|
|
|
Rastislav Róka
This paper is focused on the performance analysis of protection mechanisms utilized in common wavelength division multiplexing-based passive optical networks. The main aim of the proposed research is providing an option of comparing different traffic pro...
ver más
|
|
|
|
|
|
Theodoros Psallidas, Panagiotis Koromilas, Theodoros Giannakopoulos and Evaggelos Spyrou
The exponential growth of user-generated content has increased the need for efficient video summarization schemes. However, most approaches underestimate the power of aural features, while they are designed to work mainly on commercial/professional video...
ver más
|
|
|
|
|
|
Vasileios Kouliaridis and Georgios Kambourakis
Year after year, mobile malware attacks grow in both sophistication and diffusion. As the open source Android platform continues to dominate the market, malware writers consider it as their preferred target. Almost strictly, state-of-the-art mobile malwa...
ver más
|
|
|
|
|
|
Hammad Tariq Janjuhah, George Kontakiotis, Abdul Wahid, Dost Muhammad Khan, Stergios D. Zarkogiannis and Assimina Antonarakou
The pore system in carbonates is complicated because of the associated biological and chemical activity. Secondary porosity, on the other hand, is the result of chemical reactions that occur during diagenetic processes. A thorough understanding of the ca...
ver más
|
|
|
|
|
|
Daniel Okojie, Linus Idoko, Daniel Herbert and Agha Nnachi
Protection schemes are usually implemented in the planning of transmission line operations. These schemes are expected to protect not only the network of transmission lines but also the entire power systems network during fault conditions. However, it is...
ver más
|
|
|