Results 1 to 10 of about 202,881 (332)

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges [PDF]

open access: goldIEEE Access, 2020
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).
Pooja Anand   +5 more
doaj   +2 more sources

UNCERTAINTY MANAGEMENT IN SEISMIC VULNERABILITY ASSESSMENT USING GRANULAR COMPUTING BASED ON COVERING OF UNIVERSE [PDF]

open access: diamondThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2013
Earthquake is an abrupt displacement of the earth's crust caused by the discharge of strain collected along faults or by volcanic eruptions. Earthquake as a recurring natural cataclysm has always been a matter of concern in Tehran, capital of Iran, as a ...
F. Khamespanah, M. R. Delavar, M. Zare
doaj   +3 more sources

Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis

open access: greenFuture Internet, 2022
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”.
Fazal Raheman   +3 more
doaj   +2 more sources

Adversarial attacks and defenses in physiological computing: a systematic review

open access: yesNational Science Open, 2022
Physiological computing uses human physiological data as system inputs in real time. It includes, or significantly overlaps with, brain-computer interfaces, affective computing, adaptive automation, health informatics, and physiological signal based ...
Wu Dongrui   +7 more
doaj   +1 more source

INTEGRATED ESTIMATION OF SEISMIC PHYSICAL VULNERABILITY OF TEHRAN USING RULE BASED GRANULAR COMPUTING [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2015
Tehran, the capital of Iran, is surrounded by the North Tehran fault, the Mosha fault and the Rey fault. This exposes the city to possibly huge earthquakes followed by dramatic human loss and physical damage, in particular as it contains a large number ...
H. Sheikhian, M. R. Delavar, A. Stein
doaj   +1 more source

PHYSICAL SEISMIC VULNERABILITY ASSESSMENT OF TEHRAN USING THE INTEGRATION OF GRANULAR COMPUTING AND INTERVAL DEMPSTER- SHAFER [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2017
Several faults exist in the vicinity of Tehran, the capital of Iran such as North Tehran, Ray, Mosha and Kahrizak. One way to assist reducing the damage caused by the earthquake is the production of a seismic vulnerability map.
M. R. Delavar   +3 more
doaj   +1 more source

iHVI: AN OPEN-SOURCE TOOLKIT FOR CONSTRUCTING INTEGRATED HEAT VULNERABILITY INDEX IN AUSTRALIA [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2022
To tackle the increasing issue of heat risk in Australia and pressure of population growth, this project aimed to establish a first nationwide dynamic and interactive heat vulnerability assessment toolkit.
Q. (C. ). Sun   +7 more
doaj   +1 more source

Vulnerabilities of Live-Streaming Services in Korea

open access: yesSensors, 2022
Recently, the number of users and the demand for live-streaming services have increased. This has exponentially increased the traffic to such services, and live-streaming service platforms in Korea use a grid computing system that distributes traffic to ...
Sun-Hong Hwang   +6 more
doaj   +1 more source

A new method of software vulnerability detection based on a quantum neural network

open access: yesScientific Reports, 2022
In the field of network security, although there has been related work on software vulnerability detection based on classic machine learning, detection ability is directly proportional to the scale of training data.
Xin Zhou   +9 more
doaj   +1 more source

Comparative Analysis of 5G Mobile Communication Network Architectures

open access: yesApplied Sciences, 2020
Mobile communication technology is evolving from 4G to 5G. Compared to previous generations, 5G has the capability to implement latency-critical services, such as autonomous driving, real-time AI on handheld devices and remote drone control. Multi-access
Woosik Lee   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy