|
|
|
Jui-Chuan Liu, Heng-Xiao Chi, Ching-Chun Chang and Chin-Chen Chang
Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting da...
ver más
|
|
|
|
|
|
|
Messaoud Benguenane, Ahmed Korichi, Bouziane Brik and Nadjet Azzaoui
In vehicle-to-everything (V2X) networks, security and safety are inherently difficult tasks due to the distinct characteristics of such networks, such as their highly dynamic topology and frequent connectivity disruptions. Jellyfish attacks are a sort of...
ver más
|
|
|
|
|
|
|
Renbo Pang, Fujiang Yu, Yu Zhang and Ye Yuan
I/O is often a performance bottleneck in global ocean circulation models with fine spatial resolution. In this paper, we present an asynchronous parallel I/O framework and demonstrate its efficacy in the Mass Conservation Ocean Model (MaCOM) as a case st...
ver más
|
|
|
|
|
|
|
Yang Wang, Jie Liu, Xiaoxiong Zhu, Qingyang Zhang, Shengguo Li and Qinglin Wang
Structured grid-based sparse matrix-vector multiplication and Gauss?Seidel iterations are very important kernel functions in scientific and engineering computations, both of which are memory intensive and bandwidth-limited. GPDSP is a general purpose dig...
ver más
|
|
|
|
|
|
|
Anargiros I. Delis, Maria Kazolea and Maria Gaitani
This work aims to supplement the realization and validation of a higher-order well-balanced unstructured finite volume (FV) scheme, that has been relatively recently presented, for numerically simulating weakly non-linear weakly dispersive water waves ov...
ver más
|
|
|
|
|
|
|
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo...
ver más
|
|
|
|
|
|
|
Oleksandr Makoveichuk
Pág. 55 - 68
The subject matter of the article is the informational technology of designing and using of augmented reality visual information structures. The goal of the study is to develop the informational technology of designing and using of augmented reality visu...
ver más
|
|
|
|
|
|
|
In this study, real-time preventive measures were formulated for a crusher process that is impossible to automate, due to the impossibility of installing sensors during the production of plastic films, and a real-time early warning system for semi-automa...
ver más
|
|
|
|
|
|
|
Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni and Hocine Cherifi
Three-dimensional models have been extensively used in several applications including computer-aided design (CAD), video games, medical imaging due to the processing capability improvement of computers, and the development of network bandwidth. Therefore...
ver más
|
|
|
|
|
|
|
Ioan Badarinza,Adrian Sterca,Florian Mircea Boian
Pág. 26 - 33
In this paper we use the user's recent web browsing history in order to provide better query suggestions in an information retrieval system. We have built a Chrome browser plugin that collects each web page visited by a user and submits it to our query s...
ver más
|
|
|
|