|
|
|
Eduardo Juarez-Mendoza, Francisco Asahel del Angel-Diaz, Alejandro Diaz-Sanchez and Esteban Tlelo-Cuautle
This manuscript shows the CMOS design of Lorenz systems using operational transconductance amplifiers (OTAs). Two Lorenz systems are then synchronized in a master?slave topology and used to implement a CMOS secure communication system. The contribution i...
ver más
|
|
|
|
|
|
|
Hao An, Ruotong Ma, Yuhan Yan, Tailai Chen, Yuchen Zhao, Pan Li, Jifeng Li, Xinyue Wang, Dongchen Fan and Chunli Lv
This paper aims to address the increasingly severe security threats in financial systems by proposing a novel financial attack detection model, Finsformer. This model integrates the advanced Transformer architecture with the innovative cluster-attention ...
ver más
|
|
|
|
|
|
|
Guillermo Calahorra-Candao and María José Martín-de Hoyos
This study develops a theoretical framework integrating the Technology Acceptance Model (TAM) and Uses and Gratifications Theory (UGT) to predict and understand the acceptance of voice shopping intentions, particularly through AI-driven voice assistants....
ver más
|
|
|
|
|
|
|
Iman I. M. Abu Sulayman, Peter Voege and Abdelkader Ouda
The increasing significance of data analytics in modern information analysis is underpinned by vast amounts of user data. However, it is only feasible to amass sufficient data for various tasks in specific data-gathering contexts that either have limited...
ver más
|
|
|
|
|
|
|
Li Zhao, Nathee Naktnasukanjn, Ahmad Yahya Dawod and Bin Zhang
The efficient capital markets hypothesis (EMH) posits that security prices incorporate all available information in capital markets. Nevertheless, real stock markets often exhibit speculative behavior due to information asymmetry and the limited rational...
ver más
|
|
|
|
|
|
|
MohammadMoein Shafi, Arash Habibi Lashkari, Vicente Rodriguez and Ron Nevo
The distributed denial of service attack poses a significant threat to network security. Despite the availability of various methods for detecting DDoS attacks, the challenge remains in creating real-time detectors with minimal computational overhead. Ad...
ver más
|
|
|
|
|
|
|
Zhe Xu, Bing Guan, Lixin Wei, Shuangqing Chen, Minghao Li and Xiaoyu Jiang
The development of hydrogen-blended natural gas (HBNG) increases the risk of gas transportation and presents challenges for pipeline security in utility tunnels. The objective of this study is to investigate the diffusion properties of HBNG in utility tu...
ver más
|
|
|
|
|
|
|
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of...
ver más
|
|
|
|
|
|
|
Ruslans Babajans, Darja Cirjulina, Filips Capligins, Deniss Kolosovs and Anna Litvinenko
The current work is focused on studying the performance of the Pecora?Carroll synchronization technique to achieve synchronization between the analog and discrete chaos oscillators. The importance of this study is supported by the growing applications of...
ver más
|
|
|
|
|
|
|
Bing Su and Jiwu Liang
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and sec...
ver más
|
|
|
|