Results 11 to 20 of about 68,165 (294)

Soft-Computing-Based Estimation of a Static Load for an Overhead Crane

open access: yesSensors, 2023
Payload weight detection plays an important role in condition monitoring and automation of cranes. Crane cells and scales are commonly used in industrial practice; however, when their installation to the hoisting equipment is not possible or costly, an ...
Tom Kusznir, Jaroslaw Smoczek
doaj   +1 more source

Improved prediction error expansion and mirroring embedded samples for enhancing reversible audio data hiding

open access: yesHeliyon, 2021
Many applications work by processing either small or big data, including sensitive and confidential ones, through computer networks like cloud computing. However, many systems are public and may not provide enough security mechanisms. Meanwhile, once the
Yoga Samudra, Tohari Ahmad
doaj   +1 more source

JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image

open access: yesEURASIP Journal on Image and Video Processing, 2021
The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image.
Jie Wang   +5 more
doaj   +1 more source

An efficient data hiding for ECG signals based on the integer wavelet transform and block standard deviation

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Herein, we present an improved electrocardiogram (ECG) steganography for the protection of patients’ sensitive data, such as blood pressure, glucose level, lipid profile, and other personal health information. Based on the integer wavelet transform (IWT),
Ching-Yu Yang, Wen-Fong Wang
doaj   +1 more source

IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN [PDF]

open access: yes, 2020
Internet of Things (IoT) gains popularity in recent times due to its flexibility, usability, diverse applicability and ease of deployment. However, the issues related to security is less explored. The IoT devices are light weight in nature and have low
Bhowmik, Deepayan   +2 more
core   +3 more sources

A Robust and Fast Collision-Avoidance Approach for Micro Aerial Vehicles Using a Depth Sensor

open access: yesRemote Sensing, 2021
Collision-avoidance is a crucial research topic in robotics. Designing a collision-avoidance algorithm is still a challenging and open task, because of the requirements for navigating in unstructured and dynamic environments using limited payload and ...
Liang Lu   +3 more
doaj   +1 more source

Exploiting network restricted compute resources with HTCondor: a CMS experiment experience [PDF]

open access: yesEPJ Web of Conferences, 2020
In view of the increasing computing needs for the HL-LHC era, the LHC experiments are exploring new ways to access, integrate and use non-Grid compute resources.
Acosta-Silva Carles   +7 more
doaj   +1 more source

Performance Evaluation of Containerization in Edge-Cloud Computing Stacks for Industrial Applications: A Client Perspective

open access: yesIEEE Open Journal of the Industrial Electronics Society, 2021
Today, the edge-cloud computing paradigm starts to gain increasing popularity, aiming to enable short latency, fast decision-making and intelligence at the network edge, especially for industrial applications.
Yu Liu   +4 more
doaj   +1 more source

SGXDump: A Repeatable Code-Reuse Attack for Extracting SGX Enclave Memory

open access: yesApplied Sciences, 2022
Intel SGX (Software Guard Extensions) is a hardware-based security solution that provides a trusted computing environment. SGX creates an isolated memory area called enclave and prevents any illegal access from outside of the enclave.
HanJae Yoon, ManHee Lee
doaj   +1 more source

Building Intelligence in the Mechanical Domain—Harvesting the Reservoir Computing Power in Origami to Achieve Information Perception Tasks

open access: yesAdvanced Intelligent Systems, 2023
Herein, the cognitive capability of a simple, paper‐based Miura‐ori—using the physical reservoir computing framework—is experimentally examined to achieve different information perception tasks.
Jun Wang, Suyi Li
doaj   +1 more source

Home - About - Disclaimer - Privacy