|
|
|
Nikola Andelic and Sandi Baressi ?egota
This investigation underscores the paramount imperative of discerning network intrusions as a pivotal measure to fortify digital systems and shield sensitive data from unauthorized access, manipulation, and potential compromise. The principal aim of this...
ver más
|
|
|
|
|
|
Irina A. Novikova, Polina A. Bychkova, Dmitriy A. Shlyakhta and Alexey L. Novikov
Numerous studies of the digitalization of higher education show that university students? attitudes toward digital educational technologies (DETs) are one of the important psychological factors that can hinder or facilitate the optimal implementation of ...
ver más
|
|
|
|
|
|
Luís Vicente, Fernando Carreira, Francisco M. Campos, Mário J. G. C. Mendes, João M. F. Calado and Gamboa Carvalho
The washing of road tankers is currently still a manual process that requires an operator to place the washing head into the tanks. To increase productivity and operator safety, it is essential to implement automated systems with Fault Detection and Isol...
ver más
|
|
|
|
|
|
Ali Mirzazade, Cosmin Popescu and Björn Täljsten
The aim of this study was to find strains in embedded reinforcement by monitoring surface deformations. Compared with analytical methods, application of the machine learning regression technique imparts a noteworthy reduction in modeling complexity cause...
ver más
|
|
|
|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|