Results 1 to 10 of about 23,723 (266)

Adversarial attacks and defenses in physiological computing: a systematic review

open access: yesNational Science Open, 2022
Physiological computing uses human physiological data as system inputs in real time. It includes, or significantly overlaps with, brain-computer interfaces, affective computing, adaptive automation, health informatics, and physiological signal based ...
Wu Dongrui   +7 more
doaj   +1 more source

INTEGRATED ESTIMATION OF SEISMIC PHYSICAL VULNERABILITY OF TEHRAN USING RULE BASED GRANULAR COMPUTING [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2015
Tehran, the capital of Iran, is surrounded by the North Tehran fault, the Mosha fault and the Rey fault. This exposes the city to possibly huge earthquakes followed by dramatic human loss and physical damage, in particular as it contains a large number ...
H. Sheikhian, M. R. Delavar, A. Stein
doaj   +1 more source

UNCERTAINTY MANAGEMENT IN SEISMIC VULNERABILITY ASSESSMENT USING GRANULAR COMPUTING BASED ON COVERING OF UNIVERSE [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2013
Earthquake is an abrupt displacement of the earth's crust caused by the discharge of strain collected along faults or by volcanic eruptions. Earthquake as a recurring natural cataclysm has always been a matter of concern in Tehran, capital of Iran, as a ...
F. Khamespanah, M. R. Delavar, M. Zare
doaj   +1 more source

PHYSICAL SEISMIC VULNERABILITY ASSESSMENT OF TEHRAN USING THE INTEGRATION OF GRANULAR COMPUTING AND INTERVAL DEMPSTER- SHAFER [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2017
Several faults exist in the vicinity of Tehran, the capital of Iran such as North Tehran, Ray, Mosha and Kahrizak. One way to assist reducing the damage caused by the earthquake is the production of a seismic vulnerability map.
M. R. Delavar   +3 more
doaj   +1 more source

Vulnerabilities of Live-Streaming Services in Korea

open access: yesSensors, 2022
Recently, the number of users and the demand for live-streaming services have increased. This has exponentially increased the traffic to such services, and live-streaming service platforms in Korea use a grid computing system that distributes traffic to ...
Sun-Hong Hwang   +6 more
doaj   +1 more source

iHVI: AN OPEN-SOURCE TOOLKIT FOR CONSTRUCTING INTEGRATED HEAT VULNERABILITY INDEX IN AUSTRALIA [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2022
To tackle the increasing issue of heat risk in Australia and pressure of population growth, this project aimed to establish a first nationwide dynamic and interactive heat vulnerability assessment toolkit.
Q. (C. ). Sun   +7 more
doaj   +1 more source

A new method of software vulnerability detection based on a quantum neural network

open access: yesScientific Reports, 2022
In the field of network security, although there has been related work on software vulnerability detection based on classic machine learning, detection ability is directly proportional to the scale of training data.
Xin Zhou   +9 more
doaj   +1 more source

Comparative Analysis of 5G Mobile Communication Network Architectures

open access: yesApplied Sciences, 2020
Mobile communication technology is evolving from 4G to 5G. Compared to previous generations, 5G has the capability to implement latency-critical services, such as autonomous driving, real-time AI on handheld devices and remote drone control. Multi-access
Woosik Lee   +3 more
doaj   +1 more source

Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method [PDF]

open access: yesJournal of Universal Computer Science, 2019
With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-source and heterogeneous, which makes data fusion become more complex.
Xiaoling Tao   +4 more
doaj   +3 more sources

A survey of fault tolerance in cloud computing

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
Cloud computing has brought about a transformation in the delivery model of information technology from a product to a service. It has enabled the availability of various software, platforms and infrastructural resources as scalable services on demand ...
Priti Kumari, Parmeet Kaur
doaj   +1 more source

Home - About - Disclaimer - Privacy