With the advent of the information age, data storage has not only developed from paper informatio... more With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage but also extended to cloud database storage methods. To date, we can see the application of big data and cloud in various fields and levels, which makes the induction, arrangement, transmission, and exchange of data easier and faster. The electronic and systematization of patient medical records in the medical environment is an example. The use of electronic medical records can help to improve the quality of medical care, reduce duplication of treatment, and reduce the waste of examination resources. It has many advantages, but also many risks. Medical institutions may abuse electronic medical data without the consent of patients leading to the leakage of patient privacy data and causing serious social impact. Therefore, this study proposes a medical record exchange and sharing mechanism based on the Hyperledger blockchain architecture c...
Wireless Underground Sensor Networks (WUSNs) have been showing prospective supervising applicatio... more Wireless Underground Sensor Networks (WUSNs) have been showing prospective supervising application domains in the underground region of the earth through sensing, computation, and communication. This paper presents a novel Deep Learning (DL)-based Cooperative communication channel model for Wireless Underground Sensor Networks for accurate and reliable monitoring in hostile underground locations. Furthermore, the proposed communication model aims at the effective utilization of cluster-based Cooperative models through the relay nodes. However, by keeping the cost effectiveness, reliability, and user-friendliness of wireless underground sensor networks through inter-cluster Cooperative transmission between two cluster heads, the determination of the overall energy performance is also measured. The energy co-operative channel allocation routing (ECCAR), Energy Hierarchical Optimistic Routing (EHOR), Non-Cooperative, and Dynamic Energy Routing (DER) methods were used to figure out how ...
The proper handling of waste is one of the biggest challenges of modern society. Municipal Solid ... more The proper handling of waste is one of the biggest challenges of modern society. Municipal Solid Waste (MSW) requires categorization into a number of types, including bio, plastic, glass, metal, paper, etc. The most efficient techniques proposed by researchers so far include neural networks. In this paper, a detailed summarization was made of the existing deep learning techniques that have been proposed to classify waste. This paper proposes an architecture for the classification of litter into the categories specified in the benchmark approaches. The architecture used for classification was EfficientNet-B0. These are compound-scaling based models proposed by Google that are pretrained on ImageNet and have an accuracy of 74% to 84% in top-1 over ImageNet. This research proposes EfficientNet-B0 model tuning for images specific to particular demographic regions for efficient classification. This type of model tuning over transfer learning provides a customized model for classification...
Online smartphone game bots can cause unfair behaviors and even shorten the game’s life cycle. Th... more Online smartphone game bots can cause unfair behaviors and even shorten the game’s life cycle. The random forest algorithm in machine learning is a widely used solution to identify game bots through behavioral features. Although the random forest algorithm can exactly detect more definite game bot players, some players belonging to the gray area cannot be detected accurately. Therefore, this study collects players’ data and extracts the features to build the multilayer perceptron, neural network model, for effectively detecting online smartphone game bots. This approach calculates each player’s abnormal rate to judge game bots and is evaluated on the famous mobile online game. Based on these abnormal rates, we then use K means to cluster players and further define the gray area. In the experimental evaluation, the results demonstrate the proposed learning model has better performance, not only increasing the accuracy but also reducing the error rate as compared with the random fores...
The popularity and remarkable attractiveness of cryptocurrencies, especially Bitcoin, absorb coun... more The popularity and remarkable attractiveness of cryptocurrencies, especially Bitcoin, absorb countless enthusiasts every day. Although Blockchain technology prevents fraudulent behavior, it cannot detect fraud on its own. There are always unimaginable ways to commit fraud, and the need to use anomaly detection methods to identify abnormal and fraudulent behaviors has become a necessity. The main purpose of this study is to use the Blockchain technology of symmetry and asymmetry in computer and engineering science to present a new method for detecting anomalies in Bitcoin with more appropriate efficiency. In this study, a collective anomaly approach was used. Instead of detecting the anomaly of individual addresses and wallets, the anomaly of users was examined. In addition to using the collective anomaly detection method, the trimmed_Kmeans algorithm was used for clustering. The results of this study show the anomalies are more visible among users who had multiple wallets. The propo...
International Journal of Innovative Computing Information and Control, 2011
In many countries, the use of electronic health care and medical treatment services have become e... more In many countries, the use of electronic health care and medical treatment services have become essential components of efforts to provide citizens with a high level of service that promises the advantages of convenience, mobility and time saving. On the other hand, hospitals require efficient management of medical treatment. In this paper, we combine these requirements and propose a smart card-based mobile medical treatment examination report transaction system to achieve a secure transaction model. We apply cryptography mechanisms to reduce cost, share medical treatment resources, mobilize services and simplify examination procedures. With this product, both supply merchants and retailers can find their niche. Moreover, users can share the mobile medical treatment examination resources saving much valuable time.
his study is to provide the disable mobility to care himself / herself in life, entertainment, em... more his study is to provide the disable mobility to care himself / herself in life, entertainment, emergency and other functions. One is to reduce the burden of family care the disability to deal with things. Secondly, people will not feel life is boring cause disability such that their lives just like ordinary people. In addition to, APP provides family members can monitor the disability family by the APP at any time to provide the remote operation. This research combines different technology and use the eye tracker to be a control device. The main reason is to provide a set of home care system with disable mobility. The disability only needs to focus the eyes of the optional button on the screen to perform the instructions simply. It is convenient for disable mobility to be a control device
As the network technology continues to grow at a high rate of speed, the traditional network topo... more As the network technology continues to grow at a high rate of speed, the traditional network topology is improved with novel distributed topologies such as the Cloud computing network. A cloud computing environment consists of a huge number of processors and memories, high-speed networks, and various application services to provide a lot of services over the Internet for users. However, many services need to search for suitable service nodes, and the workload of each node can be unbalanced. Based on the reason above, the Reference Queue based Cloud Service Architecture (RQCSA) and Fitness Service Queue Selection Mechanism (FSQSM) are proposed to handle more tasks, lower the makespan and queue waiting time, and improve efficiency. Moreover, the tasks can be distributed more evenly to avoid overloading cluster managers and lower the efficiency of the system.
Presently, E‐commerce has developed rapidly as a result of many services and applications integra... more Presently, E‐commerce has developed rapidly as a result of many services and applications integrating e‐commerce technologies offered online. Buyers can buy goods online and sellers can then deliver the goods to them. Logistics therefore plays an important role in online e‐commerce applications, with a focus on rapid delivery, the integrity of goods, and the privacy of personal information. Previous studies have proposed secure mechanisms for the transfer of electronic cash and digital content, in which only the sender and the receiver know the secret information hidden in the signature. However, they did not consider requirements such as the anonymous and lightweight verification in the logistics architecture. Therefore, this study designs a secure logistics system, with anonymous and lightweight verification, in order to meet the following requirements: Mutual authentication, non‐repudiation, anonymity, integrity and a low overhead for the logistics environment. A buyer could chec...
International Journal of Informatics and Communication Technology (IJ-ICT)
Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the u... more Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
The technology that is most likely to change the corporate world in the next ten years is not soc... more The technology that is most likely to change the corporate world in the next ten years is not social networks, Big Data, cloud computing, robots, not even artificial intelligence, but blockchain [...]
With technological advancement, cloud computing paradigms are gaining massive popularity in the e... more With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users on the pay-per-use policy. It allows small businesses to use top-notch infrastructure at low expense. However, due to the cloud resource sharing property, data privacy and security are significant concerns and barriers for smart systems to constantly transfer generated data to the cloud computing resources, which a third-party provider manages. Many encryption techniques have been proposed to cope with data security issues. In this paper, different existing data protection and encryption techniques based on common parameters have been critically analyzed and their workflows are graphically presented. This survey aims to collect existing data encryption techniques widely presented in the literature for smart system data security offl...
In recent years, counterfeit luxury products have become a major concern for consumers worldwide.... more In recent years, counterfeit luxury products have become a major concern for consumers worldwide. The reason for the proliferation of counterfeit products is that the manufacturing and distribution process is not transparent to consumers and this information can be easily falsified or altered by others. To solve this problem, this paper proposes the development of a management system using blockchain and smart contract technology to solve the problems of data forgery and data tampering, while tracking the information related to luxury products and ensuring the accuracy and authenticity of the relevant data, to achieve the purpose of luxury product anti-counterfeiting. When using Hyperledger Fabric to deploy the blockchain and execute smart contracts, all information related to the production and logistics process of luxury goods will be uploaded to the blockchain. No human intervention is required to create a complete, traceable, tamper-proof, and trusted repository. Compared to pre...
As society advances, so does the total number of vehicles on the road, creating a massive consume... more As society advances, so does the total number of vehicles on the road, creating a massive consumer market for automobiles. According to statistics, a major portion of today’s traffic difficulties are caused by accidents caused by subpar cars and auto parts. As a result, each country has, over time, enacted equivalent rules and regulations to prevent such tragedies. However, in the face of profit, some people are desperate enough to employ illegal parts and illegally modified cars, and auto fraud is rampant. As a result, we employ the blockchain of the symmetrical Blockchain’s digital ledger and smart contract technology to build a decentralized supply chain system that can identify specific parts. In this study, we design and discuss the proposed system framework by user functions and the flow of parts based on blockchain, and we discuss communication protocols that use the symmetry and asymmetry cryptography, algorithms, properties, and security of the mechanism while providing rel...
A distributed ledger system blockchain proves to be worthy in the domain of healthcare due to its... more A distributed ledger system blockchain proves to be worthy in the domain of healthcare due to its enormous applications and benefits. Peer-to-peer devolved transactions in an allocated way make the blockchain an efficient and modern tool to be utilized in healthcare as a solution to problems and challenges. The traditional healthcare system utilizes classical approaches to manage and maintain the EHR and cross-domain implementation. Therefore, a systematic investigation is necessary to find the current research trends, challenges, and solutions to implement blockchain to address the challenges. The motivation of this study is to pave the way for future research to find more problem-specific solutions by implementing blockchain to make the healthcare system more robust. The presented systematic survey provides the visualization and graphical representation of current methodologies, challenges, and future directions. The bibliometric analysis has been performed on the published studie...
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare fro... more WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The lack of a clear and unified study in terms of signcryption solutions can offer a bird’s eye view of WBANs. Based on the most recent signcryption papers, we analyzed WBAN’s communication architecture, security requirements, and the primary problems in WBANs to meet the aforementioned objectives. This...
Internet of Things (IoT) device security is one of the crucial topics in the field of information... more Internet of Things (IoT) device security is one of the crucial topics in the field of information security. IoT devices are often protected securely through firmware update. Traditional update methods have their shortcomings, such as bandwidth limitation and being attackers’ easy targets. Although many scholars proposed a variety of methods that are based on the blockchain technology to update the firmware, there are still demerits existing in their schemes, including large storage space and centralized stored firmware. In summary, this research proposes a highly secure and efficient protection mechanism that is based on the blockchain technology to improve the above disadvantages. Therefore, this study can reduce the need of storage space and improve system security. The proposed system has good performance in some events, including firmware integrity, security of IoT device connection, system security, and device anonymity. Furthermore, we confirm the high security and practical f...
In recent years, the attention of online cross-university courses has been increasing, and studen... more In recent years, the attention of online cross-university courses has been increasing, and students in universities want to increase their knowledge and professional skills by taking online courses from different universities, which raises the issue of course credit verification. In the past, the credits obtained by students in online courses lack endorsement from the education department, and the students’ learning process could not be verified. Therefore, the credits of online courses in one university could not be recognized by other universities. The education departments of some countries and regions implement credit conversion rules to convert the credits obtained by students in online courses into university credits or certificates endorsed by the education department. However, these schemes rely too much on the authority of the education department, and the process of students obtaining credits cannot be verified. In addition, the centralized storage method makes the data of...
With the advent of the information age, data storage has not only developed from paper informatio... more With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage but also extended to cloud database storage methods. To date, we can see the application of big data and cloud in various fields and levels, which makes the induction, arrangement, transmission, and exchange of data easier and faster. The electronic and systematization of patient medical records in the medical environment is an example. The use of electronic medical records can help to improve the quality of medical care, reduce duplication of treatment, and reduce the waste of examination resources. It has many advantages, but also many risks. Medical institutions may abuse electronic medical data without the consent of patients leading to the leakage of patient privacy data and causing serious social impact. Therefore, this study proposes a medical record exchange and sharing mechanism based on the Hyperledger blockchain architecture c...
Wireless Underground Sensor Networks (WUSNs) have been showing prospective supervising applicatio... more Wireless Underground Sensor Networks (WUSNs) have been showing prospective supervising application domains in the underground region of the earth through sensing, computation, and communication. This paper presents a novel Deep Learning (DL)-based Cooperative communication channel model for Wireless Underground Sensor Networks for accurate and reliable monitoring in hostile underground locations. Furthermore, the proposed communication model aims at the effective utilization of cluster-based Cooperative models through the relay nodes. However, by keeping the cost effectiveness, reliability, and user-friendliness of wireless underground sensor networks through inter-cluster Cooperative transmission between two cluster heads, the determination of the overall energy performance is also measured. The energy co-operative channel allocation routing (ECCAR), Energy Hierarchical Optimistic Routing (EHOR), Non-Cooperative, and Dynamic Energy Routing (DER) methods were used to figure out how ...
The proper handling of waste is one of the biggest challenges of modern society. Municipal Solid ... more The proper handling of waste is one of the biggest challenges of modern society. Municipal Solid Waste (MSW) requires categorization into a number of types, including bio, plastic, glass, metal, paper, etc. The most efficient techniques proposed by researchers so far include neural networks. In this paper, a detailed summarization was made of the existing deep learning techniques that have been proposed to classify waste. This paper proposes an architecture for the classification of litter into the categories specified in the benchmark approaches. The architecture used for classification was EfficientNet-B0. These are compound-scaling based models proposed by Google that are pretrained on ImageNet and have an accuracy of 74% to 84% in top-1 over ImageNet. This research proposes EfficientNet-B0 model tuning for images specific to particular demographic regions for efficient classification. This type of model tuning over transfer learning provides a customized model for classification...
Online smartphone game bots can cause unfair behaviors and even shorten the game’s life cycle. Th... more Online smartphone game bots can cause unfair behaviors and even shorten the game’s life cycle. The random forest algorithm in machine learning is a widely used solution to identify game bots through behavioral features. Although the random forest algorithm can exactly detect more definite game bot players, some players belonging to the gray area cannot be detected accurately. Therefore, this study collects players’ data and extracts the features to build the multilayer perceptron, neural network model, for effectively detecting online smartphone game bots. This approach calculates each player’s abnormal rate to judge game bots and is evaluated on the famous mobile online game. Based on these abnormal rates, we then use K means to cluster players and further define the gray area. In the experimental evaluation, the results demonstrate the proposed learning model has better performance, not only increasing the accuracy but also reducing the error rate as compared with the random fores...
The popularity and remarkable attractiveness of cryptocurrencies, especially Bitcoin, absorb coun... more The popularity and remarkable attractiveness of cryptocurrencies, especially Bitcoin, absorb countless enthusiasts every day. Although Blockchain technology prevents fraudulent behavior, it cannot detect fraud on its own. There are always unimaginable ways to commit fraud, and the need to use anomaly detection methods to identify abnormal and fraudulent behaviors has become a necessity. The main purpose of this study is to use the Blockchain technology of symmetry and asymmetry in computer and engineering science to present a new method for detecting anomalies in Bitcoin with more appropriate efficiency. In this study, a collective anomaly approach was used. Instead of detecting the anomaly of individual addresses and wallets, the anomaly of users was examined. In addition to using the collective anomaly detection method, the trimmed_Kmeans algorithm was used for clustering. The results of this study show the anomalies are more visible among users who had multiple wallets. The propo...
International Journal of Innovative Computing Information and Control, 2011
In many countries, the use of electronic health care and medical treatment services have become e... more In many countries, the use of electronic health care and medical treatment services have become essential components of efforts to provide citizens with a high level of service that promises the advantages of convenience, mobility and time saving. On the other hand, hospitals require efficient management of medical treatment. In this paper, we combine these requirements and propose a smart card-based mobile medical treatment examination report transaction system to achieve a secure transaction model. We apply cryptography mechanisms to reduce cost, share medical treatment resources, mobilize services and simplify examination procedures. With this product, both supply merchants and retailers can find their niche. Moreover, users can share the mobile medical treatment examination resources saving much valuable time.
his study is to provide the disable mobility to care himself / herself in life, entertainment, em... more his study is to provide the disable mobility to care himself / herself in life, entertainment, emergency and other functions. One is to reduce the burden of family care the disability to deal with things. Secondly, people will not feel life is boring cause disability such that their lives just like ordinary people. In addition to, APP provides family members can monitor the disability family by the APP at any time to provide the remote operation. This research combines different technology and use the eye tracker to be a control device. The main reason is to provide a set of home care system with disable mobility. The disability only needs to focus the eyes of the optional button on the screen to perform the instructions simply. It is convenient for disable mobility to be a control device
As the network technology continues to grow at a high rate of speed, the traditional network topo... more As the network technology continues to grow at a high rate of speed, the traditional network topology is improved with novel distributed topologies such as the Cloud computing network. A cloud computing environment consists of a huge number of processors and memories, high-speed networks, and various application services to provide a lot of services over the Internet for users. However, many services need to search for suitable service nodes, and the workload of each node can be unbalanced. Based on the reason above, the Reference Queue based Cloud Service Architecture (RQCSA) and Fitness Service Queue Selection Mechanism (FSQSM) are proposed to handle more tasks, lower the makespan and queue waiting time, and improve efficiency. Moreover, the tasks can be distributed more evenly to avoid overloading cluster managers and lower the efficiency of the system.
Presently, E‐commerce has developed rapidly as a result of many services and applications integra... more Presently, E‐commerce has developed rapidly as a result of many services and applications integrating e‐commerce technologies offered online. Buyers can buy goods online and sellers can then deliver the goods to them. Logistics therefore plays an important role in online e‐commerce applications, with a focus on rapid delivery, the integrity of goods, and the privacy of personal information. Previous studies have proposed secure mechanisms for the transfer of electronic cash and digital content, in which only the sender and the receiver know the secret information hidden in the signature. However, they did not consider requirements such as the anonymous and lightweight verification in the logistics architecture. Therefore, this study designs a secure logistics system, with anonymous and lightweight verification, in order to meet the following requirements: Mutual authentication, non‐repudiation, anonymity, integrity and a low overhead for the logistics environment. A buyer could chec...
International Journal of Informatics and Communication Technology (IJ-ICT)
Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the u... more Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
The technology that is most likely to change the corporate world in the next ten years is not soc... more The technology that is most likely to change the corporate world in the next ten years is not social networks, Big Data, cloud computing, robots, not even artificial intelligence, but blockchain [...]
With technological advancement, cloud computing paradigms are gaining massive popularity in the e... more With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users on the pay-per-use policy. It allows small businesses to use top-notch infrastructure at low expense. However, due to the cloud resource sharing property, data privacy and security are significant concerns and barriers for smart systems to constantly transfer generated data to the cloud computing resources, which a third-party provider manages. Many encryption techniques have been proposed to cope with data security issues. In this paper, different existing data protection and encryption techniques based on common parameters have been critically analyzed and their workflows are graphically presented. This survey aims to collect existing data encryption techniques widely presented in the literature for smart system data security offl...
In recent years, counterfeit luxury products have become a major concern for consumers worldwide.... more In recent years, counterfeit luxury products have become a major concern for consumers worldwide. The reason for the proliferation of counterfeit products is that the manufacturing and distribution process is not transparent to consumers and this information can be easily falsified or altered by others. To solve this problem, this paper proposes the development of a management system using blockchain and smart contract technology to solve the problems of data forgery and data tampering, while tracking the information related to luxury products and ensuring the accuracy and authenticity of the relevant data, to achieve the purpose of luxury product anti-counterfeiting. When using Hyperledger Fabric to deploy the blockchain and execute smart contracts, all information related to the production and logistics process of luxury goods will be uploaded to the blockchain. No human intervention is required to create a complete, traceable, tamper-proof, and trusted repository. Compared to pre...
As society advances, so does the total number of vehicles on the road, creating a massive consume... more As society advances, so does the total number of vehicles on the road, creating a massive consumer market for automobiles. According to statistics, a major portion of today’s traffic difficulties are caused by accidents caused by subpar cars and auto parts. As a result, each country has, over time, enacted equivalent rules and regulations to prevent such tragedies. However, in the face of profit, some people are desperate enough to employ illegal parts and illegally modified cars, and auto fraud is rampant. As a result, we employ the blockchain of the symmetrical Blockchain’s digital ledger and smart contract technology to build a decentralized supply chain system that can identify specific parts. In this study, we design and discuss the proposed system framework by user functions and the flow of parts based on blockchain, and we discuss communication protocols that use the symmetry and asymmetry cryptography, algorithms, properties, and security of the mechanism while providing rel...
A distributed ledger system blockchain proves to be worthy in the domain of healthcare due to its... more A distributed ledger system blockchain proves to be worthy in the domain of healthcare due to its enormous applications and benefits. Peer-to-peer devolved transactions in an allocated way make the blockchain an efficient and modern tool to be utilized in healthcare as a solution to problems and challenges. The traditional healthcare system utilizes classical approaches to manage and maintain the EHR and cross-domain implementation. Therefore, a systematic investigation is necessary to find the current research trends, challenges, and solutions to implement blockchain to address the challenges. The motivation of this study is to pave the way for future research to find more problem-specific solutions by implementing blockchain to make the healthcare system more robust. The presented systematic survey provides the visualization and graphical representation of current methodologies, challenges, and future directions. The bibliometric analysis has been performed on the published studie...
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare fro... more WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the sensors are highly sensitive, secret, and vulnerable to numerous adversarial attacks. Since WBANs is a real-world application of the healthcare system, it’s vital to ensure that the data acquired by the WBANs sensors is secure and not accessible to unauthorized parties or security hazards. As a result, effective signcryption security solutions are required for the WBANs’ success and widespread use. Over the last two decades, researchers have proposed a slew of signcryption security solutions to achieve this goal. The lack of a clear and unified study in terms of signcryption solutions can offer a bird’s eye view of WBANs. Based on the most recent signcryption papers, we analyzed WBAN’s communication architecture, security requirements, and the primary problems in WBANs to meet the aforementioned objectives. This...
Internet of Things (IoT) device security is one of the crucial topics in the field of information... more Internet of Things (IoT) device security is one of the crucial topics in the field of information security. IoT devices are often protected securely through firmware update. Traditional update methods have their shortcomings, such as bandwidth limitation and being attackers’ easy targets. Although many scholars proposed a variety of methods that are based on the blockchain technology to update the firmware, there are still demerits existing in their schemes, including large storage space and centralized stored firmware. In summary, this research proposes a highly secure and efficient protection mechanism that is based on the blockchain technology to improve the above disadvantages. Therefore, this study can reduce the need of storage space and improve system security. The proposed system has good performance in some events, including firmware integrity, security of IoT device connection, system security, and device anonymity. Furthermore, we confirm the high security and practical f...
In recent years, the attention of online cross-university courses has been increasing, and studen... more In recent years, the attention of online cross-university courses has been increasing, and students in universities want to increase their knowledge and professional skills by taking online courses from different universities, which raises the issue of course credit verification. In the past, the credits obtained by students in online courses lack endorsement from the education department, and the students’ learning process could not be verified. Therefore, the credits of online courses in one university could not be recognized by other universities. The education departments of some countries and regions implement credit conversion rules to convert the credits obtained by students in online courses into university credits or certificates endorsed by the education department. However, these schemes rely too much on the authority of the education department, and the process of students obtaining credits cannot be verified. In addition, the centralized storage method makes the data of...
Uploads
Papers by Chin-ling Chen