importance user awareness education maintaining environments. Finally, proposes future research directions recommendations for enhancing IoT, development robust best practices standards, improved authentication methods, more effective techniques. By addressing challenges, potential enhance efficiency while ensuring privacy, security, cyber-resilience can be realized.
Language: Английский
Citations
8IEEE Transactions on Computational Social Systems, Journal Year: 2024, Volume and Issue: 11(5), P. 6392 - 6406
Published: April 16, 2024
With the increasing application of technology in healthcare industry, it has become imperative to establish a robust medical information ecosystem for effective management secure storage and sharing. This article proposes healthier collaboration with main consortium chain data side chain, using multiblockchain architecture. In implementation methods this ecosystem, we store JavaScript Object Notation (JSON) format within different structures. Additionally, introduce an improved Practical Byzantine Fault Tolerant (PBFT) consensus mechanism based on point nomination system dynamic RBAC access mechanism. By simulating blockchain environment multiple nodes, analyze efficiency method terms record retrieval, mechanism, execution time. The results demonstrate that compared single structure, proposed achieves substantial 30% improvement query time efficiency. Moreover, PBFT outperforms traditional algorithm without dishonest nodes. Medical records stored JSON require shorter text records. research contributes toward enhancing security sharing among subject systems, thereby fostering alliance ecosystem.
Language: Английский
Citations
7Sustainability, Journal Year: 2025, Volume and Issue: 17(4), P. 1503 - 1503
Published: Feb. 12, 2025
This study explores how Information and Communications Technology (ICT) impacts active leisure activity participants in South Korea, focusing on constraints negotiation strategies. As ICT continues to transform experiences, this research examines whether serves as a facilitator or replacement for traditional leisure. Using survey data from 285 adult participants, the categorizes ICT’s influence based framework. Key findings reveal that while time management energy conservation strategies shape use replacement, fitness level adjustments are associated with facilitative role These insights highlight nuanced ways digital tools impact participation, especially among various demographic groups. The suggest dual either supporting substituting reflects broader trends transformation informs development of aimed at enhancing well-being through engagement.
Language: Английский
Citations
1Engineering Applications of Artificial Intelligence, Journal Year: 2024, Volume and Issue: 133, P. 108507 - 108507
Published: May 6, 2024
Since the frequency and intensity of heatwaves are expected to increase due global warming, it is crucial establish a simplified approach preventing personal heat-related illnesses as occupational hazard under extremely hot environments, by taking into account individual differences in heat strain. In light this, this study proposed forecast model for strain environments utilizing feature importance machine learning, focused on enhancing its field applicability. Using 1417 records gathered from experiments conditions, was developed four types learning algorithms (i.e., random forest, extreme gradient boosting, support vector regression, multi-layer perceptron). As result, models with principal features dry-bulb temperature, radiant relative humidity, percentage body fat) were found be most reliable, resulting small difference 0.047 °C compared reference model. biometric can easily measured simple low-cost composition test (but not physical measurement core temperature) before they put field, will aid providing more systematic efficient management system proactively illnesses. Furthermore, that applicability continuously enhanced accumulated big data field-based living-lab projects over lengthy period.
Language: Английский
Citations
4Engineering Applications of Artificial Intelligence, Journal Year: 2024, Volume and Issue: 133, P. 108389 - 108389
Published: April 13, 2024
Language: Английский
Citations
3Sensors, Journal Year: 2025, Volume and Issue: 25(1), P. 237 - 237
Published: Jan. 3, 2025
The proliferation of the Internet Things (IoT) has worsened challenge maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments connected to open networks, are susceptible physical tampering various other security attacks. Thus, robust, efficient authentication key agreement (AKA) protocols essential protect privacy during exchanges between devices servers. previous work “Provably Secure ECC-Based Anonymous Authentication Key Agreement for IoT” proposed a novel AKA scheme secure environments. They claimed their protocol offers comprehensive features, guarding against numerous potential flaws while achieving session security. However, this paper demonstrates through logical mathematical analyses that is vulnerable We conducted analysis using extended Canetti Krawczyk (eCK) model, which widely employed evaluations. This model considers scenarios where an attacker complete control over network, including ability intercept, modify, delete messages, also accounting exposure ephemeral private keys. Furthermore, we show fails meet critical requirements relies on flawed assumptions. prove our findings automated validation internet applications, recognized formal verification tool. To strengthen attack resilience, propose several recommendations advancement more robust specifically designed
Language: Английский
Citations
0