Results 21 to 30 of about 158,430 (308)
The Application of Kalman Filter Algorithm in Rail Transit Signal Safety Detection
With the speedy prosperity and popularization of wireless communication, the informatization and automation level of rail transit systems is also improved.
Zhinong Miao, Qilong Liao
doaj +1 more source
Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [PDF]
With the wide application of LBS,location privacy protection is imperative.In recent years,location k-anonymity solution has become a research hotpot which is widely used.However,k-anonymity schemes are vulnerable to background knowledge attacks.Although
LI Yongjun, ZHU Yuefei, BAI Lifang
doaj +1 more source
Multi-factor Dummy Location Selection Algorithm in Location-based Service [PDF]
In view of the existing dummy location selection methods in LBS snapshot location privacy protection,the background knowledge attack caused by the time factor of the location itself is ignored,and the sensitive locations are treated equally.Based on this,
LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
doaj +1 more source
KECO: toward efficient task offloading in mobile edge computing with federated knowledge distillation [PDF]
With the diversification and personalization of mobile user demands, as well as the rapid development of distributed computing technology, leveraging mobile edge computing task offloading to provide users with convenient services has become a research ...
Zhuang Liu, Dong Li, Panfei Yang
doaj +2 more sources
This paper utilizes the ELECTRA Modbus dataset to present a secure and resilient anomaly detection framework for Industrial Control Systems (ICS). The proposed system integrates multiple machine learning models—including Random Forest, Neural ...
Archana Pallakonda +4 more
doaj +1 more source
Psychosocial Outcomes in Patients With Endocrine Tumor Syndromes: A Systematic Review
ABSTRACT Introduction The combination of disease manifestations, the familial burden, and varying penetrance of endocrine tumor syndromes (ETSs) is unique. This review aimed to portray and summarize available data on psychosocial outcomes in patients with ETSs and explore gaps and opportunities for future research and care.
Daniël Zwerus +6 more
wiley +1 more source
Security Testing With Python Scripts
Cyber security is one of the main issues that is discussed today everywhere in the world. The development of technology has grown rapidly and it is important that this development should be done simultaneously with the increase in security. When we talk
Frida ZISKO, Alma HYRA
doaj +2 more sources
Organizations constantly exposed to cyber threats are compelled to comply with cyber security standards and policies for protecting their digital assets.
Mohamed Chahine Ghanem +3 more
doaj +1 more source
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
Security assessment of the selected mobile platform
Smartphones were gradually gaining popularity, so as to effectively replace traditional telephones. Devices creates many capabilities, but they can be a source of threats. In this article analyzed Android system security. Author checked what threats lurk
Aleksandra Iwaniuk
doaj +1 more source

