Results 41 to 50 of about 25,084,029 (287)

Intelligent Video Data Security: A Survey and Open Challenges

open access: yesIEEE Access, 2021
A range of video contents and technology have provided convenience to humans, with real-time video applications—such as surveillance applications—able to contribute to increasing public safety by reducing physical crimes.
Jin-Yong Yu, Yujun Kim, Young-Gab Kim
semanticscholar   +1 more source

A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising

open access: yesIEEE Access, 2020
Real-time bidding (RTB) is one of the most striking advances in online advertising, where the websites can sell each ad impression through a public auction, and the advertisers can participate in bidding the impression based on its estimated value.
Mengjuan Liu   +4 more
doaj   +1 more source

Influence of SARS-CoV-2 surveillance outputs produced by the UK health security agency (UKHSA) outbreak surveillance team on decision-making by local stakeholders

open access: yesBMC Public Health, 2023
Background The UK Health Security Agency (UKHSA) COVID-19 Outbreak Surveillance Team (OST) was established in June 2020 to provide Local Authorities (LAs) in England with surveillance intelligence to aid their response to the SARS-CoV-2 epidemic. Reports
Katriina Willgert   +6 more
doaj   +1 more source

IoT data encryption algorithm for security [PDF]

open access: yes, 2020
This research project is about encryption simulation for IoT data. It is important to enhance the security system when sending and receiving the IoT data.
Kanaan Ismael, Marwan
core  

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

Digital Signature Security in Data Communication

open access: yes, 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti   +8 more
core   +1 more source

Chaotic iterations versus Spread-spectrum: chaos and stego security [PDF]

open access: yes, 2010
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to ...
Bahi, Jacques M.   +2 more
core   +3 more sources

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

The real-time infection hospitalisation and fatality risk across the COVID-19 pandemic in England

open access: yesNature Communications
The COVID-19 pandemic led to 231,841 deaths and 940,243 hospitalisations in England, by the end of March 2023. This paper calculates the real-time infection hospitalisation risk (IHR) and infection fatality risk (IFR) using the Office for National ...
Thomas Ward   +5 more
doaj   +1 more source

GLF-NET: Global and Local Dynamic Feature Fusion Network for Real-Time Steel Strip Surface Defect Detection

open access: yesIEEE Access
Surface defect detection plays a crucial role in ensuring the quality standards of hot-rolled steel strips. To meet the demands for high precision and real-time performance in industrial defect detection, this paper introduces an improved one-stage ...
Yunfei Ma   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy