Results 11 to 20 of about 68,165 (294)
Soft-Computing-Based Estimation of a Static Load for an Overhead Crane
Payload weight detection plays an important role in condition monitoring and automation of cranes. Crane cells and scales are commonly used in industrial practice; however, when their installation to the hoisting equipment is not possible or costly, an ...
Tom Kusznir, Jaroslaw Smoczek
doaj +1 more source
Many applications work by processing either small or big data, including sensitive and confidential ones, through computer networks like cloud computing. However, many systems are public and may not provide enough security mechanisms. Meanwhile, once the
Yoga Samudra, Tohari Ahmad
doaj +1 more source
The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image.
Jie Wang +5 more
doaj +1 more source
Herein, we present an improved electrocardiogram (ECG) steganography for the protection of patients’ sensitive data, such as blood pressure, glucose level, lipid profile, and other personal health information. Based on the integer wavelet transform (IWT),
Ching-Yu Yang, Wen-Fong Wang
doaj +1 more source
IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan +2 more
core +3 more sources
A Robust and Fast Collision-Avoidance Approach for Micro Aerial Vehicles Using a Depth Sensor
Collision-avoidance is a crucial research topic in robotics. Designing a collision-avoidance algorithm is still a challenging and open task, because of the requirements for navigating in unstructured and dynamic environments using limited payload and ...
Liang Lu +3 more
doaj +1 more source
Exploiting network restricted compute resources with HTCondor: a CMS experiment experience [PDF]
In view of the increasing computing needs for the HL-LHC era, the LHC experiments are exploring new ways to access, integrate and use non-Grid compute resources.
Acosta-Silva Carles +7 more
doaj +1 more source
Today, the edge-cloud computing paradigm starts to gain increasing popularity, aiming to enable short latency, fast decision-making and intelligence at the network edge, especially for industrial applications.
Yu Liu +4 more
doaj +1 more source
SGXDump: A Repeatable Code-Reuse Attack for Extracting SGX Enclave Memory
Intel SGX (Software Guard Extensions) is a hardware-based security solution that provides a trusted computing environment. SGX creates an isolated memory area called enclave and prevents any illegal access from outside of the enclave.
HanJae Yoon, ManHee Lee
doaj +1 more source
Herein, the cognitive capability of a simple, paper‐based Miura‐ori—using the physical reservoir computing framework—is experimentally examined to achieve different information perception tasks.
Jun Wang, Suyi Li
doaj +1 more source

