Results 41 to 50 of about 25,084,029 (287)
Intelligent Video Data Security: A Survey and Open Challenges
A range of video contents and technology have provided convenience to humans, with real-time video applications—such as surveillance applications—able to contribute to increasing public safety by reducing physical crimes.
Jin-Yong Yu, Yujun Kim, Young-Gab Kim
semanticscholar +1 more source
A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising
Real-time bidding (RTB) is one of the most striking advances in online advertising, where the websites can sell each ad impression through a public auction, and the advertisers can participate in bidding the impression based on its estimated value.
Mengjuan Liu+4 more
doaj +1 more source
Background The UK Health Security Agency (UKHSA) COVID-19 Outbreak Surveillance Team (OST) was established in June 2020 to provide Local Authorities (LAs) in England with surveillance intelligence to aid their response to the SARS-CoV-2 epidemic. Reports
Katriina Willgert+6 more
doaj +1 more source
IoT data encryption algorithm for security [PDF]
This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data.
Kanaan Ismael, Marwan
core
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan+2 more
core +3 more sources
Digital Signature Security in Data Communication
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti+8 more
core +1 more source
Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.+2 more
core +3 more sources
Secret Sharing for Cloud Data Security
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya+2 more
core +1 more source
The real-time infection hospitalisation and fatality risk across the COVID-19 pandemic in England
The COVID-19 pandemic led to 231,841 deaths and 940,243 hospitalisations in England, by the end of March 2023. This paper calculates the real-time infection hospitalisation risk (IHR) and infection fatality risk (IFR) using the Office for National ...
Thomas Ward+5 more
doaj +1 more source
Surface defect detection plays a crucial role in ensuring the quality standards of hot-rolled steel strips. To meet the demands for high precision and real-time performance in industrial defect detection, this paper introduces an improved one-stage ...
Yunfei Ma+4 more
doaj +1 more source