|
|
|
Endrowednes Kuantama, Avishkar Seth, Alice James and Yihao Zhang
The effectiveness of human security-based guard patrol systems often faces challenges related to the consistency of perimeter checks regarding timing and patterns. Some solutions use autonomous drones for monitoring assistance but primarily optimize thei...
ver más
|
|
|
|
|
|
|
Orawan Kumdee, Md. Samim Hossain Molla, Kulwadee Kanavittaya, Jutamas Romkaew, Ed Sarobol and Sutkhet Nakasathien
Rapid climate change may put future food security under threat, which emphasizes the significance of assessing the morpho-physiological and biochemical traits associated with maize tolerance against recurrent water stress at the early vegetative stage. T...
ver más
|
|
|
|
|
|
|
William Hurst, Aaron Boddy, Madjid Merabti and Nathan Shone
Hospital critical infrastructures have a distinct threat vector, due to (i) a dependence on legacy software; (ii) the vast levels of interconnected medical devices; (iii) the use of multiple bespoke software and that (iv) electronic devices (e.g., laptop...
ver más
|
|
|
|
|
|
|
Meriem Houmer,Mariya Ouaissa,Mariyam Ouaissa,Moulay Lahcen Hasnaoui
Pág. pp. 48 - 64
In Intelligent Transport Systems (ITS), Vehicular Ad-hoc Networks (VANET) play an essential role in improving road safety and traffic efficiency. Nevertheless, due to its special characteristics like high mobility, large size of the network and dynamic t...
ver más
|
|
|
|
|
|
|
Lothar Fritsch
This article speculates on the future of privacy and electronic identities on the Internet. Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a ...
ver más
|
|
|
|