Sort by
Adversarially Robust Phishing URL Classification with Character-Level Defense and Distributional Regularization
Marco D. Ferraro
,Giulia R. Conti
,Lorenzo M. Bianchi
Posted: 19 January 2026
Edge-Optimized Reinforcement Learning Ecosystem Leveraging Carbon Capture Analytics and 6G-Enabled Swarm Intelligence for Sustainable Blue Economy Logistics
Nithya Moorthy
Posted: 16 January 2026
Enhancing Adaptive Smart System Orchestration using Post-Quantum Transformer-Driven Semantic Sensing in 6G Digital Twin Frameworks
Karthiga Devi R
Posted: 16 January 2026
Energy-Efficient Drone Design with Solar-Powered Hybrid Propulsion System for Extended Flight Duration
Meenalochini Pandi
Posted: 16 January 2026
Scalable IoT-Based Architecture for Continuous Monitoring of Patients at Home: Design and Technical Validation
Scalable IoT-Based Architecture for Continuous Monitoring of Patients at Home: Design and Technical Validation
Rosen Ivanov
Posted: 16 January 2026
Insights for Curriculum-Oriented Instruction of Programming Paradigms for Non-Computer Science Majors: Survey and Public Q&A Evidence
Ji-Hye Oh
,Hyun-Seok Park
This study examines how different programming paradigms are associated with learning experiences and cognitive challenges as encountered by non-computer science novice learners. Using a case-study approach situated within specific instructional contexts, we integrate survey data from undergraduate students with large-scale public question-and-answer data from Stack Overflow to explore paradigm-related difficulty patterns. Four instructional contexts—C, Java, Python, and Prolog—were examined as pedagogical instantiations of imperative, object-oriented, functional-style, and logic-based paradigms using text clustering, word embedding models, and interaction-informed complexity metrics. The analysis identifies distinct patterns of learning challenges across paradigmatic contexts, including difficulties related to low-level memory management in C-based instruction, abstraction and design reasoning in object-oriented contexts, inference-driven reasoning in Prolog-based instruction, and recursion-related challenges in functional-style programming tasks. Survey responses exhibit tendencies that are broadly consistent with patterns observed in public Q&A data, supporting the use of large-scale community-generated content as a complementary source for learner-centered educational analysis. Based on these findings, the study discusses paradigm-aware instructional implications for programming education tailored to non-major learners within comparable educational settings. The results provide empirical support for differentiated instructional approaches and offer evidence-informed insights relevant to curriculum-oriented teaching and future research on adaptive learning systems.
This study examines how different programming paradigms are associated with learning experiences and cognitive challenges as encountered by non-computer science novice learners. Using a case-study approach situated within specific instructional contexts, we integrate survey data from undergraduate students with large-scale public question-and-answer data from Stack Overflow to explore paradigm-related difficulty patterns. Four instructional contexts—C, Java, Python, and Prolog—were examined as pedagogical instantiations of imperative, object-oriented, functional-style, and logic-based paradigms using text clustering, word embedding models, and interaction-informed complexity metrics. The analysis identifies distinct patterns of learning challenges across paradigmatic contexts, including difficulties related to low-level memory management in C-based instruction, abstraction and design reasoning in object-oriented contexts, inference-driven reasoning in Prolog-based instruction, and recursion-related challenges in functional-style programming tasks. Survey responses exhibit tendencies that are broadly consistent with patterns observed in public Q&A data, supporting the use of large-scale community-generated content as a complementary source for learner-centered educational analysis. Based on these findings, the study discusses paradigm-aware instructional implications for programming education tailored to non-major learners within comparable educational settings. The results provide empirical support for differentiated instructional approaches and offer evidence-informed insights relevant to curriculum-oriented teaching and future research on adaptive learning systems.
Posted: 15 January 2026
Secure and Verifiable Edge-Federated Learning with Homomorphic Encryption and a Trusted Execution Environment for UAV Communication
Huachang Su
,Yekang Zhao
,Wenrui Zhang
,Hongling Zhang
,Shitao Huang
,Sheng Zhong
,Xiaoyang Zhou
Posted: 15 January 2026
Spatio-Temporal Forecasting of Traffic Accidents Using Prophet Models with Statistical Residual Validation
Jaime Sayago-Heredia
,Tatiana Landivar
,Roberto Vásconez
,Wilson Chango-Sailema
Posted: 15 January 2026
A Comprehensive Evaluation of Privacy-Preserving Mechanisms in Cloud-Based Big Data Analytics: Challenges and Future Research Directions
Steven Coleman
,Daniel Wilson
The paradigm shift toward cloud-based big data analytics has empowered organizations to derive actionable insights from massive datasets through scalable, on-demand computational resources. However, the migration of sensitive data to third-party cloud environments introduces profound privacy concerns, ranging from unauthorized data access to the risk of re-identification in multi-tenant architectures. This paper provides a comprehensive evaluation of current Privacy-Preserving Mechanisms (PPMs), systematically analyzing their efficacy in safeguarding data throughout its lifecycle—at rest, in transit, and during computation. The evaluation covers a broad spectrum of Privacy-Enhancing Technologies (PETs), including Differential Privacy (DP), Homomorphic Encryption (HE), Secure Multi-Party Computation (SMPC), and Trusted Execution Environments (TEEs). We examine the inherent trade-offs between data utility and privacy protection, specifically addressing the “utility-privacy” bottleneck where high levels of noise injection or encryption complexity often degrade the accuracy and performance of analytical models. Furthermore, the study explores the integration of Federated Learning as a decentralized approach to privacy, allowing for collaborative model training without the need for raw data movement. Critical challenges are identified, such as the scalability of cryptographic protocols in high-volume data streams and the regulatory pressures imposed by global standards like the GDPR and the EU AI Act. By synthesizing current industry practices with academic research, this paper highlights the gap between theoretical privacy models and their practical implementation in production-grade cloud infrastructures. The discourse concludes with a strategic roadmap for future research, emphasizing the need for Post-Quantum Cryptography (PQC) and automated privacy-orchestration frameworks. This comprehensive review serves as a foundational reference for researchers and system architects aiming to design resilient, privacy-centric cloud analytical systems that maintain compliance without sacrificing computational efficiency.
The paradigm shift toward cloud-based big data analytics has empowered organizations to derive actionable insights from massive datasets through scalable, on-demand computational resources. However, the migration of sensitive data to third-party cloud environments introduces profound privacy concerns, ranging from unauthorized data access to the risk of re-identification in multi-tenant architectures. This paper provides a comprehensive evaluation of current Privacy-Preserving Mechanisms (PPMs), systematically analyzing their efficacy in safeguarding data throughout its lifecycle—at rest, in transit, and during computation. The evaluation covers a broad spectrum of Privacy-Enhancing Technologies (PETs), including Differential Privacy (DP), Homomorphic Encryption (HE), Secure Multi-Party Computation (SMPC), and Trusted Execution Environments (TEEs). We examine the inherent trade-offs between data utility and privacy protection, specifically addressing the “utility-privacy” bottleneck where high levels of noise injection or encryption complexity often degrade the accuracy and performance of analytical models. Furthermore, the study explores the integration of Federated Learning as a decentralized approach to privacy, allowing for collaborative model training without the need for raw data movement. Critical challenges are identified, such as the scalability of cryptographic protocols in high-volume data streams and the regulatory pressures imposed by global standards like the GDPR and the EU AI Act. By synthesizing current industry practices with academic research, this paper highlights the gap between theoretical privacy models and their practical implementation in production-grade cloud infrastructures. The discourse concludes with a strategic roadmap for future research, emphasizing the need for Post-Quantum Cryptography (PQC) and automated privacy-orchestration frameworks. This comprehensive review serves as a foundational reference for researchers and system architects aiming to design resilient, privacy-centric cloud analytical systems that maintain compliance without sacrificing computational efficiency.
Posted: 15 January 2026
Vision-Language Model-Driven Predictive Platform Employing Swarm Robotics and Post-Quantum Signatures for Autonomous Green Vessel Navigation and Supply Chain Resilience
Selvaprasanth P
Posted: 15 January 2026
Survey on Deep Learning Application in Agricultural Innovation
Shubham Singh
Posted: 14 January 2026
A Model of Extracting Security Situation Element Based on Federated Deep Learning for Industrial Internet
Ran Zhang
,Yongchao Shen
,Qianru Wu
Posted: 14 January 2026
Child Online Sexual Exploitation and Abuse: Understanding Adversarial Tactics Techniques and Procedures
Abel Yeboah-ofori
,Awo Aidam Amenyah
Posted: 13 January 2026
Design and Development of a Cloud-Based Student Accommodation Management Application
Rahul Sharma
,Steven Coleman
Posted: 13 January 2026
Contactless Battery Sensing: A Survey
Saravana Srinivasan
,Pedro Paiva
,Aditi Dharmadhikari
,Lyall Sathishkumar
,Christian Nwobu
,Ningyue Mao
,Guilherme Hollweg
,Xuan Zhou
,Xiao Zhang
Posted: 13 January 2026
Streamlining Vulnerability Detection with Hybrid Static-Dynamic Analysis in Automated Toolchains for High-Assurance Development
R Karthick
Posted: 12 January 2026
Spooky Chips: The Strange, Entangled Heart of the Next Computing Revolution
Sayed Mahbub Hasan Amiri
,Prasun Goswami
,Chandan Kumar Barmmon
,Md Mainul Islam
,Mohammad Shakhawat Hossen
,Mohammad Sohel Kabir
,Marzana Mithila
,Naznin Akter
Posted: 12 January 2026
Secure Framework for OSS Dependency Management and License Compliance in Third-Party Components
Sasikala M
Posted: 12 January 2026
STAR-RL: Stealth-Aware Targeted Adversarial Attack on Multimodal Sensors in Human Activity Recognition via Reinforcement Learning
Ade Kurniawan
Posted: 09 January 2026
Multi-Group Fully Homomorphic Encryption Scheme Based on LWE and NTRU
Yongheng Li
,Jing Wen
,Shaoling Liang
,Fanqi Kong
,Baohua Huang
Posted: 08 January 2026
of 60