Kybernetes,
Journal Year:
2024,
Volume and Issue:
53(13), P. 72 - 100
Published: Nov. 27, 2024
Purpose
As
social
networks
have
developed
to
be
a
ubiquitous
platform
of
public
opinion
spreading,
it
becomes
more
and
crucial
for
maintaining
security
stability
by
accurately
predicting
various
trends
dissemination
in
networks.
Considering
the
fact
that
online
is
dynamic
process
full
uncertainty
complexity,
this
study
establishes
novel
conformable
fractional
discrete
grey
model
with
linear
time-varying
parameters,
namely
CFTDGM(1,1)
model,
accurate
prediction
trends.
Design/methodology/approach
First,
accumulation
difference
operators
are
employed
build
enhancing
traditional
integer-order
parameters.
Then,
improve
forecasting
accuracy,
base
value
correction
term
introduced
optimize
iterative
model.
Next,
differential
evolution
algorithm
selected
determine
optimal
order
proposed
through
comparison
whale
optimization
particle
swarm
algorithm.
The
least
squares
method
utilized
estimate
parameter
values
In
addition,
effectiveness
tested
event
about
“IG
team
winning
championship”.
Finally,
we
conduct
empirical
analysis
on
two
hot
events
regarding
“Chengdu
toddler
mauled
Rottweiler”
“Mayday
band
suspected
lip-syncing,”
further
assess
ability
applicability
seven
other
existing
models.
Findings
test
case
recent
reveal
outperforms
most
models
terms
performance.
Therefore,
chosen
forecast
development
these
events.
results
indicate
attention
both
will
decline
slowly
over
next
three
days.
Originality/value
A
help
has
higher
accuracy
feasibility
trend
prediction.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(16), P. 3343 - 3343
Published: Aug. 22, 2024
As
the
Internet
of
Things
(IoT)
continues
to
revolutionize
way
we
interact
with
our
living
spaces,
concept
smart
homes
has
become
increasingly
prevalent.
However,
along
convenience
and
connectivity
offered
by
IoT-enabled
devices
in
comes
a
range
security
challenges.
This
paper
explores
landscape
smart-home
security.
In
contrast
similar
surveys,
this
study
also
examines
particularities
popular
categories
devices,
like
home
assistants,
TVs,
AR/VR,
locks,
sensors,
etc.
It
various
threats
vulnerabilities
inherent
ecosystems,
including
unauthorized
access,
data
breaches,
device
tampering.
Additionally,
discusses
existing
mechanisms
protocols
designed
mitigate
these
risks,
such
as
encryption,
authentication,
intrusion-detection
systems.
Furthermore,
it
highlights
importance
user
awareness
education
maintaining
environments.
Finally,
proposes
future
research
directions
recommendations
for
enhancing
IoT,
development
robust
best
practices
standards,
improved
authentication
methods,
more
effective
techniques.
By
addressing
challenges,
potential
enhance
efficiency
while
ensuring
privacy,
security,
cyber-resilience
can
be
realized.
IEEE Transactions on Computational Social Systems,
Journal Year:
2024,
Volume and Issue:
11(5), P. 6392 - 6406
Published: April 16, 2024
With
the
increasing
application
of
technology
in
healthcare
industry,
it
has
become
imperative
to
establish
a
robust
medical
information
ecosystem
for
effective
management
secure
storage
and
sharing.
This
article
proposes
healthier
collaboration
with
main
consortium
chain
data
side
chain,
using
multiblockchain
architecture.
In
implementation
methods
this
ecosystem,
we
store
JavaScript
Object
Notation
(JSON)
format
within
different
structures.
Additionally,
introduce
an
improved
Practical
Byzantine
Fault
Tolerant
(PBFT)
consensus
mechanism
based
on
point
nomination
system
dynamic
RBAC
access
mechanism.
By
simulating
blockchain
environment
multiple
nodes,
analyze
efficiency
method
terms
record
retrieval,
mechanism,
execution
time.
The
results
demonstrate
that
compared
single
structure,
proposed
achieves
substantial
30%
improvement
query
time
efficiency.
Moreover,
PBFT
outperforms
traditional
algorithm
without
dishonest
nodes.
Medical
records
stored
JSON
require
shorter
text
records.
research
contributes
toward
enhancing
security
sharing
among
subject
systems,
thereby
fostering
alliance
ecosystem.
Engineering Applications of Artificial Intelligence,
Journal Year:
2024,
Volume and Issue:
133, P. 108507 - 108507
Published: May 6, 2024
Since
the
frequency
and
intensity
of
heatwaves
are
expected
to
increase
due
global
warming,
it
is
crucial
establish
a
simplified
approach
preventing
personal
heat-related
illnesses
as
occupational
hazard
under
extremely
hot
environments,
by
taking
into
account
individual
differences
in
heat
strain.
In
light
this,
this
study
proposed
forecast
model
for
strain
environments
utilizing
feature
importance
machine
learning,
focused
on
enhancing
its
field
applicability.
Using
1417
records
gathered
from
experiments
conditions,
was
developed
four
types
learning
algorithms
(i.e.,
random
forest,
extreme
gradient
boosting,
support
vector
regression,
multi-layer
perceptron).
As
result,
models
with
principal
features
dry-bulb
temperature,
radiant
relative
humidity,
percentage
body
fat)
were
found
be
most
reliable,
resulting
small
difference
0.047
°C
compared
reference
model.
biometric
can
easily
measured
simple
low-cost
composition
test
(but
not
physical
measurement
core
temperature)
before
they
put
field,
will
aid
providing
more
systematic
efficient
management
system
proactively
illnesses.
Furthermore,
that
applicability
continuously
enhanced
accumulated
big
data
field-based
living-lab
projects
over
lengthy
period.
Sensors,
Journal Year:
2025,
Volume and Issue:
25(1), P. 237 - 237
Published: Jan. 3, 2025
The
proliferation
of
the
Internet
Things
(IoT)
has
worsened
challenge
maintaining
data
and
user
privacy.
IoT
end
devices,
often
deployed
in
unsupervised
environments
connected
to
open
networks,
are
susceptible
physical
tampering
various
other
security
attacks.
Thus,
robust,
efficient
authentication
key
agreement
(AKA)
protocols
essential
protect
privacy
during
exchanges
between
devices
servers.
previous
work
“Provably
Secure
ECC-Based
Anonymous
Authentication
Key
Agreement
for
IoT”
proposed
a
novel
AKA
scheme
secure
environments.
They
claimed
their
protocol
offers
comprehensive
features,
guarding
against
numerous
potential
flaws
while
achieving
session
security.
However,
this
paper
demonstrates
through
logical
mathematical
analyses
that
is
vulnerable
We
conducted
analysis
using
extended
Canetti
Krawczyk
(eCK)
model,
which
widely
employed
evaluations.
This
model
considers
scenarios
where
an
attacker
complete
control
over
network,
including
ability
intercept,
modify,
delete
messages,
also
accounting
exposure
ephemeral
private
keys.
Furthermore,
we
show
fails
meet
critical
requirements
relies
on
flawed
assumptions.
prove
our
findings
automated
validation
internet
applications,
recognized
formal
verification
tool.
To
strengthen
attack
resilience,
propose
several
recommendations
advancement
more
robust
specifically
designed
Frontiers in Environmental Science,
Journal Year:
2025,
Volume and Issue:
12
Published: Jan. 3, 2025
This
study
proposes
a
more
efficient
discrete
grey
prediction
model
to
describe
the
seasonalvariation
trends
of
carbon
dioxide
emissions.
The
setting
bernoulli
parameter
and
time
powerterm
in
new
ensures
that
can
capture
trend
nonlinear
changesin
sequence.
At
same
time,
inclusion
dummy
variables
allows
for
direct
simulationof
seasonal
fluctuations
emissions
without
need
additional
treatment
theseasonality
optimal
search
model’s
hyperparameters
is
achieved
using
MPA
algorithm.
constructed
applied
monthly
U.S.
datafrom
January
2003
December
2022,
total
240
months.
trained
on
216
months
2020,
data
from
2021
2022
usedfor
prediction,
which
then
compared
with
actual
values.
results
show
proposed
modelexhibits
higher
forecasting
performance
SARIMA
other
models.
Therefore,
this
methodcan
effectively
simulate
variation
emissions,
providing
valuablereference
information
relevant
departments
formulate
effective
policies.