Topic Review
Anomaly Detection in Software-Defined Networks
One solution enabling the implementation of modern methods for managing and monitoring telecommunication networks is the concept of software-defined networks (SDN). It introduces a centralized architecture for managing computer networks that is fully programmable. With the increasing availability of computational power, contemporary machine learning has undergone a paradigm shift, placing a heightened emphasis on deep learning methodologies. The pervasive automation of various processes necessitates a critical re-evaluation of contemporary network implementations, specifically concerning security protocols and the imperative need for swift, precise responses to system failures.
  • 106
  • 08 Feb 2024
Topic Review
Authentication Paradigms in the Internet of Things
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation of robust security measures such as authentication has become paramount to safeguarding sensitive data and maintaining the integrity of connected devices. Symmetry in the IoT commonly denotes the uniformity or equilibrium in data distribution and processing across devices or nodes in a network. Leveraging symmetric patterns can enhance the robustness and scalability of IoT authentication. 
  • 113
  • 08 Feb 2024
Topic Review
Association Rule Mining in Facility Management
Maintenance represents a substantial share of work in various industries. Due to its significant financial impact, industry and research focus on improving the effectiveness of maintenance. Predictive Maintenance (PM) is one way to reduce costs and downtimes by planning maintenance work based on an asset’s actual condition rather than relying on fixed time-based maintenance cycles. Association rule mining (ARM) is a suitable method for PM tasks when data are unlabeled and less structured, as is the case in the facility management domain.
  • 73
  • 07 Feb 2024
Topic Review
Optimizing Data Processing
Intelligent applications in several areas increasingly rely on big data solutions to improve their efficiency, but the processing and management of big data incur high costs. Although cloud-computing-based big data management and processing offer a promising solution to provide scalable and abundant resources, the current cloud-based big data management platforms do not properly address the high latency, privacy, and bandwidth consumption challenges that arise when sending large volumes of user data to the cloud. Computing in the edge and fog layers is quickly emerging as an extension of cloud computing used to reduce latency and bandwidth consumption, resulting in some of the processing tasks being performed in edge/fog-layer devices. Although these devices are resource-constrained, recent increases in resource capacity provide the potential for collaborative big data processing. 
  • 73
  • 05 Feb 2024
Topic Review
Internet of Things Firmware Vulnerabilities and Auditing Techniques
Internet of Things (IoT) paradigm has been widely applied across a variety of industrial and consumer areas to facilitate greater automation and increase productivity. Higher dependability on connected devices led to a growing range of cyber security threats targeting IoT-enabled platforms, specifically device firmware vulnerabilities, often overlooked during development and deployment.
  • 103
  • 04 Feb 2024
Topic Review
Techno-Nationalism and Country of Origin
Techno-nationalism is a viewpoint that emphasizes the importance of domestic control over technology and the digital economy as a means to achieve national security and economic prosperity. It advocates for policies that support national technological advancement, protect against foreign dependency, and prioritize the development of domestic technological capabilities. The country of origin (COO) concept is crucial as it directly impacts economic independence and technological supremacy. By understanding and controlling the COO of technological products and services, a nation can reduce dependency on external tech suppliers and foster domestic innovation. Furthermore, the COO may be essential in protecting national digital infrastructure from potential foreign cyber threats and improving national cybersecurity culture. A framework is introduced with a multi-faceted approach for assessing the country of origin of digital products, incorporating 19 parameters that consider the complexities of hardware, software, and data sources.
  • 111
  • 04 Feb 2024
Topic Review
IoT-Enabled Precision Agriculture
The Internet of Things (IoT) has the potential to revolutionize agriculture by providing real-time data on crop and livestock conditions. As the network becomes denser with a decrease in the network area, there is an increase in network connectivity and a decrease in hop count. In terms of future improvements, incorporating advanced technologies such as machine learning algorithms and edge computing can enhance the performance and scalability of the proposed framework. Additionally, integrating more sophisticated sensor technologies such as drones and cameras can provide a more comprehensive understanding of the farm environment. 
  • 152
  • 02 Feb 2024
Topic Review
Management Information Systems for Tree Fruit
A farm management information system (MIS) entails record keeping based on a database management system, typically using a client-server architecture, i.e., an information system, IS, coupled with a variety of tools/methods/models for the support of operational management. A MIS developed for orchard management can be expected to address major tasks in commercial orchard operation, such as the management of irrigation, pests (weeds, insects and disease), plant nutrition, manipulation of tree physiology and structure, e.g., through pruning and phytohormone applications, and harvest, e.g., planning harvest labour, packing and marketing needs.
  • 483
  • 01 Feb 2024
Topic Review
Game Theory-Based Incentive Design in Blockchain Networks
Blockchain technology has permeated various sectors and has been lauded for its potential to instill immutability, transparency, and decentralization in systems, thereby revolutionizing traditional systems. At the core of these decentralized networks, nodes are imperative for executing and validating transactions, thereby safeguarding the integrity of the blockchain. Within this ecosystem, nodes, particularly those executing transactions encompassing native currency transfers and function executions, are pivotal yet often lack adequate incentives, in contrast to mining nodes.
  • 78
  • 31 Jan 2024
Topic Review
Zero-Trust Marine Cyberdefense for IoT-Based Communications
Integrating Explainable Artificial Intelligence (XAI) into marine cyberdefense systems can address the lack of trustworthiness and low interpretability inherent in complex black-box Network Intrusion Detection Systems (NIDS) models. XAI has emerged as a pivotal focus in achieving a zero-trust cybersecurity strategy within marine communication networks. 
  • 118
  • 31 Jan 2024
  • Page
  • of
  • 49