Results 11 to 20 of about 232,020 (288)

Performance Evaluation of a Lane Correction Module Stress Test: A Field Test of Tesla Model 3

open access: yesFuture Internet, 2023
This paper is designed to explicate and analyze data acquired from experimental field tests of a Tesla Model 3 lane correction module within the vehicle’s Autopilot Suite, a component of Tesla OS. The initial problem was discovered during a nominal drive
Jonathan Lancelot   +2 more
doaj   +1 more source

Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring

open access: yesSensors, 2021
This paper describes an original methodology for the design of microcontroller-based physical security systems and its application for the system of mobile robots. The novelty of the proposed methodology lies in combining various design algorithms on the
Dmitry Levshun   +2 more
doaj   +1 more source

Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer

open access: yesApplied Sciences, 2018
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj   +1 more source

Recognition of effective variables on physical safety in elementary school [PDF]

open access: yesFanāvarī-i āmūzish, 2015
One of the most important steps in planning the design of educational facilities, is attention to the physical safety of these spaces, especially in elementary schools.
H.R. Azemati   +2 more
doaj   +1 more source

Kerentanan yang Dapat Terjadi di Jaringan Komputer pada Umumnya

open access: yesComTech, 2012
The rapid development of computer technology allows ease of access, yet lurking threats. Security in computer networks are categorized into two, namely the physical and non physical security.
Andre M. R. Wajong
doaj   +1 more source

The Security of IP-Based Video Surveillance Systems

open access: yesSensors, 2020
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home.
Naor Kalbo   +3 more
doaj   +1 more source

On Performance of PBFT Blockchain Consensus Algorithm for IoT-Applications With Constrained Devices

open access: yesIEEE Access, 2021
Cyber-physical systems and the Internet of things (IoT) are becoming an integral part of the digital society. The use of IoT services improves human life in many ways.
Yaroslav Meshcheryakov   +4 more
doaj   +1 more source

A Review of Cyber Threats and Defence Approaches in Emergency Management

open access: yesFuture Internet, 2013
Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery.
Tuan Vuong, Diane Gan, George Loukas
doaj   +1 more source

Scalable QKD Postprocessing System With Reconfigurable Hardware Accelerator

open access: yesIEEE Transactions on Quantum Engineering, 2023
Key distillation is an essential component of every quantum key distribution (QKD) system because it compensates for the inherent transmission errors of a quantum channel.
Natarajan Venkatachalam   +6 more
doaj   +1 more source

Automated and Secure Onboarding for System of Systems

open access: yesIEEE Access, 2021
The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services.
Silia Maksuti   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy