40   Artículos

« Anterior     Página: 1 de 3     Siguiente »

 
en línea
Aris Budiyarto,Abdur Rohman Harits Martawireja,Mohammad Harry Khomas Saputra,Gun Gun Maulana     Pág. 22 - 33
In Indonesia, the theft rate is still quite high. According to Bappeda data, cases of theft still tend to be high. In 2019, there were 362,000 cases of theft. CCTV use is still ineffective because at the time of the theft of goods, we only know the goods... ver más

 
en línea
Juan Manuel Sánchez, Omar Sogamoso Heredia, Edwin Villarreal López     Pág. 96 - 102
ResumenDescargasCómo citar
Revista: Redes de IngenierÍ­a    Formato: Electrónico

 
en línea
Rabia Khan, Amjad Mehmood, Zeeshan Iqbal, Carsten Maple and Gregory Epiphaniou    
Security has been the most widely researched topic, particularly within IoT, and has been considered as the major hurdle in the adoption of different applications of IoT. When it comes to IoV, security is considered as the most inevitable component to en... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Abdullah M. Almuhaideb and Sammar S. Algothami    
In the near future, using electric vehicles will almost certainly be required for the sustainability of nature and our planet. The most significant challenge that users are concerned about is the availability of electric vehicle charging stations. Theref... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Juhani Latvakoski, Vesa Kyllönen and Jussi Ronkainen    
The novel contribution of this research is decentralised IOTA-based concepts of digital trust for securing remote driving in an urban environment. The conceptual solutions are studied and described, and respective experimental solutions are developed rel... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Nikita Sushkin and Olga Peskova    
Here, we developed a method for detecting cyber security attacks aimed at spoofing the Global Positioning System (GPS) signal of an Unmanned Aerial Vehicle (UAV). Most methods for detecting UAV anomalies indicative of an attack use machine learning or ot... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Muhammad Firdaus and Kyung-Hyune Rhee    
The conventional architecture of vehicular ad hoc networks (VANETs) with a centralized approach has difficulty overcoming the increasing complexity of intelligent transportation system (ITS) applications as well as challenges in providing large amounts o... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Massimo Condoluci, Laurent Gallo, Laurent Mussot, Apostolos Kousaridas, Panagiotis Spapis, Maliheh Mahlouji and Toktam Mahmoodi    
One of the goals of the 5G Communication Automotive Research and innovation (5GCAR) project has been to evaluate and propose system architecture enhancements aiming at supporting the strict requirements of vehicle-to-everything (V2X) use cases. In this p... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kyungsung An, Kyung-Bin Song and Kyeon Hur    
This research aims to improve the operational efficiency and security of electric power systems at high renewable penetration by exploiting the envisioned controllability or flexibility of electric vehicles (EVs); EVs interact with the grid through grid-... ver más
Revista: Energies    Formato: Electrónico

 
en línea
Won Min Kang, Jae Dong Lee, Young-Sik Jeong and Jong Hyuk Park    
Recently, as vehicle computing technology has advanced, the paradigm of the vehicle has changed from a simple means of transportation to a smart vehicle for safety and convenience. In addition, the previous functions of the Intelligent Transportation Sys... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Liyuan Zhang, Xiaoying Song, Yaxiao Niu, Huihui Zhang, Aichen Wang, Yaohui Zhu, Xingye Zhu, Liping Chen and Qingzhen Zhu    
As prior information for precise nitrogen fertilization management, plant nitrogen content (PNC), which is obtained timely and accurately through a low-cost method, is of great significance for national grain security and sustainable social development. ... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Mohammed Imran Basheer Ahmed, Rim Zaghdoud, Mohammed Salih Ahmed, Razan Sendi, Sarah Alsharif, Jomana Alabdulkarim, Bashayr Adnan Albin Saad, Reema Alsabt, Atta Rahman and Gomathi Krishnasamy    
To constructively ameliorate and enhance traffic safety measures in Saudi Arabia, a prolific number of AI (Artificial Intelligence) traffic surveillance technologies have emerged, including Saher, throughout the past years. However, rapidly detecting a v... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Qiang Li    
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jadil Alsamiri and Khalid Alsubhi    
In recent years, the Internet of Vehicles (IoV) has garnered significant attention from researchers and automotive industry professionals due to its expanding range of applications and services aimed at enhancing road safety and driver/passenger comfort.... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohamed ElKashlan, Heba Aslan, Mahmoud Said Elsayed, Anca D. Jurcut and Marianne A. Azer    
The market for Electric Vehicles (EVs) has expanded tremendously as seen in the recent Conference of the Parties 27 (COP27) held at Sharm El Sheikh, Egypt in November 2022. This needs the creation of an ecosystem that is user-friendly and secure. Interne... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xiaomei Kou, Dianchao Han, Yongxiang Cao, Haixing Shang, Houfeng Li, Xin Zhang and Min Yang    
Mining of mineral resources exposes various minerals to oxidizing environments, especially sulfide minerals, which are decomposed by water after oxidation and make the water in the mine area acidic. Acid mine drainage (AMD) from mining can pollute surrou... ver más
Revista: Water    Formato: Electrónico

 
en línea
Kashif Naseer Qureshi, Luqman Shahzad, Abdelzahir Abdelmaboud, Taiseer Abdalla Elfadil Eisa, Bandar Alamri, Ibrahim Tariq Javed, Arafat Al-Dhaqm and Noel Crespi    
The rapid advancement in the area of the Internet of Vehicles (IoV) has provided numerous comforts to users due to its capability to support vehicles with wireless data communication. The exchange of information among vehicle nodes is critical due to the... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Evgeny Abramov and Anatoly Basyuk    
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cybe... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Loay F. Hussein,Anis Ben Aissa,Islam Abdalla Mohamed,Saed Alruwaili,Abdalazi Alanzi     Pág. pp. 85 - 100
The number of vehicles stolen is increasing annually. The alarm system for vehicles is commonly used to expose the burglars publicly to make a scene. If the vehicle owner is far away, it will be hard to distinguish the threat to the vehicle from the intr... ver más

 
en línea
Yacine Merrad,Mohamed Hadi Habaebi,Md Rafiqul Islam,Teddy Surya Gunawan     Pág. pp. 32 - 46
Object detection and tracking is one of the most relevant computer technologies related to computer vision and image processing. It may mean the detection of an object within a frame and classify it (human, animal, vehicle, building, etc) by the use of s... ver más

« Anterior     Página: 1 de 3     Siguiente »