Skip to main content

Posts

Real-Time Detection

Real-Time Detection and Segmentation of Oceanic Whitecaps via EMA-SE-ResUNet Oceanic whitecaps are caused by wave breaking and are very important in air–sea interactions. Usually, whitecap coverage is considered a key factor in representing the role of whitecaps. However, the accurate identification of whitecap coverage in videos under dynamic marine conditions is a tough task. An EMA-SE-ResUNet deep learning model was proposed in this study to address this challenge. Based on a foundation of residual network (ResNet)-50 as the encoder and U-Net as the decoder, the model incorporated efficient multi-scale attention (EMA) module and squeeze-and-excitation network (SENet) module to improve its performance. By employing a dynamic weight allocation strategy and a channel attention mechanism, the model effectively strengthens the feature representation capability for whitecap edges while suppressing interference from wave textures and illumination noise. The model’s adaptability to complex...
Recent posts

Internet Technologies

The Potential of Satellite Internet Technologies for Crisis Management During Urban Evacuation This study examines the potential of satellite internet technologies to enhance crisis management in urban evacuation scenarios in Italy, with a specific focus on the Starlink system as a case study. In emergency situations, traditional mobile and WiFi networks often become inaccessible, significantly impairing timely communication and coordination. Reliable connectivity is therefore imperative for effective rescue operations and public safety. This research analyzes how satellite-based internet can provide robust, uninterrupted connectivity even when conventional infrastructures fail. The study discusses operational advantages such as rapid deployment, broad coverage, and scalability during disasters, as well as key constraints including line-of-sight requirements, environmental sensitivity, and regulatory challenges. Empirical findings from the deployment of Starlink during an actual urban...

Neural Network Based Malicious Node Detection

An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things At present Internet of Things is widely used in various products and parts in our daily life. In the future, its uses and requirements will increase. However, there are several issues with the IoT network, one of which is secure data transmission. Also, malicious nodes in the IoT network are very difficult to identify accurately and quickly, whereas it is very important to do so. In the current context, several solutions are being proposed as there is a need to focus on setting up secure IoT frameworks, and as well as the protocols that runs on them. This research proposes a secure protocol called iterative Convolutional Neural Network based Malicious Node Detection protocol that uses the erroneous assumption learning problematic technique. This protocol will make changes in the application layer, the network layer and the physical layer in order to achieve secure data tr...

Internet of Things

Internet of Things and Big Data Analytics for Risk Management in Digital Tourism Ecosystems Participation and inclusion in the business ecosystem have emerged as a growing trend for company collaboration in areas such as innovation, product development, and research. Collaborations can take many forms, ranging from the traditional value chain to strategic alliances, corporate networks, and digital ecosystems. The Internet of Things (IoT) and Big Data Analytics (BDA) play key roles in developing smart tourism destinations by delivering efficient management solutions, increased public safety, and improved operational efficiency while managing different risks and challenges, while also being a source of such risks and challenges. The objective of this article was to investigate the potential of IoT and BDA to properly control the risks associated with participants in a tourism destination’s digital ecosystem. The authors used the systematic literature review (SLR) method to examine scient...

Digiever network

Updated CISA KEV list includes Digiever network video recorder RCE Ongoing attacks involving the high-severity missing authorization bug impacting Digiever DS-2105 Pro network video recorders, tracked as CVE-2025-52163, have prompted the issue's inclusion in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog , with federal civilian executive branch agencies urged to mitigate the weakness or retire impacted instances by Jan. 12, reports The Hacker News . Abuse of the flaw, which was reported by Akamai and Fortinet researchers to have allowed Mirai and ShadowV2 botnet deployment, could allow command injection, according to CISA.  Such a vulnerability and another medium-severity arbitrary read issue, tracked as CVE-2023-52164, have remained unfixed after the Digiever NVRs reached end-of-life, said TXOne Research's Ta-Lun Yen. Exploitation requires an attacker to be logged in and send a specially crafted request. Users are advised to ...

Network and Security skills

7 SASE certifications to validate converged network and security skills For IT professionals, SASE certifications can demonstrate hands-on experience with cloud-based network and security-as-a-service platforms. As cyberattacks grow more sophisticated and AI-powered threats escalate, enterprises are under pressure to evolve beyond traditional perimeter-based network security. Many are turning to Secure Access Service Edge (SASE), a cloud-native framework that converges network and security functions to protect distributed workforces, optimize network performance, and simplify management across multiple tools. SASE platforms typically include SD-WAN, secure web gateway (SWG), firewall as a service (FWaaS), cloud access security broker (CASB), and zero-trust network access (ZTNA). They can also encompass a growing list of additional features such as browser isolation, sandboxing and data loss prevention (DLP). The overall SASE market is projected to climb from $15 billion in 2025 t...

Theory in Teaching Effectiveness

The role of project-based learning with activity theory in teaching effectiveness: Evidence from the internet of things course Higher education is beginning to focus on how to effectively cultivate IoT engineers who possess both hard skills and soft skills. Therefore, from the perspective of activity theory and combining it with project-based learning, this study constructed a project-based learning framework based on activity theory and applied this framework to an IoT course at a university in central China. The first half of the course adopted a traditional lecture-based teaching method, while the second half of the course was carried out based on the proposed framework, thus constituting a control group and an experimental group. To further explore the effectiveness of the proposed framework on IoT courses, the data of this study consisted of two aspects: on the one hand, questionnaires on students’ learning engagement and satisfaction with the IoT course were collected; on the ot...