An Entanglement-Aware Middleware for Digital Twins DOI Creative Commons
Paolo Bellavista, Nicola Bicocchi, Mattia Fogli

et al.

ACM Transactions on Internet of Things, Journal Year: 2024, Volume and Issue: 5(4), P. 1 - 25

Published: Oct. 14, 2024

The development of the Digital Twin (DT) approach is tilting research from initial approaches that aim at promoting early adoption to sophisticated attempts develop, deploy, and maintain applications based on DTs. In this context, we propose a highly dynamic distributed ecosystem where containerized DTs co-evolve with an orchestration middleware. provide digitalized representations targeted physical systems, while middleware monitors re-configures deployed in light application constraints, available resources, quality cyber-physical entanglement. First, lay out reference scenario. Then, discuss limitations current identify set requirements shape both Subsequently, describe blueprint architecture meets those requirements. Finally, report empirical evidence feasibility effectiveness proof-of-concept implementation proposed ecosystem.

Language: Английский

Intelligent Cloud Migration: AI & ML for a Smoother Transition DOI

Aiyaz SD

SSRN Electronic Journal, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 1, 2025

Language: Английский

Citations

0

Design of advanced intrusion detection in cybersecurity using ensemble of deep learning models with an improved beluga whale optimization algorithm DOI
Fatimah Alhayan,

Nuha Alruwais,

Mohammad Alamgeer

et al.

Alexandria Engineering Journal, Journal Year: 2025, Volume and Issue: 121, P. 90 - 102

Published: Feb. 26, 2025

Language: Английский

Citations

0

Leveraging Large Language Models and Machine Learning for Smart Contract Vulnerability Detection DOI
S M Mostaq Hossain,

Amani Altarawneh,

Jesse Roberts

et al.

2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Journal Year: 2025, Volume and Issue: unknown, P. 00577 - 00583

Published: Jan. 6, 2025

Language: Английский

Citations

0

A Multi‐cluster Security Framework for Healthcare IoT: The Synergy of Redundant Byzantine Fault Tolerance with Extensions and Coati‐Based Network DOI Open Access
Rohit Beniwal, Vinod Kumar, Vishal Sharma

et al.

Transactions on Emerging Telecommunications Technologies, Journal Year: 2025, Volume and Issue: 36(3)

Published: March 1, 2025

ABSTRACT The rapid integration of Internet Things (IoT) devices into healthcare systems has revolutionized medical care delivery but also introduced significant security challenges. Ensuring secure communication, privacy preservation, and system resilience in resource‐constrained IoT networks is critical, given the sensitivity data involved potential for malicious attacks. This research addresses these concerns by proposing a Multi‐cluster Security Framework Healthcare IoT, designed to overcome existing limitations scalability. framework combines Redundant Byzantine Fault Tolerance with Extensions (RB‐BFT X) CoatiNet, leveraging lightweight cryptographic techniques, role‐based access control, dynamic routing algorithms. RB‐BFT X enhances intra‐cluster through fault tolerance anomaly detection, while CoatiNet optimizes inter‐cluster communication using adaptive self‐recovery mechanisms inspired coatis' natural behavior. Experimental results demonstrate framework's efficacy, achieving high detection rate 98.20%, minimal latency, stable throughput under various adversarial conditions. Compared methods, it outperforms maintaining network lifetime reducing false positives, even increased activity. These findings have implications enhancing efficiency networks. proposed methodology ensures robust protection, efficient adaptability evolving threats, contributing safer more reliable systems.

Language: Английский

Citations

0

Changing Landscape in Insurance Sector DOI
Krishnendu Ghosh,

Sandhya Rai

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 249 - 276

Published: March 14, 2025

The incorporation of advanced technologies offers transformative possibility in the evolving landscape insurance industry. present chapter is an attempt to explore impact digital revolution and applications blockchain technology sector. This will integration Blockchain technology, machine language (ML), Internet Things (IoT) artificial intelligence (AI) streamlining operations examine role Artificial Technologies driven Smart Contract industry, benefits same insurer-customer relationship challenges implement same. provide future direction adoption industry across globe.

Language: Английский

Citations

0

Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review DOI Creative Commons
Haluk Eren, O. Karaduman, Muharrem Tuncay Gençoğlu

et al.

Applied Sciences, Journal Year: 2025, Volume and Issue: 15(6), P. 3225 - 3225

Published: March 15, 2025

Blockchain-based data storage methods offer strong integrity, decentralized security, and transparent access control but also face scalability challenges, high computational costs, complex management. This study provides a comprehensive review of on-chain, off-chain, hybrid architectures, analyzing their security vulnerabilities, performance trade-offs, industry-specific applications. On-chain ensures immutability, by storing directly on the blockchain; however, it is associated with transaction costs limitations. In contrast, off-chain solutions reduce enhance outside blockchain introduce risks related to integrity in environments. Hybrid approaches aim balance cost, integrating strengths both on-chain solutions. examines fundamental components blockchain-based systems, sector-specific applications, technical challenges they present. Additionally, explores trade-offs between decentralization, offering insights into optimization strategies. As result, this evaluates protocols, efficiency sustainability distributed solutions, contributing future research field.

Language: Английский

Citations

0

Digital Twins Verification and Validation Approach Through The Quintuple Helix Conceptual Framework DOI Open Access
Ana Perišić, Branko Perišić

Published: July 23, 2024

The concept of Digital Twins has been in the field for a long time, constantly challenging specification, modeling, design, implementation, and exploitation complex cyber-physical systems. Despite various foundations, standards, platforms Systems Engineering, there are ongoing challenges with Verification Validation methodology. This study aims to establish generic framework that addresses aspects Twinning. multifaceted nature problem requires raising abstraction level both Real (Actual) Virtual domains, effective dissemination information resources, design inspired by verification validation. proposed combines Quintuple Helix model Problem Operational Domains Twin, Solution Implementation Execution Domain as bridge links them. dimensions follow Meta Object Facility layers (Instance, Model, Meta-model, Meta-meta-model) mapping over five Helices. Embedding complexity reduction mechanisms builds suite extendible verifiable digital twinning simulation real-time scenarios.

Language: Английский

Citations

2

Special Issue on Digital Twin for Future Networks and Emerging IoT Applications (DT4IoT) DOI
Akram Hakiri, Sadok Ben Yahia, Aniruddha Gokhale

et al.

Future Generation Computer Systems, Journal Year: 2024, Volume and Issue: 161, P. 81 - 84

Published: June 28, 2024

Language: Английский

Citations

1

Leveraging Machine Learning to Improve Access Control Mechanisms in Data Warehousing DOI Open Access
Alok Singh Chauhan

African Journal of Biological Sciences, Journal Year: 2024, Volume and Issue: 6(12), P. 2650 - 2658

Published: July 5, 2024

This paper delves into integrating Machine Learning (ML) algorithms Access Control Mechanisms (ACM) within Data Warehouses (DW) to enhance both security and operational efficiency. Traditional ACMs, notably role-based access control (RBAC), often struggle with adapting dynamic threats complex patterns. ML tackles these issues by improving decision accuracy through real-time anomaly detection adaptive based on user behavior contextual insights. The study examines the implementation benefits of ML-enhanced ACMs in DW environments, highlighting their effectiveness mitigating unauthorized insider threats. research also addresses critical considerations, such as privacy protections interpretability models, crucial for maintaining regulatory compliance stakeholder trust. Ultimately, this emphasizes ML's pivotal contribution advancing practices (DWs) proposes future directions measures evolving digital landscapes.

Language: Английский

Citations

1

Digital Twins Verification and Validation Approach through the Quintuple Helix Conceptual Framework DOI Open Access
Ana Perišić, Branko Perišić

Electronics, Journal Year: 2024, Volume and Issue: 13(16), P. 3303 - 3303

Published: Aug. 20, 2024

The concept of digital twins has been in the field for a long time, constantly challenging specification, modeling, design, implementation, and exploitation complex cyber–physical systems. Despite various foundations, standards, platforms systems engineering, there are ongoing challenges with verification validation methodology. This study aims to establish generic framework that addresses aspects twinning. multifaceted nature problem requires raising abstraction level both real (actual) virtual domains, effective dissemination information resources, design inspired by validation. proposed combines quintuple helix model operational domains twin, solution implementation execution domain as bridge links them. Verification dimensions follow meta object facility layers (instance, model, meta-model, meta-meta-model) mapping over five helices. Embedding complexity reduction mechanisms builds suite extendible verifiable twinning simulation real-time scenarios. application main conceptual real-world example aids this research’s intentions. is matter further research endeavors.

Language: Английский

Citations

1