|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
Tala Talaei Khoei and Naima Kaabouch
Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of optimal machine learning applications requires the integration of multiple processes, such as ...
ver más
|
|
|
|
|
|
Mugdha P. Kshirsagar and Kanchan C. Khare
The present study is an attempt to model the stormwater quality of a stream located in Pune, India. The city is split up into twenty-three basins (named A to W) by the Pune Municipal Corporation. The selected stream lies in the haphazardly expanded peri-...
ver más
|
|
|
|
|
|
Chen Hsi Tsai,Jelena Zdravkovic,Janis Stirna
Pág. 1 - 30
The changing business landscapes urge organizations to collaborate and combine their expertise to stay competitive. Organizations establish partnerships and collaborate via the Internet, which often happens dynamically and at fast pace resulting in forma...
ver más
|
|
|
|
|
|
Ana Quijano, Jose L. Hernández, Pierre Nouaille, Mikko Virtanen, Beatriz Sánchez-Sarachu, Francesc Pardo-Bosch and Jörg Knieilng
Sustainability is pivotal in the urban transformation strategy in order to reach more resource-efficient, resilient and smarter cities. The goal of being a sustainable city should drive the decisions for city interventions, and measuring city progress is...
ver más
|
|
|