|
|
|
Eduardo Juarez-Mendoza, Francisco Asahel del Angel-Diaz, Alejandro Diaz-Sanchez and Esteban Tlelo-Cuautle
This manuscript shows the CMOS design of Lorenz systems using operational transconductance amplifiers (OTAs). Two Lorenz systems are then synchronized in a master?slave topology and used to implement a CMOS secure communication system. The contribution i...
ver más
|
|
|
|
|
|
|
Agnieszka Dutkowska-Zuk, Joe Bourne, Chengyuan An, Xuan Gao, Oktay Cetinkaya, Peter Novitzky, Gideon Ogunniye, Rachel Cooper, David De Roure, Julie McCann, Jeremy Watson, Tim Watson and Eleri Jones
This systematic literature review explores the scholarly debate around public perceptions and behaviors in the context of cybersecurity in connected places. It reveals that, while many articles highlight the importance of public perceptions and behaviors...
ver más
|
|
|
|
|
|
|
Al Tariq Sheik, Carsten Maple, Gregory Epiphaniou and Mehrdad Dianati
Cloud-Assisted Connected and Autonomous Vehicles (CCAV) are set to revolutionise road safety, providing substantial societal and economic advantages. However, with the evolution of CCAV technology, security and privacy threats have increased. Although se...
ver más
|
|
|
|
|
|
|
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,...
ver más
|
|
|
|
|
|
|
José Luis Zambrano, Yamil Cartagena, Carlos Sangoquiza, Ana Pincay, Anibal Rafael Parra, Javier Maiguashca, José Luis Rivadeneira, Cristian Subía and Chang Hwan Park
Global food security faces a substantial risk stemming from water scarcity, particularly in regions heavily dependent on rainfall for agricultural purposes. In the Andean region, which is grappling with water scarcity, innovative and sustainable approach...
ver más
|
|
|
|
|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Fansheng Zhang, Lianglin Dong, Hongbo Wang, Ke Zhong, Peiyuan Zhang and Jinyan Jiang
During the construction of underground engineering, the prediction of groundwater distribution and rock body permeability is essential for evaluating the safety of the project and guiding subsequent design and construction. This article proposes an objec...
ver más
|
|
|
|
|
|
|
Paul Scalise, Matthew Boeding, Michael Hempel, Hamid Sharif, Joseph Delloiacovo and John Reed
With the rapid rollout and growing adoption of 3GPP 5thGeneration (5G) cellular services, including in critical infrastructure sectors, it is important to review security mechanisms, risks, and potential vulnerabilities within this vital technology. Nume...
ver más
|
|
|
|
|
|
|
Mona Alkanhal, Abdulaziz Alali and Mohamed Younis
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles...
ver más
|
|
|
|
|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|