Results 21 to 30 of about 249,048 (284)

User-centric Privacy Engineering for the Internet of Things [PDF]

open access: yes, 2018
User privacy concerns are widely regarded as a key obstacle to the success of modern smart cyber-physical systems. In this paper, we analyse, through an example, some of the requirements that future data collection architectures of these systems should ...
Barhamgi, Mahmoud   +3 more
core   +3 more sources

Use of Augmented and Virtual Reality in Remote Higher Education: A Systematic Umbrella Review

open access: yesEducation Sciences, 2020
In this systematic umbrella review we aggregate the current knowledge of how virtual and augmented reality technologies are applicable to and impact remote learning in higher education; specifically, how they impact such learning outcomes as performance ...
Krisjanis Nesenbergs   +3 more
doaj   +1 more source

Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey

open access: yesIEEE Access, 2020
Distributed Ledger Technologies (DLTs), like Blockchain, are characterized by features such as transparency, traceability, and security by design. These features make the adoption of Blockchain attractive to enhance information security, privacy, and ...
Emanuele Bellini   +2 more
doaj   +1 more source

Enabling Remote Responder Bio-Signal Monitoring in a Cooperative Human–Robot Architecture for Search and Rescue

open access: yesSensors, 2022
The roles of emergency responders are challenging and often physically demanding, so it is essential that their duties are performed safely and effectively.
Pablo Vera-Ortega   +4 more
doaj   +1 more source

Distributed and Communication-Efficient Spatial Auto-Correlation Subsurface Imaging in Sensor Networks

open access: yesSensors, 2019
A wireless seismic network can be effectively used as a tool for subsurface monitoring and imaging. By recording and analyzing ambient noise, a seismic network can image underground infrastructures and provide velocity variation information of the ...
Maria Valero   +3 more
doaj   +1 more source

Decision tree-based detection of denial of service and command injection attacks on robotic vehicles [PDF]

open access: yes, 2015
Mobile cyber-physical systems, such as automobiles, drones and robotic vehicles, are gradually becoming attractive targets for cyber attacks. This is a challenge because intrusion detection systems built for conventional computer systems tend to be ...
Bezemskij, Anatolij   +3 more
core   +2 more sources

Active Heat Flow Sensing for Robust Material Identification

open access: yesIEEE Access, 2023
Thermal properties are significant for recognizing an object’s material but cannot be determined via visual and stiffness (or tactile)–based recognition techniques.
Yukiko Osawa   +3 more
doaj   +1 more source

The Impact of Operators' Performance in the Reliability of Cyber-Physical Power Distribution Systems

open access: yes, 2016
Cyber-Physical Systems are the result of integrating information and communication technologies into physical systems. One particular case are Cyber-Physical Power Systems (CPPS), which use communication technologies to perform real-time monitoring and ...
Bessani, Michel   +3 more
core   +1 more source

Hybrid Formation Control for Multi-Robot Hunters Based on Multi-Agent Deep Deterministic Policy Gradient

open access: yesMendel, 2021
The cooperation between mobile robots is one of the most important topics of interest to researchers, especially in the many areas in which it can be applied. Hunting a moving target with random behavior is an application that requires robust cooperation
Oussama Hamed, Mohamed Hamlich
doaj   +1 more source

Securing Real-Time Internet-of-Things

open access: yes, 2018
Modern embedded and cyber-physical systems are ubiquitous. A large number of critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.).
Chen, Chien-Ying   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy