Enhancing software reliability forecasting through a hybrid ARIMA-ANN model

U Samal, A Kumar - Arabian Journal for Science and Engineering, 2024 - Springer
This paper proposes a hybrid forecasting model combining auto-regressive integrated
moving average (ARIMA) and artificial neural network (ANN) techniques to improve the …

[HTML][HTML] Smart contracts for managing the chain-of-custody of digital evidence: A practical case of study

P Santamaría, L Tobarra, R Pastor-Vargas… - Smart Cities, 2023 - mdpi.com
The digital revolution is renewing many aspects of our lives, which is also a challenge in
judicial processes, such as the Chain-of-Custody (CoC) process of any electronic evidence …

Research Progress of Acoustic Energy Harvesters Based on Nanogenerators

Y Huang, T Du, C Xiang, Y Zhang, J Si… - … Journal of Energy …, 2023 - Wiley Online Library
In the wake of the rapid development of the Internet of Things (IoT) and artificial intelligence
(AI) technology, a huge amount of wireless sensing nodes (WSNs) is urgently in demand in …

SECURING THE SMART CITY: A REVIEW OF CYBERSECURITY CHALLENGES AND STRATEGIES

JS Oliha, PW Biu, OC Obi - Engineering Science & Technology Journal, 2024 - fepbl.com
In the era of rapid urbanization and technological advancement, the emergence of smart
cities promises innovative solutions to urban challenges. However, the integration of various …

[HTML][HTML] Smart city and well-being: opinions by the guest editors

A Arghittu, G Balletto, M Dettori - Urban Science, 2023 - mdpi.com
1. Background As with technology, the concept of the Smart City has evolved over time in
line with digitisation processes and the changing needs of cities and their inhabitants …

[HTML][HTML] A Modern Approach to Securing Critical Infrastructure in Energy Transmission Networks: Integration of Cryptographic Mechanisms and Biometric Data

A Manowska, M Boros, MW Hassan, A Bluszcz… - Electronics, 2024 - mdpi.com
Energy security is a crucial issue for political, environmental, and economic reasons. This
article presents a modern approach to securing critical infrastructure in energy transmission …

[HTML][HTML] A Comparison of Monte Carlo-Based and PINN Parameter Estimation Methods for Malware Identification in IoT Networks

M Severt, R Casado-Vara, A Martín del Rey - Technologies, 2023 - mdpi.com
Malware propagation is a growing concern due to its potential impact on the security and
integrity of connected devices in Internet of Things (IoT) network environments. This study …

Collaborative robots and cyber security in industry 5.0

BA Abishek, T Kavyashree… - … on Advancements in …, 2023 - ieeexplore.ieee.org
Industry 5.0 is the rearmost industrial revolution, characterized by the integration of humans
and machines working collaboratively in a smart plant terrain which aims to integrate cyber …

Strategies and Methods Used by Information Technology Security Professionals to Secure Cloud Access Infrastructure

O Fontem - 2024 - scholarworks.waldenu.edu
Cloud computing provides data storage and access services to end users and enterprises
but requires effective access controls to protect privileged information from unauthorized and …

[HTML][HTML] Introductory Chapter: Welding in the Era of Industry 5.0

S Kumar - Welding-Materials, Fabrication Processes, and Industry …, 2024 - intechopen.com
The outstanding advancement of manufacturing and industrial processes may be seen in
the journey from Industry 1.0 to Industry 5.0 [1–5], as shown in Figure 1. With the emergence …