401 research outputs found

    Exploring the Conceptual Realm of Machine Learning in Small and Medium-sized Industries: A Qualitative Study

    Get PDF
    The pote­ntial of machine learning in small and medium busine­sses remains largely untappe­d. Through a qualitative study, it is e­xplored how the SMEs can practically apply ML to optimize processes and spark innovation. We­ aimed to demystify key conce­pts like supervised le­arning, data preparation, and model evaluation. Re­al-world examples across industries de­monstrate ML's versatility, from enhancing de­cision-making to improving efficiency. Our rese­arch highlights the transformative power of ML, e­specially for resource-constraine­d SMEs. With some guidance, eve­n small teams can implement ML solutions that unlock ne­w opportunities. Though adoption has barriers, from data to skills, ML’s value for SMEs is cle­ar. With a strategic approach, companies of all sizes can tap into its possibilitie­s. Current re­search on implementing machine­ learning in small and medium ente­rprises has gaps. More investigation is re­quired to understand adoption challenge­s fully, highlight successes, and mee­t unique needs. A qualitative­ approach that explores expe­riences and perspe­ctives can provide those rich insights. Some­ small and medium companies use machine­ learning, but many face hurdles adopting it. Re­search case studies showcase­ machine learning success storie­s, though each company's path differs. By understanding individual difficultie­s, researchers can he­lp more small and medium enterprises use machine learning appropriate­ly. This literature revie­w examines machine le­arning models, adoption trends, triumphs, and example­s in small and medium enterprise­s. Moreove­r, it also examines the advantage­s and obstacles SMEs encounter whe­n adopting ML tactics

    Demo Abstract: Securing Communication in 6LoWPAN with Compressed IPsec

    Get PDF
    With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Real-world deployments of WSN demand secure communication. The receiver should be able to verify that sensor data is generated by trusted nodes and/or it may also be necessary to encrypt sensor data in transit. Available IPv6 protocol stacks can use IPsec to secure data exchanges. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is possible. It is beneficial to use IPsec because the existing end-points on the Internet do not need to be modified to communicate securely with the WSN. Moreover, using IPsec, true end-to-end security is implemented and the need for a trustworthy gateway is removed. In this demo we will show the usage of our implemented lightweight IPsec. We will show how IPsec ensures end-to-end security between an IP enabled sensor networks and the traditional Internet. This is the first compressed lightweight design, implementation, and evaluation of a 6LoWPAN extension for IPsec. This demo complements the full paper that will appear in the parent conference, DCOSS’11

    BLEND: Efficient and blended IoT data storage and communication with application layer security

    Full text link
    Many IoT use cases demand both secure storage and secure communication. Resource-constrained devices cannot afford having one set of crypto protocols for storage and another for communication. Lightweight application layer security standards are being developed for IoT communication. Extending these protocols for secure storage can significantly reduce communication latency and local processing. We present BLEND, combining secure storage and communication by storing IoT data as pre-computed encrypted network packets. Unlike local methods, BLEND not only eliminates separate crypto for secure storage needs, but also eliminates a need for real-time crypto operations, reducing the communication latency significantly. Our evaluation shows that compared with a local solution, BLEND reduces send latency from 630 microseconds to 110 microseconds per packet. BLEND enables PKI based key management while being sufficiently lightweight for IoT. BLEND doesn't need modifications to communication standards used when extended for secure storage, and can therefore preserve underlying protocols' security guarantees.Comment: Accepted in IEEE CSR 2022. 10 pages, 7 figure

    Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems

    Get PDF
    For telemedicine, wireless body area network (WBAN) offers enormous benefits where a patient can be remotely monitored without compromising the mobility of remote treatments. With the advent of high capacity and reliable wireless networks, WBANs are used in several remote monitoring systems, limiting the COVID-19 spread. The sensitivity of telemedicine applications mandates confidentiality and privacy requirements. In this article, we propose a secure WBAN-19 telemedicine system to overcome the pervasiveness of contagious deceases utilizing a novel aggregate identity-based signcryption scheme with an equality test feature. We demonstrate a security analysis regarding indistinguishable adaptive chosen-ciphertext attack (IND-CCA2), one-way security against adaptive chosen-ciphertext attack (OW-CCA2), and unforgeability against adaptive chosen-message attack (EUF-CMA) under the random oracle model. The security analysis of the scheme is followed by complexity evaluations where the computation cost and communication overhead are measured. The evaluation demonstrates that the proposed model is efficient and applicable in telemedicine systems with high-performance capacities

    A Monte Carlo Simulation Analysis of Panel Stationarity Tests under a Single Framework

    Get PDF
    A unified framework, stringency criterion have been used to compare the six panel unit root tests having the null hypothesis of stationary and to find the best performer test/tests. Simulated critical values, instead of asymptotic critical values, have been used to keep the size of all tests around nominal size of 5%. Our findings suggest HD and HL tests as better performing tests as compared to other panel stationarity tests

    Towards Automated PKI Trust Transfer for IoT

    Full text link
    IoT deployments grow in numbers and size and questions of long time support and maintainability become increasingly important. To prevent vendor lock-in, standard compliant capabilities to transfer control of IoT devices between service providers must be offered. We propose a lightweight protocol for transfer of control, and we show that the overhead for the involved IoT devices is small and the overall required manual overhead is minimal. We analyse the fulfilment of the security requirements to verify that the stipulated requirements are satisfied.Comment: Accepted at 2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA). 8 pages, 4 figure

    Impact of Leadership Incivility on Employee Leaving Intention and Job Insecurity: Mediating role of Workplace Ostracism

    Get PDF
    Purpose: Supervisors' Incivility is considered a key antecedent of workplace ostracism and it is one of the burning issues and has a direct relationship with Job Insecurity, similarly, Job Insecurity generates the intention to leave the organization among employees. Methodology: The targeted population was the employee of healthcare institutions working in Pakistan. The sample of 336 was collected using the purposive sampling technique and the quantitative approach was applied due to the explanatory nature of the study. A five-level Likert scale questionnaire was employed to collect the data from the employees of the healthcare institutions regardless of their role and designation. Data analysis was run in twos steps, first demographic & descriptive by using Statistical Package for social science (SPSS 25.0), and in the second stage we used structural equation modeling to test the hypotheses, and confirmatory factor analysis (CFA) was used for convergent & discriminant validities the Partial least squares (PLS) approach was adopted by using the smart PLS software for the analysis of data. Findings: The results revealed that there is a direct positive relationship between leadership incivility and employee leaving intention and job security. The mediating role of workplace ostracism is not established among the dependent and independent variables however job insecurity ignites and mediates the employee leaving intentions. Conclusion: The study in Pakistan revealed that the workplace environment contributes 32% to job performance and 23% to Employee Leaving Intention. The study aims to evaluate leadership incivility and its effects on employee leaving intention and job insecurity, and also moderate the relationship between workplace ostracism with job insecurity and employee leaving intentions

    Securing Internet of Things with Lightweight IPsec

    Get PDF
    Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in transit. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IPsec to secure data exchange. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is possible. It is beneficial to use IPsec because the existing end-points on the Internet do not need to be modified to communicate securely with the WSN. Moreover, using IPsec, true end-to-end security is implemented and the need for a trustworthy gateway is removed. In this paper we provide End-to-End (E2E) secure communication between an IP enabled sensor nodes and a device on traditional Internet. This is the first compressed lightweight design, implementation, and evaluation of 6LoWPAN extension for IPsec on Contiki. Our extension supports both IPsec's Authentication Header (AH) and Encapsulation Security Payload (ESP). Thus, communication endpoints are able to authenticate, encrypt and check the integrity of messages using standardized and established IPv6 mechanisms

    The Effect of Despotic Leadership on the Employee Work Withdrawal Behavior and Acquiescent Silence

    Get PDF
    Purpose: The main aim to conduct this research is to identify whether LMX mediates the relationship between despotic leadership and acquiescence silence. In addition, the study also takes into account the role of Quality of work life as a mediator in the relationship between despotic leadership and work withdrawal behavior. Methodology: The data was collected by sharing the adopted questionnaire with the target population a total of 247 valid responses were received from the employee working in the manufacturing sector of Pakistan. Smart PLS was used to measure the model. The research is conducted for the managers leading a team of professionals and the community of Human Resource Development that includes business consultants, advisors, employees, top management, scholars, specialists, and students. Findings: The study found that despotic leadership increases withdrawal behavior and acquiescence in silence among employees. Moreover, leader-member exchange mediates the relationship between despotic leadership and work withdrawal behavior and quality of work-life mediates the relationship between despotic leadership and work withdrawal behavior. Conclusion: The findings declared that despotic leadership has a destructive influence on subordinates concerning increased work withdrawal behavior and acquiescent silence

    Supporting Cyber-Physical Systems with Wireless Sensor Networks: An Outlook of Software and Services

    Get PDF
    Sensing, communication, computation and control technologies are the essential building blocks of a cyber-physical system (CPS). Wireless sensor networks (WSNs) are a way to support CPS as they provide fine-grained spatial-temporal sensing, communication and computation at a low premium of cost and power. In this article, we explore the fundamental concepts guiding the design and implementation of WSNs. We report the latest developments in WSN software and services for meeting existing requirements and newer demands; particularly in the areas of: operating system, simulator and emulator, programming abstraction, virtualization, IP-based communication and security, time and location, and network monitoring and management. We also reflect on the ongoing efforts in providing dependable assurances for WSN-driven CPS. Finally, we report on its applicability with a case-study on smart buildings
    corecore