Results 11 to 20 of about 306,057 (287)

2D and 3D Geovisualization: Learning user Preferences in Landslide Vulnerability

open access: yesJITeCS (Journal of Information Technology and Computer Science), 2020
Landslides often cause impacts on the environment, infrastructure, and society. The impacts of landslides can be minimized by creating disaster awareness. Landslide vulnerability mapping can be used as a dissemination media to increase disaster awareness.
Hafif Bustani Wahyudi   +2 more
doaj   +1 more source

PowerGAN: A Machine Learning Approach for Power Side‐Channel Attack on Compute‐in‐Memory Accelerators

open access: yesAdvanced Intelligent Systems, 2023
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) inference acceleration. However, as the use of DNNs expands, protecting user input privacy has become increasingly important.
Ziyu Wang   +6 more
doaj   +1 more source

Fully Informed Vulnerable Road Users [PDF]

open access: yesProceedings of the 21st International Conference on Information Integration and Web-based Applications & Services, 2019
Vulnerable Road Users (VRUs) are all those with an increased vulnerability on the road, in particular non-motorised ones. Until now, the emphasis has been in politics more focused on drivers, vehicles and infrastructures. However, recent developments show a shift in other directions, with researchers now devoting efforts to improve VRUs' safety. Hence,
Bruno Fernandes   +5 more
openaire   +1 more source

Dynamic Assessment of Road Network Vulnerability Based on Cell Transmission Model

open access: yesJournal of Advanced Transportation, 2021
The road network maintaining stability is critical for guaranteeing urban traffic function. Therefore, the vulnerable links need to be identified accurately.
Yu Sun   +3 more
doaj   +1 more source

Localism and energy: Negotiating approaches to embedding resilience in energy systems [PDF]

open access: yes, 2010
Tensions are evident in energy policy objectives between centralised top-down interconnected energy systems and localised distributed approaches. Examination of these tensions indicates that a localised approach can address a systemic problem of ...
Adger   +40 more
core   +1 more source

S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]

open access: yes, 2017
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia   +2 more
core   +2 more sources

User inequity implications of road network vulnerability

open access: yesJournal of Transport and Land Use, 2010
An important purpose of the road transport system is to allow people to commute in efficient and reliable ways. For various undesired reasons, however, link capacities are sometimes reduced or links are closed completely. To assess and reduce the risk of
Erik Jenelius
doaj   +1 more source

Comparative Security Analysis of Web-Based Instant Messaging Applications

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2020
Web-based instant messaging applications vulnerability has become one of the main concerns for its users in line with the increasing number of cybercrimes that occur on social media.
Imam Riadi   +2 more
doaj   +1 more source

A security architecture for personal networks [PDF]

open access: yes, 2006
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M.   +1 more
core   +2 more sources

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]

open access: yes, 2019
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven   +16 more
core   +2 more sources

Home - About - Disclaimer - Privacy