Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- case-studyJanuary 2024
VoWi‐Fi security threats: Address resolution protocol attack and countermeasures
AbstractB5G/6G networks are facing challenges in the deployment of additional base stations. However, Taiwan's four major operators have launched VoWi‐Fi calling services to maintain signal quality and coverage for customers. These services pose ...
VoWi‐Fi call service is a vital access solution in the B5G/6G network. The authors proposed a defence algorithm that enables future apps or device manufacturers to assess the safety of the calling environment. image image
- case-studyDecember 2023
The Case of the UK's Government Digital Service: The Professionalisation of a Paradigmatic Public Digital Agency
Digital Government: Research and Practice (DGOV), Volume 4, Issue 4Article No.: 28, Pages 1–15https://doi.org/10.1145/3630024This case study explores the evolution of the UK's Government Digital Service (GDS) since its inception in 2011. GDS is seen by many as the gold standard digital agency, copied in multiple instances and praised for its achievements. Drawing on expert ...
- case-studyNovember 2023
- case-studyNovember 2023
CR‐Net: Robot grasping detection method integrating convolutional block attention module and residual module
IET Computer Vision (CVI2), Volume 18, Issue 3April 2024, Pages 420–433https://doi.org/10.1049/cvi2.12252AbstractGrasping detection, which involves identifying and assessing the grasp ability of objects by robotic systems, has garnered significant attention in recent years due to its pivotal role in the development of robotic systems and automated assembly ...
In order to solve the problem of low detection accuracy in robot grasping detection, a new model is proposed in this paper, which uses the attention module to extract RGB and depth channels. Then, the feature fusion module is used to combine these ...
- case-studySeptember 2023
NGMA‐based intergrated communication and computing for 6G‐enabled cognitive radio networks
AbstractAccording to the urgent low latency and the heavy computation tasks demands required for sixth‐generation (6G) wireless networks, the authors introduce the conventional resource allocation algorithms, including the game theory, artificial‐...
The computational complexity of convolution methods is extremely high for real‐time computation works, hence the resource allocation would be a challenge for considering the latency‐critical application tasks. For the sake of tackling this problem, ...
- case-studySeptember 2023
Implementation of Italian industry 4.0 quantum testbed in Turin
- Nicola Corrias,
- Ilaria Vagniluca,
- Saverio Francesconi,
- Claudia De Lazzari,
- Nicola Biagi,
- Marco Menchetti,
- Giovanni Lombardi,
- Antonino Scordato,
- Valerio Gionco,
- Roberto Mercinelli,
- Annachiara Pagano,
- Maurizio Valvo,
- Orlando Tovar,
- Giorgio Giacalone,
- Paolo Brizzi,
- Tommaso Occhipinti,
- Alessandro Zavatta,
- Davide Bacco
IET Quantum Communication (QTC2), Volume 5, Issue 1March 2024, Pages 46–51https://doi.org/10.1049/qtc2.12074AbstractThe security of data communications is one of the crucial challenges that our society is facing today. Quantum Key Distribution (QKD) is one of the most prominent methods for guaranteeing ultimate security based on the laws of quantum physics. ...
Quantum key distribution is one of the most prominent methods for guaranteeing ultimate security based on the laws of quantum physics. We report the results obtained during the Italian Industry 4.0 Quantum Testbed (II4QuTe) project where we realised a ...
- case-studyAugust 2023
Analysis of outage performance in a 6G‐V2X communications system utilising free‐space optical quantum key distribution
IET Quantum Communication (QTC2), Volume 4, Issue 4December 2023, Pages 191–199https://doi.org/10.1049/qtc2.12067AbstractQuantum‐based technologies will provide system engineers with new capabilities for securing data communications. The UK AirQKD project has implemented a Free‐Space Optical Quantum Key Distribution (QKD) system to enable the continuous generation ...
The UK AirQKD project has implemented a Free‐Space Optical (FSO) Quantum Key Distribution (QKD) system and one use case is Vehicle‐to‐Everything (V2X) communications. This work examines how FSO‐QKD could integrate into a V2X architecture and examines line‐...
- case-studyAugust 2023
Subject Matter Expert (SME) Onboarding 101: Improving development efficiency and course quality through SME training
eLearn (ELEARN), Volume 2023, Issue 808-01-2023, Article No.: 2https://doi.org/10.1145/3613916.3606021A common challenge for instructional designers and administrators of online programs is ensuring that projects are completed within the development timeframe and course content meets high standards for quality. This article describes a training course ...
- case-studyJune 2023
Formal verification of a telerehabilitation system through an abstraction and refinement approach using uppaal
AbstractFormal methods are proven techniques that provide a rigorous mathematical basis to software development. In particular, they allow the quality of development to be effectively improved by making accurate and explicit modelling, so that anomalies ...
The specifications of medical applications require to be formally verified. Associating UML modelling and timed automata is useful to support the specification phase before the implementation. Abstraction and refinement are used to face the complexity of ...
- case-studyJune 2023
Creating PublicSpaces: Centering Public Values in Digital Infrastructures
Digital Government: Research and Practice (DGOV), Volume 4, Issue 2Article No.: 9, Pages 1–13https://doi.org/10.1145/3582578Institutions like public and universities face conflicts of values when using surveillant digital tools: organizations bound to protect the privacy and respect their autonomy of their constituents - which we term “values-led organizations” - find those ...
- case-studyApril 2023
How Can the Artificial Intelligence of Things Create Public Value? Lessons Learned from Use Cases
Digital Government: Research and Practice (DGOV), Volume 4, Issue 1Article No.: 5, Pages 1–11https://doi.org/10.1145/3580604The Artificial Intelligence of Things (AIoT) has the potential to create new public value. However, its application in government is in an early stage. This study identifies three technological capabilities—sensing, analytics, and controlling—as building ...
- case-studyApril 2023
Understanding the Use of Emerging Technologies in the Public Sector: A Review of Horizon 2020 Projects
Digital Government: Research and Practice (DGOV), Volume 4, Issue 1Article No.: 4, Pages 1–28https://doi.org/10.1145/3580603The main purpose of this article is to provide an up-to-date understanding of the utilization and deployment of emerging technologies in the public sector, as this is reflected through 19 recently funded Horizon 2020 research projects. For the needs of ...
- case-studyMarch 2023
More Than Just Algorithms: A discussion with Alfred Spector, Peter Norvig, Chris Wiggins, Jeannette Wing, Ben Fried, and Michael Tingley
Queue (QUEUE), Volume 21, Issue 1January/February 2023, Pages: 10, Pages 102–129https://doi.org/10.1145/3587481Dramatic advances in the ability to gather, store, and process data have led to the rapid growth of data science and its mushrooming impact on nearly all aspects of the economy and society. Data science has also had a huge effect on academic disciplines ...
- case-studyFebruary 2023
- case-studyJanuary 2023
A federated learning scheme meets dynamic differential privacy
CAAI Transactions on Intelligence Technology (CIT2), Volume 8, Issue 3September 2023, Pages 1087–1100https://doi.org/10.1049/cit2.12187AbstractFederated learning is a widely used distributed learning approach in recent years, however, despite model training from collecting data become to gathering parameters, privacy violations may occur when publishing and sharing models. A dynamic ...
- case-studySeptember 2022
The Arrival of Zero Trust: What Does it Mean?
Queue (QUEUE), Volume 20, Issue 4July/August 2022, Pages: 40, Pages 61–79https://doi.org/10.1145/3561826It used to be that enterprise cybersecurity was all castle and moat. First, secure the perimeter and then, in terms of what went on inside that, Trust, but verify. The perimeter, of course, was the corporate network. But what does that even mean at this ...
- case-studyMay 2022
FHIR: Reducing Friction in the Exchange of Healthcare Data: A discussion with James Agnew, Pat Helland, and Adam Cole
Queue (QUEUE), Volume 20, Issue 2March/April 2022, Pages: 10, Pages 67–88https://doi.org/10.1145/3534861With the full clout of the Centers for Medicare and Medicaid Services currently being brought to bear on healthcare providers to meet high standards for patient data interoperability and accessibility, it would be easy to assume the only reason this goal ...
- case-studyMarch 2022
A preimage attack on reduced gimli‐hash with unbalanced squeezing phase
IET Information Security (ISE2), Volume 17, Issue 1January 2023, Pages 66–79https://doi.org/10.1049/ise2.12060AbstractIn Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed gimli, a 384‐bit permutation with 24 rounds, which aims to provide high performance on various platforms. In 2019, the full‐round (24 rounds) gimli ...
- case-studyMarch 2022
Economic decision‐making systems in critical times: The case of ‘Bolsa Familia’ in Brazil
Cognitive Computation and Systems (CCS2), Volume 4, Issue 3September 2022, Pages 304–315https://doi.org/10.1049/ccs2.12056AbstractKahneman's theory of two systems assumes that human decision making in Economy is based on two cognitive systems, one that is automatic, intuitive and mostly unconscious, and one that is reflexive, rational and fully conscious. The authors ...
- case-studyFebruary 2022
Model study of target discrimination in concurrent auditory events
Cognitive Computation and Systems (CCS2), Volume 4, Issue 3September 2022, Pages 294–303https://doi.org/10.1049/ccs2.12052AbstractWith the development of automation technology in human‐machine interface, the traditional visual display no longer met the needs of complicated control systems, while auditory display has become an important part of human‐machine interface design. ...