21   Artículos

 
en línea
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang    
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Messaoud Benguenane, Ahmed Korichi, Bouziane Brik and Nadjet Azzaoui    
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Renbo Pang, Fujiang Yu, Yu Zhang and Ye Yuan    
I/O is often a performance bottleneck in global ocean circulation models with fine spatial resolution. In this paper, we present an asynchronous parallel I/O framework and demonstrate its efficacy in the Mass Conservation Ocean Model (MaCOM) as a case st... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yang Wang, Jie Liu, Xiaoxiong Zhu, Qingyang Zhang, Shengguo Li and Qinglin Wang    
Structured grid-based sparse matrix-vector multiplication and Gauss?Seidel iterations are very important kernel functions in scientific and engineering computations, both of which are memory intensive and bandwidth-limited. GPDSP is a general purpose dig... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Anargiros I. Delis, Maria Kazolea and Maria Gaitani    
This work aims to supplement the realization and validation of a higher-order well-balanced unstructured finite volume (FV) scheme, that has been relatively recently presented, for numerically simulating weakly non-linear weakly dispersive water waves ov... ver más
Revista: Water    Formato: Electrónico

 
en línea
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang    
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Oleksandr Makoveichuk     Pág. 55 - 68
The subject matter of the article is the informational technology of designing and using of augmented reality visual information structures. The goal of the study is to develop the informational technology of designing and using of augmented reality visu... ver más

 
en línea
In this study, real-time preventive measures were formulated for a crusher process that is impossible to automate, due to the impossibility of installing sensors during the production of plastic films, and a real-time early warning system for semi-automa... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni and Hocine Cherifi    
Three-dimensional models have been extensively used in several applications including computer-aided design (CAD), video games, medical imaging due to the processing capability improvement of computers, and the development of network bandwidth. Therefore... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ioan Badarinza,Adrian Sterca,Florian Mircea Boian     Pág. 26 - 33
In this paper we use the user's recent web browsing history in order to provide better query suggestions in an information retrieval system. We have built a Chrome browser plugin that collects each web page visited by a user and submits it to our query s... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »