Results 61 to 70 of about 2,352,522 (144)
An analysis of security issues in building automation systems [PDF]
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core +2 more sources
Energy security issues in contemporary Europe [PDF]
Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over ...
Abrhám, Josef +3 more
core
Security of Smart Home-Smartphones Systems
With technology increasingly present in people’s lives, smart homes are gaining more and more impact each day. While in the past smart homes consisted in presence sensors, cameras and automatic shutters, nowadays they are composed of several sensors and equipment that can control and monitor different things, such as temperature or heat. The homeowners
Teixeira, Diogo +2 more
openaire +2 more sources
Multi-Layer IoT Security Framework for Ambient Intelligence Environments
Ambient intelligence is a new paradigm in the Internet of Things (IoT) world that brings smartness to living environments to make them more sensitive; adaptive; and personalized to human needs.
Ion Bica +3 more
doaj +1 more source
Mission planners are one of the major classes of autonomy software and their design is especially challenging in the case cooperation autonomy is required for unmanned multi-vehicle systems.
Vittorio U. Castrillo +4 more
doaj +1 more source
Electronic Security Systems in Academic Libraries: A Case Study of Three University Libraries in South-West Nigeria. [PDF]
This study examines the effectiveness of electronic security systems in academic libraries with a focus on selected university libraries in South-West Nigeria.
Osayande, Odaro
core +1 more source
Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set.
Brooks, Richard R. +5 more
core +1 more source
DLT Based Authentication Framework for Industrial IoT Devices
The latest technological progress in the industrial sector has led to a paradigm shift in manufacturing efficiency and operational cost reduction. More often than not, this cost reduction comes at the price of dismissing information security, especially ...
Cristian Lupascu +2 more
doaj +1 more source
Nowadays, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system.
Hof, Hans-Joachim
core +1 more source
IDENTIFICATION OF SMALL LAKES IN KAZAKHSTAN USING REMOTE SENSING DATA
The purpose of this study is to develop a methodology for automated determination of water surfaces and identification of small lakes in Kazakhstan using cartographic methods and an array of multi-time remote sensing (RS) data.
Akmaral Tolepbayeva +4 more
doaj +1 more source

