Topic Review
CS Measures for Nuclear Power Plant Protection
As digital instrumentation in Nuclear Power Plants (NPPs) is becoming increasingly complex, both attack vectors and defensive strategies are evolving based on new technologies and vulnerabilities. Continued efforts have been made to develop a variety of measures for the cyber defense of these infrastructures, which often consist in adapting security measures previously developed for other critical infrastructure sectors according to the requirements of NPPs. That being said, due to the very recent development of these solutions, there is a lack of agreement or standardization when it comes to their adoption at an industrial level.   To better understand the state of the art in NPP Cyber-Security (CS) measures, in this work, we conduct a Systematic Literature Review (SLR) to identify scientific papers discussing CS frameworks, standards, guidelines, best practices, and any additional CS protection measures for NPPs.From our literature analysis, it was evidenced that protecting the digital space in NPPs involves three main steps: (i) identification of critical digital assets; (ii) risk assessment and threat analysis; (iii) establishment of measures for NPP protection based on the defense-in-depth model. To ensure the CS protection of these infrastructures, a holistic defense-in-depth approach is suggested in order to avoid excessive granularity and lack of compatibility between different layers of protection. Additional research is needed to ensure that such a model is developed effectively and that it is based on the interdependencies of all security requirements of NPPs. 
  • 558
  • 16 Nov 2021
Topic Review
Software to Improve Verbal Communication in Children
Autism-assistive apps offer therapists and caregivers new approaches for educating and assisting individuals with autism spectrum disorder (ASD), mainly in social interaction. Even though these apps are deemed effective, they are not. These autism-assistive apps are not highly customizable, which limits their usefulness.
  • 491
  • 14 Nov 2021
Topic Review
Blockchain and e-Governance in Smart Cities
Blockchain has emerged as a transformational technology with the ability to disrupt and evolve multiple domains. As a decentralized, immutable distributed ledger, Blockchain technology is one of the most recent entrants to the comprehensive ideology of Smart Cities. The rise of urbanization and increased citizen participation have led to various technology integrations in present-day cities. E-governance in smart cities is a type of governance that aims to make effective use of information and communication technology (ICT) to improve services provided by the government to people and will increase participation in decision-making and policy formulation. This will improve governance and advance the digital transformation of government.
  • 1.6K
  • 12 Nov 2021
Topic Review
Proxy Mobile IPv6/Auxiliary Advertisement of Neighbor Detection
The technique PMIPv6/AAND (Proxy Mobile IPv6/Auxiliary Advertisement of Neighbor Detection) would introduce a novel Multiple Virtual Interface (MVI) technique in PMIPv6 to enable multi-homing. The technique supports effective inter-technology handover and solves the LL-ID swapping problem. Additional flag fields, auxiliary advertisement of neighbor detection (AAND)) fields, i.e., ‘D’ and ‘R’ are displayed in PMIPv6 message format. The new technique is known as PMIPv6/AAND, adapted from F-PMIPv6.
  • 573
  • 12 Nov 2021
Topic Review
Mathematics Problems Solving
Mathematics problems solving (MPS) has been considered for decades as the centre of mathematics teaching, as it demonstrates the ability to analyse, understand, reason and apply. At the same time, it is also considered to be specific content when highlighting it as a basic competence that students should acquire.
  • 797
  • 12 Nov 2021
Topic Review
Security Challenges and Malware Attacks in the IoT
Malware is a major security threat to the IoT, and detecting unknown malware is one of the key challenges for two reasons. First, the limitations of IoT devices, such as their low power retention capability and low computational processing capability, represent a significant challenge when aiming to apply security solutions. Second, introducing new ways to connect networks, such as cloud services, opens the door to many security attacks, such as malware attacks. Furthermore, connecting new devices that were not part of traditional networks via these new connection methods, such as smart sensors, makes applying security measures more complex. For these reasons, traditional malware detection mechanisms are not suitable for the IoT environment.
  • 1.3K
  • 10 Nov 2021
Topic Review
The Future of Factories
A digital factory refers to a new type of manufacturing production organization that simulates, evaluates, and optimizes the production processes and systems. Digital factories are not confined only to the production stage; instead, they extend to address the entire product lifecycle.
  • 535
  • 10 Nov 2021
Topic Review
Deep Learning in Causality Mining
Deep learning models for causality mining (CM) can enhance the performance of learning algorithms, improve the processing time, and increase the range of mining applications.
  • 595
  • 08 Nov 2021
Topic Review
Compression of Neural Networks
Researchers propose the value-locality-based compression (VELCRO) algorithm for neural networks. VELCRO is a method to compress general-purpose neural networks that are deployed for a small subset of focused specialized tasks.
  • 621
  • 08 Nov 2021
Topic Review
New Generation Metaheuristic Algorithms
Metaheuristics are the special branch of heuristic methods that can explore a whole problem space with different heuristic approaches by a replicated intelligent iterative process. Normally, metaheuristics stimulate the natural evolution strategy to produce convergence, which needs less parameters to tune for any certain problem. This is why metaheuristic has been implemented to large instance NP-hard problems, which leads to a similar optimization like the exact methods.
  • 745
  • 05 Nov 2021
  • Page
  • of
  • 371
Video Production Service