Results 21 to 30 of about 911,528 (286)

RESEARCH ON THE REDUCTION OF CARBON EMISSIONS IN BUILDINGS BY SPECIFYING LOW-CARBON CONCRETE MIXES IN CHINA [PDF]

open access: yesProceedings on Engineering Sciences, 2023
Buildings are key contributors to the emissions of toxic carbon dioxide, which is a global greenhouse gas, and lowering the concentration of this gas is an essential mitigation in mitigating the effects of climate change.
Xi Zhang , Jian Yin , Fangwei Li
doaj   +1 more source

Attacks Against White-Box ECDSA and Discussion of Countermeasures

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
This paper deals with white-box implementations of the Elliptic Curve Digital Signature Algorithm (ECDSA): First, we consider attack paths to break such implementations.
Sven Bauer   +5 more
doaj   +3 more sources

Data Augmentation and Second-Order Pooling for Facial Expression Recognition

open access: yesIEEE Access, 2019
Facial expression is the main medium of information transmission in human communication, playing an important role in human's daily life. Facial expression recognition is still challenging due to the various obstacle, illumination, and posture.
Xiaoyun Tong, Songlin Sun, Meixia Fu
doaj   +1 more source

S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]

open access: yes, 2017
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia   +2 more
core   +2 more sources

Integrity protection for code-on-demand mobile agents in e-commerce [PDF]

open access: yes, 2002
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling ...
Chan, TK, Guan, SU, Wang, TH
core   +1 more source

Application of Workflow Technology for Big Data Analysis Service

open access: yesApplied Sciences, 2018
This study presents a lightweight representational state transfer-based cloud workflow system to construct a big data intelligent software-as-a-service (SaaS) platform.
Bin Zhang   +4 more
doaj   +1 more source

HotMobile 2008: Postconference Report [PDF]

open access: yes, 2008
HotMobile 2008 presented a two-day program on mobile computing systems and applications. The authors focuses on the sessions on sensors, modularity, wireless, security, systems, and screens.
Lindqvist, J., Pawar, P., Stuntebeck, E.
core   +2 more sources

A Review of Mathematical Models of Building Physics and Energy Technologies for Environmentally Friendly Integrated Energy Management Systems

open access: yesBuildings, 2022
The Energy Management System (EMS) is an efficient technique to monitor, control and enhance the building performance. In the state-of-the-art, building performance analysis is separated into building simulation and control management: this may cause ...
Yajie Zhang, Behrang Vand, Simone Baldi
doaj   +1 more source

Future consumer mobile phone security: a case study using the data centric security model [PDF]

open access: yes, 2008
In the interconnected world that we live in, traditional security barriers are\ud broken down. Developments such as outsourcing, increased usage of mobile\ud devices and wireless networks each cause new security problems.\ud To address the new security ...
Cleeff, Andre van
core   +5 more sources

Secure transmission technology based on direct modulation with random channel characteristics

open access: yesSecurity and Safety, 2022
Aiming at the problem of insufficient security in the existing wireless data transmission, a security transmission technology based on direct modulation with random channel characteristics is proposed.
Yang Rong, Hu Aiqun
doaj   +1 more source

Home - About - Disclaimer - Privacy