Results 11 to 20 of about 232,020 (288)
Performance Evaluation of a Lane Correction Module Stress Test: A Field Test of Tesla Model 3
This paper is designed to explicate and analyze data acquired from experimental field tests of a Tesla Model 3 lane correction module within the vehicle’s Autopilot Suite, a component of Tesla OS. The initial problem was discovered during a nominal drive
Jonathan Lancelot +2 more
doaj +1 more source
This paper describes an original methodology for the design of microcontroller-based physical security systems and its application for the system of mobile robots. The novelty of the proposed methodology lies in combining various design algorithms on the
Dmitry Levshun +2 more
doaj +1 more source
Practical Quantum Bit Commitment Protocol Based on Quantum Oblivious Transfer
Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper.
Yaqi Song, Li Yang
doaj +1 more source
Recognition of effective variables on physical safety in elementary school [PDF]
One of the most important steps in planning the design of educational facilities, is attention to the physical safety of these spaces, especially in elementary schools.
H.R. Azemati +2 more
doaj +1 more source
Kerentanan yang Dapat Terjadi di Jaringan Komputer pada Umumnya
The rapid development of computer technology allows ease of access, yet lurking threats. Security in computer networks are categorized into two, namely the physical and non physical security.
Andre M. R. Wajong
doaj +1 more source
The Security of IP-Based Video Surveillance Systems
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT). These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one’s own home.
Naor Kalbo +3 more
doaj +1 more source
On Performance of PBFT Blockchain Consensus Algorithm for IoT-Applications With Constrained Devices
Cyber-physical systems and the Internet of things (IoT) are becoming an integral part of the digital society. The use of IoT services improves human life in many ways.
Yaroslav Meshcheryakov +4 more
doaj +1 more source
A Review of Cyber Threats and Defence Approaches in Emergency Management
Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery.
Tuan Vuong, Diane Gan, George Loukas
doaj +1 more source
Scalable QKD Postprocessing System With Reconfigurable Hardware Accelerator
Key distillation is an essential component of every quantum key distribution (QKD) system because it compensates for the inherent transmission errors of a quantum channel.
Natarajan Venkatachalam +6 more
doaj +1 more source
Automated and Secure Onboarding for System of Systems
The Internet of Things (IoT) is rapidly changing the number of connected devices and the way they interact with each other. This increases the need for an automated and secure onboarding procedure for IoT devices, systems and services.
Silia Maksuti +8 more
doaj +1 more source

