Results 21 to 30 of about 2,457,982 (249)

Recognizing Non-Collaborative Radio Station Communication Behaviors Using an Ameliorated LeNet

open access: yesSensors, 2020
This work improves a LeNet model algorithm based on a signal’s bispectral features to recognize the communication behaviors of a non-collaborative short-wave radio station.
Zilong Wu, Hong Chen, Yingke Lei
doaj   +1 more source

The Prowler IADS performance evaluation tool (PIPE) [PDF]

open access: yes, 1994
The Prowler IADS Performance Evaluator is a computer simulation model of an airstrike protected by electronic countermeasures platforms. It is designed for integration into mission planning systems and analysis tools used to determine the effectiveness ...
Bailey, Michael P.   +2 more
core   +1 more source

Improved features using convolution-augmented transformers for keyword spotting [PDF]

open access: yesITM Web of Conferences, 2022
Transformer can effectively model long rang dependency, but suffer from uncapable to extract local feature patterns. While CNNs exploit local features effectively.
Wang Yi   +4 more
doaj   +1 more source

Communication behavior recognition using CNN-based signal analysis [PDF]

open access: yesPeerJ Computer Science
This article explores the technology of recognizing non-cooperative communication behavior, with a specific emphasis on analyzing communication station signals.
Hao Meng   +5 more
doaj   +2 more sources

Combatting electoral traces: the Dutch tempest discussion and beyond [PDF]

open access: yes, 2009
In the Dutch e-voting debate, the crucial issue leading to the abandonment of all electronic voting machines was compromising radiation, or tempest. Other countries, however, do not seem to be bothered by this risk.
A.M. Keller   +8 more
core   +5 more sources

Return-Map Cryptanalysis Revisited [PDF]

open access: yes, 2006
As a powerful cryptanalysis tool, the method of return-map attacks can be used to extract secret messages masked by chaos in secure communication schemes.
GONZALO ÁLVAREZ   +8 more
core   +4 more sources

Security risk assessment and protection in the chemical and process industry [PDF]

open access: yes, 2014
This article describes a security risk assessment and protection methodology that was developed for use in the chemical- and process industry in Belgium. The approach of the method follows a risk-based approach that follows desing principles for chemical
American Petroleum Institute   +19 more
core   +1 more source

Two-Dimensional Angle Estimation of Two-Parallel Nested Arrays Based on Sparse Bayesian Estimation

open access: yesSensors, 2018
To increase the number of estimable signal sources, two-parallel nested arrays are proposed, which consist of two subarrays with sensors, and can estimate the two-dimensional (2-D) direction of arrival (DOA) of signal sources.
Lu Chen, Daping Bi, Jifei Pan
doaj   +1 more source

An n-sided polygonal model to calculate the impact of cyber security events [PDF]

open access: yes, 2016
This paper presents a model to represent graphically the impact of cyber events (e.g., attacks, countermeasures) in a polygonal systems of n-sides. The approach considers information about all entities composing an information system (e.g., users, IP ...
F Cuppens   +6 more
core   +2 more sources

Risk Assessment of a Wind Turbine: A New FMECA-Based Tool With RPN Threshold Estimation [PDF]

open access: yes, 2020
A wind turbine is a complex system used to convert the kinetic energy of the wind into electrical energy. During the turbine design phase, a risk assessment is mandatory to reduce the machine downtime and the Operation & Maintenance cost and to ensure ...
Catelani, Marcantonio   +3 more
core   +3 more sources

Home - About - Disclaimer - Privacy