Skip to main content

Posts

Internet Technologies

The Potential of Satellite Internet Technologies for Crisis Management During Urban Evacuation This study examines the potential of satellite internet technologies to enhance crisis management in urban evacuation scenarios in Italy, with a specific focus on the Starlink system as a case study. In emergency situations, traditional mobile and WiFi networks often become inaccessible, significantly impairing timely communication and coordination. Reliable connectivity is therefore imperative for effective rescue operations and public safety. This research analyzes how satellite-based internet can provide robust, uninterrupted connectivity even when conventional infrastructures fail. The study discusses operational advantages such as rapid deployment, broad coverage, and scalability during disasters, as well as key constraints including line-of-sight requirements, environmental sensitivity, and regulatory challenges. Empirical findings from the deployment of Starlink during an actual urban...
Recent posts

Neural Network Based Malicious Node Detection

An Iterative Convolutional Neural Network Based Malicious Node Detection (ICNNMND) Protocol For Internet of Things At present Internet of Things is widely used in various products and parts in our daily life. In the future, its uses and requirements will increase. However, there are several issues with the IoT network, one of which is secure data transmission. Also, malicious nodes in the IoT network are very difficult to identify accurately and quickly, whereas it is very important to do so. In the current context, several solutions are being proposed as there is a need to focus on setting up secure IoT frameworks, and as well as the protocols that runs on them. This research proposes a secure protocol called iterative Convolutional Neural Network based Malicious Node Detection protocol that uses the erroneous assumption learning problematic technique. This protocol will make changes in the application layer, the network layer and the physical layer in order to achieve secure data tr...

Internet of Things

Internet of Things and Big Data Analytics for Risk Management in Digital Tourism Ecosystems Participation and inclusion in the business ecosystem have emerged as a growing trend for company collaboration in areas such as innovation, product development, and research. Collaborations can take many forms, ranging from the traditional value chain to strategic alliances, corporate networks, and digital ecosystems. The Internet of Things (IoT) and Big Data Analytics (BDA) play key roles in developing smart tourism destinations by delivering efficient management solutions, increased public safety, and improved operational efficiency while managing different risks and challenges, while also being a source of such risks and challenges. The objective of this article was to investigate the potential of IoT and BDA to properly control the risks associated with participants in a tourism destination’s digital ecosystem. The authors used the systematic literature review (SLR) method to examine scient...

Digiever network

Updated CISA KEV list includes Digiever network video recorder RCE Ongoing attacks involving the high-severity missing authorization bug impacting Digiever DS-2105 Pro network video recorders, tracked as CVE-2025-52163, have prompted the issue's inclusion in the Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog , with federal civilian executive branch agencies urged to mitigate the weakness or retire impacted instances by Jan. 12, reports The Hacker News . Abuse of the flaw, which was reported by Akamai and Fortinet researchers to have allowed Mirai and ShadowV2 botnet deployment, could allow command injection, according to CISA.  Such a vulnerability and another medium-severity arbitrary read issue, tracked as CVE-2023-52164, have remained unfixed after the Digiever NVRs reached end-of-life, said TXOne Research's Ta-Lun Yen. Exploitation requires an attacker to be logged in and send a specially crafted request. Users are advised to ...

Network and Security skills

7 SASE certifications to validate converged network and security skills For IT professionals, SASE certifications can demonstrate hands-on experience with cloud-based network and security-as-a-service platforms. As cyberattacks grow more sophisticated and AI-powered threats escalate, enterprises are under pressure to evolve beyond traditional perimeter-based network security. Many are turning to Secure Access Service Edge (SASE), a cloud-native framework that converges network and security functions to protect distributed workforces, optimize network performance, and simplify management across multiple tools. SASE platforms typically include SD-WAN, secure web gateway (SWG), firewall as a service (FWaaS), cloud access security broker (CASB), and zero-trust network access (ZTNA). They can also encompass a growing list of additional features such as browser isolation, sandboxing and data loss prevention (DLP). The overall SASE market is projected to climb from $15 billion in 2025 t...

Theory in Teaching Effectiveness

The role of project-based learning with activity theory in teaching effectiveness: Evidence from the internet of things course Higher education is beginning to focus on how to effectively cultivate IoT engineers who possess both hard skills and soft skills. Therefore, from the perspective of activity theory and combining it with project-based learning, this study constructed a project-based learning framework based on activity theory and applied this framework to an IoT course at a university in central China. The first half of the course adopted a traditional lecture-based teaching method, while the second half of the course was carried out based on the proposed framework, thus constituting a control group and an experimental group. To further explore the effectiveness of the proposed framework on IoT courses, the data of this study consisted of two aspects: on the one hand, questionnaires on students’ learning engagement and satisfaction with the IoT course were collected; on the ot...

Erasing for Art Authentication

Weakly Supervised Object Localization with Background Suppression Erasing for Art Authentication and Copyright Protection The problem of art forgery and infringement is becoming increasingly prominent, since diverse self-media contents with all kinds of art pieces are released on the Internet every day. For art paintings, object detection and localization provide an efficient and effective means of art authentication and copyright protection. However, the acquisition of a precise detector requires large amounts of expensive pixel-level annotations. To alleviate this, we propose a novel weakly supervised object localization (WSOL) with background superposition erasing (BSE), which recognizes objects with inexpensive image-level labels. First, integrated adversarial erasing (IAE) for vanilla convolutional neural network (CNN) dropouts the most discriminative region by leveraging high-level semantic information. Second, a background suppression module (BSM) limits the activation area of ...