Stand-Alone and Hybrid Positioning Using Asynchronous Pseudolites
global navigation satellite system (GNSS) receivers are usually unable to achieve satisfactory performance in difficult environments, such as open-pit mines, urban canyons and indoors. Pseudolites have the potential to extend GNSS usage and significantly
Ciro Gioia, Daniele Borio
doaj +1 more source
Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach
Security has become one of the primary factors that cloud customers consider when they select a cloud provider for migrating their data and applications into the Cloud.
Sebastian Pape +3 more
doaj +1 more source
Security Analysis and Enhancement of INTERBUS Protocol in ICS Based on Colored Petri Net
The integration of buses in industrial control systems, fueled by advancements such as the Internet of Things (IoT), has led to their widespread adoption, significantly enhancing operational efficiency.
Tao Feng +3 more
doaj +1 more source
Geoeconomic Strategies in the Modern Global Economic Space [PDF]
In today's context, it is considered that with the reduction of the risk of military intervention, military security has come to the forefront and economic security has become a priority for the national interests of the country.
Gaiduchok, O. (Oksana)
core +3 more sources
Impact Webs: a novel conceptual modelling approach for characterising and assessing complex risks [PDF]
Identifying, characterising, and assessing the complex nature of risks are vital to realise the expected outcome of the Sendai Framework for Disaster Risk Reduction.
E. Sparkes +5 more
doaj +1 more source
Research on Text Information Depth Extraction and Multi-keyword Parallel Matching Technique [PDF]
At present,text information extraction and retrieval cannot adapt to the complex environment,limited by user rights and facing the problem of large storage capacity.Based on the feature analysis of all kinds of document text information,a parallel depth ...
WANG Wenqi,LI Yong,GUAN Yunyun
doaj +1 more source
Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams [PDF]
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Caballé Llobet, Santiago +3 more
core +1 more source
Cross-Network User Identity Linkage Method with Deep Learning Based on SDNE Embedding Representation [PDF]
Mining the correlation between massive virtual identities and determining the identity of different virtual identities are of great significance for accurate user recommendation, abnormal user detection, public opinion control and so on.
CHENG Jialin, YUAN Deyu, SUN Zeyu, CHEN Ziyan
doaj +1 more source
X-ray Prohibited Items Detection Based on Inverted Bottleneck and Light Convolution Block Attention Module [PDF]
To resolve the problems of position and angle change causing miss and false detection, low accuracy of difficult samples in X-ray luggage images, using YOLOv5 as the baseline, this paper proposes a model by inverted bottleneck and light convolution block
DONG Yishan, GUO Jingyuan, LI Mingze, SUN Jia'ao, LU Shuhua
doaj +1 more source
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications [PDF]
Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could ...
Chockalingam, Sabarathinam +4 more
core +3 more sources

