Results 11 to 20 of about 911,528 (286)

Representing Spatial Data with Graph Contrastive Learning

open access: yesRemote Sensing, 2023
Large-scale geospatial data pave the way for geospatial machine learning algorithms, and a good representation is related to whether the machine learning model is effective.
Lanting Fang   +3 more
doaj   +1 more source

Deep neural network-aided design of terahertz bifunctional metasurface

open access: yesResults in Physics, 2023
Based on the insulator-to-metal phase transition of vanadium dioxide (VO2), we present a bifunctional metasurface (MS), which can be switched between the two working states, i.e., a broadband absorber and a broadband polarization converter.
Yisong Lv   +5 more
doaj   +1 more source

Determination algorithms of smoke interface height in channel fire simulation: Data comparative analysis and experimental verification

open access: yesCase Studies in Thermal Engineering, 2022
Smoke layer interface height is an important safety parameter in channel fire accidents. This paper proposed and compared three determination algorithms to estimated smoke layer interface height in channel fire simulation based on the characteristics of ...
Xi Zhang   +5 more
doaj   +1 more source

Mobile Application Security Platforms Survey [PDF]

open access: yes, 2016
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar   +2 more
core   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

A trustworthy mobile agent infrastructure for network management [PDF]

open access: yes, 2007
Despite several advantages inherent in mobile-agent-based approaches to network management as compared to traditional SNMP-based approaches, industry is reluctant to adopt the mobile agent paradigm as a replacement for the existing manager-agent model ...
Koliousis, A., Sventek, J.S.
core   +1 more source

On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite–Ground Integrated Networks

open access: yesSensors, 2023
Satellite–ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues are challenging with heterogeneous networks.
Ya Tao   +4 more
doaj   +1 more source

Empirically Investigating Extraneous Influences on the “APCO” Model—Childhood Brand Nostalgia and the Positivity Bias

open access: yesFuture Internet, 2020
Pokémon Go is one of the most successful mobile games of all time. Millions played and still play this mobile augmented reality (AR) application, although severe privacy issues are pervasive in the app due to its use of several sensors such as location ...
David Harborth, Sebastian Pape
doaj   +1 more source

Migration control for mobile agents based on passport and visa [PDF]

open access: yes, 2003
Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in
Greenberg   +7 more
core   +2 more sources

Modulation instability—rogue wave correspondence hidden in integrable systems

open access: yesCommunications Physics, 2022
In topological physics, the bulk-boundary correspondence is of great interest in both Hermitian and non-Hermitian systems. This work unveils a similar universal modulation instability-rogue wave correspondence in integrable models, which may offer a way ...
Shihua Chen   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy