Results 111 to 120 of about 169,904 (225)
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
HMC‐DSR: An FPGA‐Accelerated Clustered Routing Protocol for Scalable and Energy‐Efficient MANETs
FPGA‐based HMC‐DSR protocol enhances MANET routing with real‐time, energy‐efficient processing, reducing end‐to‐end delay by 20.7%. Power consumption decreased by 15.8%, making it ideal for energy‐constrained systems. Hardware resource optimization achieved a 31.2% reduction in flip‐flops and 27.4% in slice utilization. Throughput improvement of 19.4%,
Arvind Kumar +3 more
wiley +1 more source
Fractional Orbital Angular Momentum Sorting Using Wind Spiral Transformation
A wind‐spiral coordinate transformation enables mode sorting of fractional‐order orbital angular momentum (OAM) states, overcoming the limited channel count of conventional integer only sorters. Fractional OAM is mapped into a controlled superposition of integer modes, producing distinctive multi‐peak signatures for discrimination.
Xiaobin Yang +7 more
wiley +1 more source
GSPB: a global-statistic and packet-byte fusion framework for encrypted traffic classification
While encrypted traffic protects user privacy and data security, it is also frequently exploited by malicious actors for illegal activities, e.g., phishing and malware distribution.
Haiyue Li +4 more
doaj +1 more source
Māori Data Sovereignty and Māori Data Governance are articulationsand expressions of our Māori rights to be self‐determining as sovereign peoples. Over the last decade, there has been considerable growth in scholarship, theorising and advocacy around Māori Data Sovereignty with a number of frameworks, models and sets of principles developed ...
Paula Toko King +9 more
wiley +1 more source
An Ecosystem to Develop Multi‐Agent Systems in Real‐World IoT Applications
ABSTRACT Software agents and multi‐agent systems are critical components in the development of distributed autonomous systems, as they exhibit a wide range of “intelligence,” from reactive behaviors to advanced reasoning and planning. Integrating these capabilities into multi‐agent systems enables distributed artificial intelligence, a programming ...
Davide Carnemolla +3 more
wiley +1 more source
Abstract We show the development of an innovative Internet of Things Real Time Kinematic Global Navigation Satellite System, to study the short‐term changes in surface velocity of two adjacent Icelandic glaciers, in order to understand the response of glaciers to climate change.
K. Martinez +5 more
wiley +1 more source
A byte-size multi-variable-length-code based string matching algorithm for Alpha image coding
According to the characteristics of Alpha image and the statistical characteristics of coding parameters of string matching algorithm,an Alpha image coding algorithm based on byte-size multi-variable long-length string matching was proposed.The algorithm
Liping ZHAO +4 more
doaj
Fault Friction, Plate Rheology, and Mantle Torques From a Global Dynamic Model of Neotectonics
Abstract Improvements in software, parallel computing, global data sets, and laboratory flow‐laws help to develop the global Earth5 thin‐shell finite‐element model of Bird et al. (2008, https://doi.org/10.1029/2007jb005460) into a benchmark study. All experiments confirm that modeled faults (other than megathrusts) have low effective friction of 0.085 ±
Peter Bird +2 more
wiley +1 more source

