Results 11 to 20 of about 1,764,419 (291)

Stand-Alone and Hybrid Positioning Using Asynchronous Pseudolites

open access: yesSensors, 2014
global navigation satellite system (GNSS) receivers are usually unable to achieve satisfactory performance in difficult environments, such as open-pit mines, urban canyons and indoors. Pseudolites have the potential to extend GNSS usage and significantly
Ciro Gioia, Daniele Borio
doaj   +1 more source

Selecting a Secure Cloud Provider—An Empirical Study and Multi Criteria Approach

open access: yesInformation, 2020
Security has become one of the primary factors that cloud customers consider when they select a cloud provider for migrating their data and applications into the Cloud.
Sebastian Pape   +3 more
doaj   +1 more source

Security Analysis and Enhancement of INTERBUS Protocol in ICS Based on Colored Petri Net

open access: yesInformation, 2023
The integration of buses in industrial control systems, fueled by advancements such as the Internet of Things (IoT), has led to their widespread adoption, significantly enhancing operational efficiency.
Tao Feng   +3 more
doaj   +1 more source

Geoeconomic Strategies in the Modern Global Economic Space [PDF]

open access: yes, 2019
In today's context, it is considered that with the reduction of the risk of military intervention, military security has come to the forefront and economic security has become a priority for the national interests of the country.
Gaiduchok, O. (Oksana)
core   +3 more sources

Impact Webs: a novel conceptual modelling approach for characterising and assessing complex risks [PDF]

open access: yesHydrology and Earth System Sciences
Identifying, characterising, and assessing the complex nature of risks are vital to realise the expected outcome of the Sendai Framework for Disaster Risk Reduction.
E. Sparkes   +5 more
doaj   +1 more source

Research on Text Information Depth Extraction and Multi-keyword Parallel Matching Technique [PDF]

open access: yesJisuanji gongcheng, 2018
At present,text information extraction and retrieval cannot adapt to the complex environment,limited by user rights and facing the problem of large storage capacity.Based on the feature analysis of all kinds of document text information,a parallel depth ...
WANG Wenqi,LI Yong,GUAN Yunyun
doaj   +1 more source

Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams [PDF]

open access: yes, 2014
(c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Caballé Llobet, Santiago   +3 more
core   +1 more source

Cross-Network User Identity Linkage Method with Deep Learning Based on SDNE Embedding Representation [PDF]

open access: yesJisuanji kexue yu tansuo
Mining the correlation between massive virtual identities and determining the identity of different virtual identities are of great significance for accurate user recommendation, abnormal user detection, public opinion control and so on.
CHENG Jialin, YUAN Deyu, SUN Zeyu, CHEN Ziyan
doaj   +1 more source

X-ray Prohibited Items Detection Based on Inverted Bottleneck and Light Convolution Block Attention Module [PDF]

open access: yesJisuanji kexue yu tansuo
To resolve the problems of position and angle change causing miss and false detection, low accuracy of difficult samples in X-ray luggage images, using YOLOv5 as the baseline, this paper proposes a model by inverted bottleneck and light convolution block
DONG Yishan, GUO Jingyuan, LI Mingze, SUN Jia'ao, LU Shuhua
doaj   +1 more source

Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications [PDF]

open access: yes, 2016
Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could ...
Chockalingam, Sabarathinam   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy