Results 11 to 20 of about 144,734 (270)

Analisis kebijakan standardisasi keamanan perangkat telekomunikasi untuk menunjang kebijakan pertahanan dan keamanan nasional [Policy analysis on telecommunication devices security standardization to support national security and defence policy] [PDF]

open access: yesBuletin Pos dan Telekomunikasi: Media Komunikasi Ilmiah, 2015
Beberapa tahun terakhir, kejadian yang terkait dengan pembobolan informasi meningkat dengan signifikan dan menyebabkan kerugian yang tidak sedikit baik bagi pemerintah, industri maupun perorangan.
Wirianto Pradono, Yourdan Yourdan
doaj   +3 more sources

Energy‐efficient covert communication with adaptive assist nodes group

open access: yesIET Communications, 2023
In this paper, a joint detection strategy of Willie based on two phases observation is proposed and an energy‐efficient covert communication scheme with an adaptive assist nodes group (AANG) based on uniform jamming power (UJP) strategy is proposed to ...
Zehan Wan   +4 more
doaj   +1 more source

Continuous Sliding Mode Control of Robotic Manipulators Based on Time-Varying Disturbance Estimation and Compensation

open access: yesIEEE Access, 2022
To address the high-precision trajectory tracking task of uncertain robotic manipulators, a continuous sliding mode control (CSMC) scheme based on time-varying disturbance estimation and compensation is developed.
Juan Xian   +3 more
doaj   +1 more source

Modular quantum circuits for secure communication

open access: yesIET Quantum Communication, 2023
Quasi‐chaotic generators are used for producing a pseudorandom behaviour that can be used for encryption/decryption and secure communications, introducing an implementation of them based on quantum technology.
Andrea Ceschini   +2 more
doaj   +1 more source

A Novel Influence Maximization Algorithm for a Competitive Environment Based on Social Media Data Analytics

open access: yesBig Data Mining and Analytics, 2022
Online social networks are increasingly connecting people around the world. Influence maximization is a key area of research in online social networks, which identifies influential users during information dissemination.
Jie Tong   +4 more
doaj   +1 more source

QPSK-Modulation Modem Invariant to the Rotation of the Signal Constellation Plane

open access: yesElectrical, Control and Communication Engineering, 2018
In order to increase the efficiency of dedicated frequency channels, i.e. to increase the specific data transfer rate, multipositional quadrature phase shift keying (QPSK, aka 4-PSK) should be used.
Sadchenko Andrey, Kushnirenko Oleg
doaj   +1 more source

TSE-Tran: Prediction method of telecommunication-network fraud crime based on time series representation and transformer

open access: yesJournal of Safety Science and Resilience, 2023
Telecom network fraud has become the most common and concerning type of crime and is an important public security incident that threatens urban resilience.
Tuo Shi, Jie Fu, Xiaofeng Hu
doaj   +1 more source

Security Trust Zone in 5G Networks

open access: yes, 2017
Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds.
Dohler, Mischa   +4 more
core   +1 more source

Protecting Infinite Data Streams from Wearable Devices with Local Differential Privacy Techniques

open access: yesInformation
The real-time data collected by wearable devices enables personalized health management and supports public health monitoring. However, sharing these data with third-party organizations introduces significant privacy risks.
Feng Zhao, Song Fan
doaj   +1 more source

A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving

open access: yesCybersecurity, 2021
With the large-scale application of 5G in industrial production, the Internet of Things has become an important technology for various industries to achieve efficiency improvement and digital transformation with the help of the mobile edge computing.
Runchen Gao, Shen Li, Yuqi Gao, Rui Guo
doaj   +1 more source

Home - About - Disclaimer - Privacy