supported through Universiti Sains Malaysia(USM)and the Ministry of Higher Education Malaysia providing the research grant,Fundamental Research Grant Scheme(FRGS-Grant No.FRGS/1/2020/TK0/USM/02/1).
The rapid adoption of Internet of Things(IoT)technologies has introduced significant security challenges across the physical,network,and application layers,particularly with the widespread use of the Message Queue Tel...
This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems,especially collision avoidance protocols.It focuses on achieving the availability of network communication...
supported by the Open Research Fund Program of State Key Laboratory of Maritime Technology and Safety in 2024;the National Natural Science Foundation of China(Grant No.52331012);the Natural Science Foundation of Shanghai(Grant No.21ZR1426500).
The high coverage and all-weather capabilities of Synthetic Aperture Radar(SAR)image ship detection make it a widely accepted method for maritime ship positioning and identification.However,SAR ship detection faces ch...
In enterprise operations,maintaining manual rules for enterprise processes can be expensive,time-consuming,and dependent on specialized domain knowledge in that enterprise domain.Recently,rule-generation has been auto...
supported by the Student Scheme provided by Universiti Kebangsaan Malaysia with the Code TAP-20558.
A data lake(DL),abbreviated as DL,denotes a vast reservoir or repository of data.It accumulates substantial volumes of data and employs advanced analytics to correlate data from diverse origins containing various form...
funded by Universiti Teknologi PETRONAS and grants(YUTP-PRG:015PBC-011).
This study conducts a systematic literature review(SLR)of blockchain consensus mechanisms,an essential protocols that maintain the integrity,reliability,and decentralization of distributed ledger networks.The aim is t...
In the contemporary era,the death rate is increasing due to lung cancer.However,technology is continuously enhancing the quality of well-being.To improve the survival rate,radiologists rely on Computed Tomography(CT)s...
Redundancy,correlation,feature irrelevance,and missing samples are just a few problems that make it difficult to analyze software defect data.Additionally,it might be challenging to maintain an even distribution of da...
More businesses are deploying powerful Intrusion Detection Systems(IDS)to secure their data and physical assets.Improved cyber-attack detection and prevention in these systems requires machine learning(ML)approaches.T...
supported by the Scientific Research Projects of Higher Education Institutions in Hebei Province(Grant No.QN2023188);the project of Hebei University of Science and Technology(Grant No.1200752).
Quadrotor unmanned aerial vehicles(UAVs)are widely used in inspection,agriculture,express delivery,and other fields owing to their low cost and high flexibility.However,the current UAV control system has shortcomings ...