Article
Computer Science, Information Systems
Bhanu Chander, Kumaravelan Gopalakrishnan
Summary: Thanks to the progress in Micro-Electro-Mechanical technologies and the improved user-friendliness of low-cost telecommunications, novel healthcare delivery services utilizing non-connection identification electronic components like RFID have emerged. These services include patient monitoring, object traceability, drug administration system, and Telecare medicine information system (TMIS). This paper proposes an efficient and secure authentication protocol for TMIS, which has been proven to be well-suited for TMIS through performance analysis in Scyther and AVISPA tools.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Hardware & Architecture
Isil Kurt, Fatih Alagoez, Mete Akguen
Summary: Radio Frequency Identification (RFID) technology is widely used for tracking and identifying objects, but it raises serious security and privacy concerns for individuals with tags. To solve these issues, various security protocols have been proposed, but many suffer from scalability problems. Our proposed RFID authentication protocol eliminates the need for a backend search and uses Physically Unclonable Functions (PUFs) for secure tag storage, providing constant-time identification and improved performance compared to existing protocols. It ensures destructive privacy for tag holders in case of reader corruption and enables offline readers to maintain privacy.
Article
Computer Science, Artificial Intelligence
Yu-Ju Tu, Wei Zhou, Selwyn Piramuthu
Summary: Automated identification technologies such as barcodes and RFID have been widely used for over five decades, offering benefits in convenience, effectiveness, and efficiency while also presenting privacy and security risks that need to be carefully considered and managed.
DECISION SUPPORT SYSTEMS
(2021)
Article
Computer Science, Hardware & Architecture
Mohd Shariq, Karan Singh, Chhagan Lal, Mauro Conti, Tayyab Khan
Summary: Internet of Things (IoT) technologies have rapidly evolved, and RFID technology is a core technology used in various IoT applications. However, privacy and security concerns in RFID systems have been reported. To address these issues, an Efficient, Secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS) is proposed, which effectively resists known attacks and provides high security at low cost.
Article
Computer Science, Hardware & Architecture
Saiyu Qi, Yuanqing Zheng, Xiaofeng Chen, Wei Wei
Summary: This article discusses the application of RFID technology in item distribution systems, addressing privacy and security issues. A secure RTD system called Ants is proposed, which utilizes cryptography to protect item messages and ensures flexible data access. The system introduces new techniques to carry long crypto-item messages on memory-constrained tags. The security and efficiency of Ants are demonstrated through theoretical analysis and experiments.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Muhammad Ajmal Azad, Samiran Bag, Farhan Ahmad, Feng Hao
Summary: The paper introduces a framework called SIC that enables multiple healthcare organizations to share security defense and attack data for collaborative defense against common attackers while preserving the privacy of their respective system configurations and user data.
COMPUTER COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Haradhan Ghosh, Pramod Kumar Maurya, Satya Bagchi
Summary: Data security and privacy are important topics in today's life. RFID is a basic technology that solves the problem of data privacy. However, many RFID protocols suffer from security attacks and high computational costs. We propose a lightweight RFID protocol based on linear complementary pair of codes for better security and effectiveness in RFID systems.
COMPUTER COMMUNICATIONS
(2023)
Article
Telecommunications
Atakan Arslan, Sultan Aldirmaz Colak, Sarp Erturk
Summary: RFID technology is widely used in the Internet of Things era, but security and privacy issues have always existed. In recent years, researchers have proposed RFID authentication protocols based on elliptic curve cryptography to improve security. This study proposes a secure, privacy-preserving, and efficient ECC-based RFID authentication protocol, achieving the most effective solution in a real-world environment.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Information Systems
Hezam Akram Abdulghani, Niels Alexander Nijdam, Dimitri Konstantas
Summary: This article introduces the Radio Frequency Identification (RFID) technology in the Internet of Things (IoT) and its applications in security and privacy. The authors propose a set of security and privacy guidelines for RFID and analyze the attacks and threats against RFID applications. They also outline the implementation strategies through the involvement of stakeholders and existing mitigation strategies.
Article
Computer Science, Information Systems
Yu-Ju Tu, Selwyn Piramuthu
Summary: The consideration of using drones for last mile delivery poses several challenges, including physical limitations such as battery life, drone range, carrying capacity, and form factor, as well as security and privacy concerns for all parties involved. Privacy and security issues are especially significant since delivery drones operate outside the control of the service operator and may communicate with unauthorized entities. This article discusses the main security and privacy issues in drone-based last mile delivery, explores general security and privacy concerns, and identifies gaps in existing academic literature that can be addressed in future studies.
EUROPEAN JOURNAL OF INFORMATION SYSTEMS
(2023)
Article
Computer Science, Information Systems
Ji Young Chun, Geontae Noh
Summary: This paper introduces a novel RFID tag search protocol aimed at improving the privacy of mobile reader users while being able to operate under unstable connection conditions to a central server. The proposed protocol addresses privacy concerns for mobile reader users and enables serverless RFID tag searches in unstable environments where connections may be unreliable or too distant.
Review
Computer Science, Information Systems
Daniel Morales, Isaac Agudo, Javier Lopez
Summary: Secure Multi-party Computation (SMPC) is a protocol family that allows parties to compute a function on their private inputs and obtain the output without revealing more information. This paper focuses on Private Set Intersection (PSI), a specific SMPC problem where parties compute the intersection of their private input sets while keeping non-intersecting elements private. Despite the wide range of applications and different approaches, current PSI protocols still rely on heavy cryptographic assumptions. This paper conducts a systematic literature review to analyze the main scenarios and tools used to solve PSI, assesses performance using metrics, and identifies remaining challenges.
COMPUTER SCIENCE REVIEW
(2023)
Article
Computer Science, Information Systems
Mohd Shariq, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, Muhammad Rezal Kamel Ariffin
Summary: RFID technology has become more promising due to its low cost, ease of use, and convenience. Despite security and privacy issues, the URASP scheme presented in this paper provides a higher level of security and privacy without increasing resource consumption.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2021)
Review
Biochemical Research Methods
Dandan Lu, Yue Zhang, Ling Zhang, Haiyan Wang, Wanlin Weng, Li Li, Hongmin Cai
Summary: This paper presents a comprehensive review of secure genomic data alignment methods, discussing privacy threats and categorizing attacks for obtaining genomic privacy information. The latest genomic privacy-preserving alignment methods are classified into three different scenarios and analyzed for computation and communication complexity as well as privacy requirements. The survey provides insights on the significance and challenges of privacy issues in genomic data alignment.
BRIEFINGS IN BIOINFORMATICS
(2021)
Article
Computer Science, Information Systems
Vineeta Jain, Ulf Wetzker, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah, Dominique Mery
Summary: The increase in popularity of wireless networks in various sectors has made them a target for attackers exploiting vulnerabilities in network protocols. To protect against attacks, IEEE 802.11 regularly updates protocol standards with more secure versions. However, as attacks become more sophisticated, protocol standards result in increased latency and computational overhead, impacting performance. This paper highlights the importance of both latency and security in wireless networks and proposes a low-latency protocol called SAP that offers optimum security. The proposed protocol is validated through simulation and formal verification, and a comparative analysis with existing protocols demonstrates its improvement.
Article
Mathematics, Applied
Kamal Shah, Muhammad Sher, Hussam Rabai'ah, Ali Ahmadian, Soheil Salahshour, Bruno A. Pansera
Summary: In this article, we thoroughly study a mathematical model for a novel coronavirus using Caputo fractional derivative. We investigate the existence and uniqueness of the solution to the model using fixed point theorems and establish conditions for stability. Additionally, we analyze the model using the Laplace Adomian decomposition method and validate the results using real data from Pakistan.
MATHEMATICAL METHODS IN THE APPLIED SCIENCES
(2023)
Article
Computer Science, Artificial Intelligence
Shubham Shubham, Nikita Jain, Vedika Gupta, Senthilkumar Mohan, Mazeyanti Mohd Ariffin, Ali Ahmadian
Summary: Healthcare is the most important need in today's era, and the advancement of technology has greatly contributed to the success in the healthcare sector. Deep learning has played a crucial role in the diagnosis and treatment of diseases, such as the identification of glomeruli in the human kidney tissue.
Article
Computer Science, Interdisciplinary Applications
Qu Haidong, Mati Ur Rahman, Muhammad Arfan, Mehdi Salimi, Soheil Salahshour, Ali Ahmadian
Summary: This paper analyzes a fractal-fractional mathematical model to study the dynamics of typhoid fever disease and the protection against infection. The model is investigated using fractional-order and fractal dimension in terms of Caputo derivative. The existence theory and uniqueness of the solution are determined using the fixed point theorem. Furthermore, the Ulam-Hyres stability of the system is derived by perturbing the problem with a small factor. Numerical evaluation of the non-integer order model using fractional Adams-Bashforth iterative techniques shows differences in results compared to integer order.
ENGINEERING WITH COMPUTERS
(2023)
Article
Computer Science, Interdisciplinary Applications
A. M. Shloof, N. Senu, A. Ahmadian, M. Pakdaman, S. Salahshour
Summary: This paper proposes an artificial neural networks (ANNs) technique for solving fractal-fractional differential equations (FFDEs). The technique converts the original differential equation into a minimization problem and obtains the solution by computing the parameters with a precise neural network model. By combining the initial conditions and the performance of ANNs, a good approximate solution of FFDEs can be obtained. Examples and comparisons with existing methods are provided to demonstrate the efficiency and applicability of this approach.
ENGINEERING WITH COMPUTERS
(2023)
Article
Computer Science, Information Systems
Soham Chattopadhyay, Arijit Dey, Pawan Kumar Singh, Ali Ahmadian, Ram Sarkar
Summary: Speech is crucial in human communication and human-computer interaction. In the field of AI and ML, it has been extensively studied to recognize human emotions from speech signals. To address the challenge of large feature dimension, a hybrid feature selection algorithm called CEOAS is proposed. By extracting LPC and LPCC features, the proposed model reduces feature dimension and improves classification accuracy. Impressive recognition accuracies have been achieved on four benchmark datasets, surpassing state-of-the-art algorithms.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Economics
Ioannis Psaradellis, Jason Laws, Athanasios A. Pantelous, Georgios Sermpinis
Summary: This paper uses a large dataset of 18,410 technical trading rules (TTRs) and adopts a technique to control for false discoveries in order to evaluate the performance of frequently traded spreads. The study finds stronger evidence of predictability in commodity spreads compared to equity and currency spreads. The out-of-sample performance of significant rules exceeds transaction cost estimates, generating a high Sharpe ratio of 3.67 in 2016. The study rejects previous evidence of a uniform downward trend in the selection of predictive TTRs.
INTERNATIONAL JOURNAL OF FORECASTING
(2023)
Article
Economics
Pengjie Wang, Athanasios A. Pantelous, Farshid Vahid
Summary: This paper aims to establish a unified state-space Bayesian framework to model, estimate, and forecast mortality rates in a multi-population context. The incorporation of stochastic drifts mitigates the impact of the structural changes in the time indexes on mortality projections, as supported by empirical analysis.
INTERNATIONAL JOURNAL OF FORECASTING
(2023)
Article
Management
Mingxuan Zhao, Jian Zhou, Ke Wang, Athanasios A. Pantelous
Summary: In this paper, a novel operational law is proposed for calculating the credibility distributions of monotone functions of independent regular fuzzy numbers. This method is applied to study the project scheduling problem with partially (or fully) fuzzy activity durations. Three corresponding types of fuzzy models are formulated and shown to be convertible into crisp ones, which can be efficiently solved. Numerical experiments on public instances from the PSPLIB demonstrate the accuracy and efficiency of this approach.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH
(2023)
Review
Computer Science, Artificial Intelligence
Jian Zhou, Yujiao Jiang, Athanasios A. Pantelous, Weiwen Dai
Summary: Uncertainty theory is an increasingly attractive field with a linear growth trend in publications and a large network of international scholars. Seven key sub-fields have been identified, with uncertain processes and uncertain risk analysis showing the greatest development potential.
FUZZY OPTIMIZATION AND DECISION MAKING
(2023)
Article
Computer Science, Information Systems
Ashok Kumar Yadav, Karan Singh, Ali H. Amin, Laila Almutairi, Theyab R. Alsenani, Ali Ahmadian
Summary: Blockchain is a peer-to-peer immutable distributed ledger technology-based network, and its consensus mechanism is crucial for managing decentralized data. This research analyzes and categorizes various consensus mechanisms to contribute to blockchain application development and determine their impact. By considering performance, scalability, security, and design properties, five components of consensus algorithms have been evaluated. The analyzed consensus algorithms include Proof of Work (PoW), Proof of Stake (PoS), Byzantine Fault Tolerance (BFT) consensus, and hybrid protocols. Rating: 9/10
COMPUTER COMMUNICATIONS
(2023)
Article
Computer Science, Hardware & Architecture
Sonal Kumari, Karan Singh, Tayyab Khan, Mazeyanti Mohd Ariffin, Senthil Kumar Mohan, Dumitru Baleanu, Ali Ahmadian
Summary: This paper introduces an adaptive continuous authentication approach, a behavioral-based mobile authentication mechanism. It promises to enhance mobile phone security and reduce the burden of password memorization for users.
MOBILE NETWORKS & APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Muhammad Touqeer, Rimsha Umer, Nazir Ahmad Mohammad, Mehdi Salimi, Ali Ahmadian
Summary: This article discusses a method for dealing with uncertain situations in multi-criteria group decision-making using interval type-2 trapezoidal neutrosophic numbers, which have better representational power than simple fuzzy sets. A hybrid averaging operation based on weighted averaging and ordered weighted averaging (OWA) operations is used to aggregate the opinions of multiple decision-makers in a collective decision environment. An integrated optimization model based on a new signed distance-based closeness coefficients approach is proposed to handle inconsistencies and determine criteria weights and priority ranking.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Mathematics, Applied
Sultan Hussain, Hifsa Arif, Muhammad Noorullah, Athanasios A. Pantelous
Summary: In this paper, the pricing of American options is studied with asset price dynamics following Azza-lini Ito-McKean skew Brownian motions. The optimal stopping time problem is formulated and the properties of its value function are provided. Moreover, variational inequalities and the Feyman-Kac formula are derived. The Black-Scholes option pricing model is shown to be nested as a special case in this more general and versatile setting.
APPLIED MATHEMATICS AND COMPUTATION
(2023)
Correction
Computer Science, Information Systems
Muhammad Touqeer, Rimsha Umer, Mohammad Nazir Ahmad, Mehdi Salimi, Ali Ahmadian
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Management
Vasileios E. Kontosakos, Soosung Hwang, Vasileios Kallinterakis, Athanasios A. Pantelous
Summary: This study examines the impact of return predictability and parameter uncertainty on long-term portfolio allocations. It finds persisting horizon effects and a prominent role of parameter uncertainty in portfolio choice. The study also has implications for the nonparticipation puzzle in stock markets.
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH
(2024)
Article
Construction & Building Technology
Gabriele Bernardini, Tiago Miguel Ferreira, Pilar Baquedano Julia, Rafael Ramirez Eudave, Enrico Quagliarini
Summary: This research offers a methodology for combined spatiotemporal flood risk assessment, considering hazard, physical vulnerability, user exposure, and vulnerability. It adopts a mesoscale approach and investigates indoor and outdoor users' exposure and vulnerability, using the Analytical Hierarchy Process to combine risk factors.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Ying Liu, Chunli Chu, Ruijun Zhang, Shaoqing Chen, Chao Xu, Dongliang Zhao, Chunchun Meng, Meiting Ju, Zhi Cao
Summary: This study investigates the effects of increasing road, wall, and roof albedo on mitigating the urban heat island (UHI) effect in different areas of Tianjin. The results reveal that increasing road albedo is more effective in fringe areas, while increasing wall and roof albedo is more effective in central areas. The temperature changes induced by albedo changes also show seasonal characteristics.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Xisheng Lin, Yunfei Fu, Daniel Z. Peng, Chun-Ho Liu, Mengyuan Chu, Zengshun Chen, Fan Yang, Tim K. T. Tse, Cruz Y. Li, Xinxin Feng
Summary: This study employed computational fluid dynamics and neural network models to investigate and predict pollutant dispersion in urban environments, providing valuable insights for designing effective strategies to mitigate the impacts of hazardous pollutants.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Dipanjan Nag, Arkopal Kishore Goswami
Summary: Future-oriented urban planning should continue to focus on the principles of accessible and walkable cities. The perception of people is crucial for developing better urban walking infrastructure, but current evaluation tools often neglect the "perceived" features of the walking network. This study used conjoint analysis to evaluate users' perception of link and network attributes, revealing the importance of considering both in improving the walking environment.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Yongxin Su, Tao Zhang, Mengyao Xu, Mao Tan, Yuzhou Zhang, Rui Wang, Ling Wang
Summary: This study proposes an optimization method for household integrated demand response (HIDR) by combining rough knowledge and a dueling deep Q-network (DDQN), aiming to address uncertainties in a household multi-energy system (HMES). The simulation results demonstrate that the proposed method outperforms rule-based methods and DDQN in terms of energy cost savings.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Sijia Sun, S. F. A. Batista, Monica Menendez, Yuanqing Wang, Shuang Zhang
Summary: This paper comprehensively analyzes the energy consumption characteristics of electric buses (EBs) and diesel buses (DBs) on different bus lane configurations and operational conditions. The study shows that EBs consume less energy in suburban areas when using regular lanes, while both EBs and DBs save substantial energy when operating on dedicated bus lanes in downtown areas. Notably, shared-use bus lanes have the highest energy consumption.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Shangshang Shen, Dan Yan, Xiaojie Liu
Summary: This study developed a comprehensive theoretical framework for evaluating, diagnosing, and optimizing multi-functional urban agriculture. The framework was applied in Xiamen, China to identify the obstacles that impede its coordinated development and propose optimized modes for its development. Results showed that urban agriculture in Xiamen exhibits sound social function, moderate economic function, and poor ecological function.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Oluwafemi E. Adeyeri, Akinleye H. Folorunsho, Kayode I. Ayegbusi, Vishal Bobde, Tolulope E. Adeliyi, Christopher E. Ndehedehe, Akintomide A. Akinsanola
Summary: This study examines the impact of land cover, vegetation health, climatic forcings, elevation heat loads, and terrain characteristics on land surface temperature distribution over West Africa. The random forest model performs the best in downscaling predictands. The southern regions consistently exhibit healthy vegetation, while areas with unhealthy vegetation coincide with hot land surface temperature clusters. Positive Normalized Difference Vegetation Index trends in the Sahel highlight rainfall recovery and subsequent greening. Southwest winds cause the upwelling of cold waters, resulting in low land surface temperatures in southern West Africa. Considering LVCET factors is crucial for prioritizing greening initiatives and urban planning.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Yuchi Cao, Yan Li, Shouyun Shen, Weiwei Wang, Xiao Peng, Jiaao Chen, Jingpeng Liao, Xinyi Lv, Yifan Liu, Lehan Ma, Guodian Hu, Jinghuan Jiang, Dan Sun, Qingchu Jiang, Qiulin Liao
Summary: The study reveals significant disparities in urban green equity, with high property price areas having better access to green spaces than low property price areas. Landscape and greening have the most significant impact on urban green space differentiation.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Shaobo Sun, Kui Shan, Shengwei Wang
Summary: Economizer control is an important measure for energy savings in air-conditioning systems during moderate seasons. Humidity measurement uncertainties have a significant impact on enthalpy-based economizer control, and an uncertainty-tolerant control strategy is proposed to mitigate these effects.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Ding Mao, Peng Wang, Yi-Ping Fang, Long Ni
Summary: This study analyzes the structure, function, operation, and failure characteristics of district heating networks (DHNs) and proposes vulnerability analysis methods. The effectiveness of these methods is validated through application to a DHN in a Chinese city. The study finds that the heat source connectivity efficiency loss rate effectively characterizes topological and functional vulnerability. It also reveals that controllable DHNs have higher functional vulnerability under large area failure scenarios.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Hamid Karimi, Saeed Hasanzadeh, Hedayat Saboori
Summary: This paper presents a stochastic and cooperative approach for the operation of a cluster of interconnected multi-energy systems. The proposed model investigates the interaction among energy systems and integrates hydrogen and water systems into the overall energy structure. The model studies the performance of energy system agents in decentralized and cooperative scheduling.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Zhiyu Yan, Xiaogang Guo, Zilong Zhao, Luliang Tang
Summary: This study proposes a novel framework for fine-grained information extraction and dynamic spatial-temporal awareness in disaster-stricken areas based on social media data. The framework utilizes deep learning modules to extract location and water depth information from text and images, and analyzes the spatio-temporal distribution characteristics. The results show that the fusion of text and image-based information can enhance the perception of flood processes.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
M. A. Pans, G. Claudio, P. C. Eames
Summary: This study simulated and optimized a speculative district heating system in an existing urban area in Loughborough, UK. The system used only renewable heat sources and thermal energy storage to address the mismatch between heat generation and demand. The study assessed the impact of long-term storage volume and charging temperature on system cost and energy efficiency.
SUSTAINABLE CITIES AND SOCIETY
(2024)
Article
Construction & Building Technology
Jianmei Zhong, Wei Zhang, Xiaoli Wang, Jinsheng Zhan, Tao Xia, Lingzhi Xie, Xiding Zeng, Kun Yang, Zhangyu Li, Ruiwen Zou, Zepu Bai, Qing Wang, Chenyang Zhang
Summary: This study aims to propose a suitable air distribution design and reduce the energy consumption of the BSL-4 laboratory. It analyzes the diffusion characteristics of aerosols, infection risk under different air distributions, and ventilation parameters. The results show that the proposed energy-saving operation strategy can reduce the energy consumption of the laboratory by 15-30%.
SUSTAINABLE CITIES AND SOCIETY
(2024)