Protecting Autonomous UAVs from GPS Spoofing and Jamming: A Comparative Analysis of Detection and Mitigation Techniques DOI
Princess Chimmy Joeaneke,

Onyinye Obioha-Val,

Oluwaseun Oladeji Olaniyi

и другие.

SSRN Electronic Journal, Год журнала: 2024, Номер unknown

Опубликована: Янв. 1, 2024

Язык: Английский

Evaluating the Trade-offs between Wireless Security and Performance in IoT Networks: A Case Study of Web Applications in AI-Driven Home Appliances DOI Open Access
Christopher Uzoma Asonze,

Olumide Samuel Ogungbemi,

Favour Amarachi Ezeugwa

и другие.

Journal of Engineering Research and Reports, Год журнала: 2024, Номер 26(8), С. 411 - 432

Опубликована: Авг. 16, 2024

The integration of the Internet Things (IoT) with artificial intelligence (AI) is transforming home appliances into smarter, more responsive tools that enhance daily living. However, this technological fusion introduces significant security challenges, necessitating a careful balance between and performance within IoT networks. First, study answers question trade-offs measures metrics in web applications for AI-driven appliances, second, how can these be optimized to ensure both robust high system performance? Using qualitative content analysis, identified key flaws application architectures, while quantitative analysis assessed impact protocols on such as latency, throughput, CPU usage. Atlas.ti Cisco’s Packet Tracer were utilized thematic coding network simulation, respectively, multivariate regression quantified influences protocols. results revealed enhanced protocols, encryption authentication, significantly performance, increasing latency by an average 50 milliseconds reducing throughput 10% under peak loads. Additionally, usage increased up 75% high-threat scenarios. proposed security-performance optimization framework dynamically adjusts based current threat assessments operational demands, aiming sustain ensuring security. These findings have real-world design implementation offering roadmap manufacturers device without compromising performance. By adopting adaptive leveraging edge computing, improve user satisfaction trust smart technologies.

Язык: Английский

Процитировано

4

Headlines to Hard-Lines: Media Intervention in Managing Bullying and Cancel Culture in the Entertainment Industry DOI Open Access
Amaka Debie Samuel-Okon

Asian Journal of Advanced Research and Reports, Год журнала: 2024, Номер 18(9), С. 71 - 89

Опубликована: Авг. 30, 2024

This research examines the complex dynamics of bullying and cancel culture within Nigerian entertainment industry, focusing specifically on impacts exerted by social media socio-economic factors. Employing a mixed-method approach that incorporates thematic sentiment analyses academic literature spanning from 2015 to 2024, study identifies predominantly negative surrounding these phenomena. Detailed analysis reveals profound psychological celebrities, exemplified increased instances anxiety depression. It also acknowledges dual nature celebrity influence, both as victims perpetuators online aggression, significantly shaped their public interactions portrayals. The further delineates how economic disparities heighten aggressive behaviors, with specific cases illustrating stress contributes virulence among different groups. In response, proposes several targeted interventions: establishment comprehensive digital literacy program tailored for professionals, creation an industry ombudsman adjudicate disputes, development AI-powered early warning system detecting potential harassment campaigns, implementation "Digital Wellness" certification companies adhering prescribed best practices in managing interactions. These recommendations are designed not only mitigate challenges identified but promote more resilient, ethical, supportive Nigeria. paper discusses models implementing, monitoring, evaluating measures ensure effectiveness sustainability, aiming forge pathway towards substantial reform.

Язык: Английский

Процитировано

3

Social relationships and location information based routing algorithm in opportunistic networks DOI

Guanghui Wei,

Feng Zhang, Gang Xu

и другие.

Internet of Things, Год журнала: 2024, Номер unknown, С. 101425 - 101425

Опубликована: Ноя. 1, 2024

Язык: Английский

Процитировано

0

Protecting Autonomous UAVs from GPS Spoofing and Jamming: A Comparative Analysis of Detection and Mitigation Techniques DOI
Princess Chimmy Joeaneke,

Onyinye Obioha-Val,

Oluwaseun Oladeji Olaniyi

и другие.

SSRN Electronic Journal, Год журнала: 2024, Номер unknown

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

0