56   Artículos

 
en línea
Lixin Wang, Wenlei Sun, Jintao Zhao, Xuedong Zhang, Cheng Lu and Hao Luo    
As a critical raw material for the textile industry, cotton lint provides various types of cotton yarns, fabrics and finished products. However, due to the complexity of the supply chain and its many links, information records are often missing, inaccura... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Lijun Zu, Wenyu Qi, Hongyi Li, Xiaohua Men, Zhihui Lu, Jiawei Ye and Liang Zhang    
The digital transformation of banks has led to a paradigm shift, promoting the open sharing of data and services with third-party providers through APIs, SDKs, and other technological means. While data sharing brings personalized, convenient, and enriche... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Meng Li, Jiqiang Liu and Yeping Yang    
Data governance is an extremely important protection and management measure throughout the entire life cycle of data. However, there are still data governance issues, such as data security risks, data privacy breaches, and difficulties in data management... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang    
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Midya Alqaradaghi, Muhammad Zafar Iqbal Nazir and Tamás Kozsik    
Static analysis is a software testing technique that analyzes the code without executing it. It is widely used to detect vulnerabilities, errors, and other issues during software development. Many tools are available for static analysis of Java code, inc... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Rana Muhammad Amir Latif, Jinliao He and Muhammad Umer    
An actual cropland extent product with a high spatial resolution with a precision of up to 60 m is believed to be particularly significant in tackling numerous water security concerns and world food challenges. To advance the development of niche, advanc... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
An?e Mihelic, Toma? Hovelja and Simon Vrhovec    
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zixiang Bi, Guosheng Xu, Chenyu Wang, Guoai Xu and Sutao Zhang    
Traditional mechanical parts have been increasingly replaced by in-vehicle electronic control units (ECUs) that communicate via control area networks (CAN). For security reasons, the Database CAN (DBC) file, which defines the contents of CAN messages, is... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Qaisar Abbas, Talal Saad Albalawi, Ganeshkumar Perumal and M. Emre Celebi    
In recent years, advances in deep learning (DL) techniques for video analysis have developed to solve the problem of real-time processing. Automated face recognition in the runtime environment has become necessary in video surveillance systems for urban ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Junkai Yi and Xiaoyan Liu    
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losse... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »