|
|
|
María Gema Carrasco-García, María Inmaculada Rodríguez-García, Juan Jesús Ruíz-Aguilar, Lipika Deka, David Elizondo and Ignacio José Turias Domínguez
Hyperspectral technology has been playing a leading role in monitoring oil spills in marine environments, which is an issue of international concern. In the case of monitoring oil spills in local areas, hyperspectral technology of small dimensions is the...
ver más
|
|
|
|
|
|
|
Krzysztof Lachutta and Krzysztof Józef Jankowski
The present study was undertaken to determine the effect of different sowing strategies and spring nitrogen (N) fertilizer rates on the technological quality of winter wheat (Triticum aestivum L.) grain in terms of its milling quality, protein complex qu...
ver más
|
|
|
|
|
|
|
Feng Li, Xuefeng Xi, Zhiming Cui, Dongyang Li and Wanting Zeng
Essays are a pivotal component of conventional exams; accurately, efficiently, and effectively grading them is a significant challenge for educators. Automated essay scoring (AES) is a complex task that utilizes computer technology to assist teachers in ...
ver más
|
|
|
|
|
|
|
Youssra Ahouach, Abdennasser Baali, Abdellah Boushaba, Oualid Hakam, Khalil Azennoud, Aziza Lyazidi, Safaa Benmessaoud, Amine Assouguem, Mohammed Kara, Mona Abdullah Alsaigh, Amal M. Al-Mohaimeed and Tse-Wei Chen
In order to qualify and quantify the impact of sediment contamination in hydric settings by metallic trace elements (MTE) emanating from the controlled dump of Fez city (northern Morocco), leachate and sediment sample analyses were carried out. The leach...
ver más
|
|
|
|
|
|
|
Hassan Alzahrani, Abdelbaset S. El-Sorogy, Saleh Qaysi and Fahad Alshehri
Coastal environments need continuous environmental risk assessment, especially with increasing coastal development and human activities. The present work evaluates the distribution, contamination, and environmental risk of potentially toxic elements (PTE...
ver más
|
|
|
|
|
|
|
Weixiang Wu, Xusen Wan, Jinbao Zhang and Shi Cheng
The infection countermeasure, in which the main idea is to prevent adversaries from exploiting faulty ciphertexts to break the key by spreading the induced fault, is a very effective countermeasure against fault attacks. However, most existing infection ...
ver más
|
|
|
|
|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
|
Manal Rajeh AlShalaan and Suliman Mohamed Fati
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data th...
ver más
|
|
|
|
|
|
|
James Msughter Adeke, Guangjie Liu, Junjie Zhao, Nannan Wu and Hafsat Muhammad Bashir
Machine learning (ML) models are essential to securing communication networks. However, these models are vulnerable to adversarial examples (AEs), in which malicious inputs are modified by adversaries to produce the desired output. Adversarial training i...
ver más
|
|
|
|
|
|
|
Valentin Martinoli, Elouan Tourneur, Yannick Teglia and Régis Leveugle
In this work, we study an end-to-end implementation of a Prime + Probe covert channel on the CVA6 RISC-V processor implemented on a FPGA target and running a Linux OS. We develop the building blocks of the covert channel and provide a detailed view of it...
ver más
|
|
|
|