89   Artículos

 
en línea
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin    
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,... ver más
Revista: Applied System Innovation    Formato: Electrónico

 
en línea
Antoine Falconnet, Constantinos K. Coursaris, Joerg Beringer, Wietske Van Osch, Sylvain Sénécal and Pierre-Majorique Léger    
Advice-giving systems such as decision support systems and recommender systems (RS) utilize algorithms to provide users with decision support by generating ?advice? ranging from tailored alerts for situational exception events to product recommendations ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Brent Pethers and Abubakar Bello    
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang    
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jianping Song, Hong Ni and Xiaoyong Zhu    
Many applications suitable for multicast transmission, such as video conferencing and live e-commerce, demand high Quality of Service (QoS) and require data delivery to be completed within specified delay constraints. Some methods have been proposed for ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hongyu Liu, Hong Ni and Rui Han    
The control of transmission rates is currently a major topic in network research, as it plays a significant role in determining network performance. Traditional network design principles suggest that network nodes should only be responsible for forwardin... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Isha Kharub, Michael Lwin, Aila Khan, Omar Mubin and Suleman Shahid    
This exploratory study examines the effectiveness of social robots? ability to deliver advertising messages using different ?appeals? in a business environment. Specifically, it explores the use of three types of message appeals in a human-robot interact... ver más
Revista: Informatics    Formato: Electrónico

 
en línea
Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori and Kalamullah Ramli    
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for re... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Chenfang Zhang, Yong Gan and Ruisen Yang    
The main steps in a graph neural network are message propagation and aggregation between nodes. Message propagation allows messages from distant nodes in the graph to be transmitted to the central node, while feature aggregation allows the central node t... ver más
Revista: Information    Formato: Electrónico

 
en línea
Nan Zhao, Nianmin Yao, Zhenguo Gao and Zhimao Lu    
Message conflicts caused by large propagation delays severely affect the performance of Underwater Acoustic Networks (UWANs). It is necessary to design an efficient transmission scheduling algorithm to improve the network performance. Therefore, we propo... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 5     Siguiente »