10   Artículos

 
en línea
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin    
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Mona Alkanhal, Abdulaziz Alali and Mohamed Younis    
In recent times, the advent of innovative technological paradigms like the Internet of Things has paved the way for numerous applications that enhance the quality of human life. A remarkable application of IoT that has emerged is the Internet of Vehicles... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Ruslans Babajans, Darja Cirjulina, Filips Capligins, Deniss Kolosovs and Anna Litvinenko    
The current work is focused on studying the performance of the Pecora?Carroll synchronization technique to achieve synchronization between the analog and discrete chaos oscillators. The importance of this study is supported by the growing applications of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Duc-Minh Ngo, Dominic Lightbody, Andriy Temko, Cuong Pham-Quoc, Ngoc-Thinh Tran, Colin C. Murphy and Emanuel Popovici    
This study proposes a heterogeneous hardware-based framework for network intrusion detection using lightweight artificial neural network models. With the increase in the volume of exchanged data, IoT networks? security has become a crucial issue. Anomaly... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Alessandro Bocci, Stefano Forti, Roberto Guanciale, Gian-Luigi Ferrari and Antonio Brogi    
The security of Cloud applications is a major concern for application developers and operators. Protecting users? data confidentiality requires methods to avoid leakage from vulnerable software and unreliable Cloud providers. Recently, trusted execution ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan    
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

 
en línea
Ramon Martín de Pozuelo, Agustín Zaballos, Joan Navarro and Guiomar Corral    
The smart grid can be seen as a hybrid system composed by many systems. From a large scale point of view, it combines the electric power system itself and a heterogeneous information and communication technology (ICT) infrastructure. Additionally, these ... ver más
Revista: Energies    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »