Results 11 to 20 of about 306,057 (287)
2D and 3D Geovisualization: Learning user Preferences in Landslide Vulnerability
Landslides often cause impacts on the environment, infrastructure, and society. The impacts of landslides can be minimized by creating disaster awareness. Landslide vulnerability mapping can be used as a dissemination media to increase disaster awareness.
Hafif Bustani Wahyudi +2 more
doaj +1 more source
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) inference acceleration. However, as the use of DNNs expands, protecting user input privacy has become increasingly important.
Ziyu Wang +6 more
doaj +1 more source
Fully Informed Vulnerable Road Users [PDF]
Vulnerable Road Users (VRUs) are all those with an increased vulnerability on the road, in particular non-motorised ones. Until now, the emphasis has been in politics more focused on drivers, vehicles and infrastructures. However, recent developments show a shift in other directions, with researchers now devoting efforts to improve VRUs' safety. Hence,
Bruno Fernandes +5 more
openaire +1 more source
Dynamic Assessment of Road Network Vulnerability Based on Cell Transmission Model
The road network maintaining stability is critical for guaranteeing urban traffic function. Therefore, the vulnerable links need to be identified accurately.
Yu Sun +3 more
doaj +1 more source
Localism and energy: Negotiating approaches to embedding resilience in energy systems [PDF]
Tensions are evident in energy policy objectives between centralised top-down interconnected energy systems and localised distributed approaches. Examination of these tensions indicates that a localised approach can address a systemic problem of ...
Adger +40 more
core +1 more source
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia +2 more
core +2 more sources
User inequity implications of road network vulnerability
An important purpose of the road transport system is to allow people to commute in efficient and reliable ways. For various undesired reasons, however, link capacities are sometimes reduced or links are closed completely. To assess and reduce the risk of
Erik Jenelius
doaj +1 more source
Comparative Security Analysis of Web-Based Instant Messaging Applications
Web-based instant messaging applications vulnerability has become one of the main concerns for its users in line with the increasing number of cybercrimes that occur on social media.
Imam Riadi +2 more
doaj +1 more source
A security architecture for personal networks [PDF]
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M. +1 more
core +2 more sources
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven +16 more
core +2 more sources

