22   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon    
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Au?rius Juozapavicius, Agne Brilingaite, Linas Bukauskas and Ricardo Gregorio Lugo    
Password hygiene plays an essential part in securing systems protected with single-factor authentication. A significant fraction of security incidents happen due to weak or reused passwords. The reasons behind differences in security vulnerable behaviour... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
João Alves Coelho, André Glória and Pedro Sebastião    
Water is a crucial natural resource, and it is widely mishandled, with an estimated one third of world water utilities having loss of water of around 40% due to leakage. This paper presents a proposal for a system based on a wireless sensor network desig... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Xu Jiang, Dejun Mu and Huixiang Zhang    
Increasingly, malicious Android apps use various methods to steal private user data without their knowledge. Detecting the leakage of private data is the focus of mobile information security. An initial investigation found that none of the existing secur... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ðorde Krivokapic, Danilo Krivokapic, Ivan Todorovic, Stefan Komazec     Pág. 1 - 10
Personal data protection is becoming a major research topic in the last decades. With the technological advances, this issue was given a completely new perspective, due to increased possibilities for both use and misuse. Personal data have become a very ... ver más
Revista: Management    Formato: Electrónico

 
en línea
Uma Rajasekaran, Mohanaprasad Kothandaraman and Chang Hong Pua    
Significant water loss caused by pipeline leaks emphasizes the importance of effective pipeline leak detection and localization techniques to minimize water wastage. All of the state-of-the-art approaches use deep learning (DL) for leak detection and cro... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Thejaswini P, Vivekananda G, Anu H, Priya R, Krishna Prasad B S, Nischay M     Pág. 370 - 388
Today's Multiprocessor System-on-Chip (MPSoC) contains many cores and integrated circuits. Due to the current requirements of communication, we make use of Network-on-Chip (NoC) to obtain high throughput and low latency. NoC is a communication architectu... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Dominik Wunderlich, Daniel Bernau, Francesco Aldà, Javier Parra-Arnau and Thorsten Strufe    
Hierarchical text classification consists of classifying text documents into a hierarchy of classes and sub-classes. Although Artificial Neural Networks have proved useful to perform this task, unfortunately, they can leak training data information to ad... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Guangming Wang, Yue Song, Jiabo Wang, Wanqiang Chen, Yunlian Cao and Jinxing Wang    
The failure of a hydraulic system will affect the shifting quality and driving safety of a CVT tractor. In order to reveal the response of the tractor under different hydraulic system failures without destroying the transmission, the following methods ar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Muhammad Sohaib, Manjurul Islam, Jaeyoung Kim, Duck-Chan Jeon and Jong-Myon Kim    
Spherical storage tanks are used in various industries to store substances like gasoline, oxygen, waste water, and liquefied petroleum gas (LPG). Cracks in the storage tanks are unaccepted defects, as storage tanks can leak or spill the contained substan... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
S. V. Hayrapetyan,K.S. Zaytsev     Pág. 30 - 38
The purpose of this paper is to describe the developed method of detecting network covert timing channels, based on machine learning algorithms. Detection of network covert channels is an actual problem, since the latter can be used to leak confidential ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
S. V. Hayrapetyan,K.S. Zaytsev     Pág. 30 - 38
The purpose of this paper is to describe the developed method of detecting network covert timing channels, based on machine learning algorithms. Detection of network covert channels is an actual problem, since the latter can be used to leak confidential ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Daniel Barros, Isabela Almeida, Ariele Zanfei, Gustavo Meirelles, Edevar Luvizotto, Jr. and Bruno Brentan    
Leakages in distribution networks reach more than 30% of the water supplied, entailing important risks for the water infrastructure with water contamination issues. Therefore, it is necessary to develop new methods to mitigate the amount of water wastes.... ver más
Revista: Water    Formato: Electrónico

 
en línea
Oscar Scussel, Michael J. Brennan, Fabrício Cézar L. de Almeida, Mauricio K. Iwanaga, Jennifer M. Muggleton, Phillip F. Joseph and Yan Gao    
The frequency range of the leak noise in buried water pipes, measured using acoustic correlators, depends significantly on the type of pipe and its location as well as the type of sensors used. Having a rough idea of this frequency range can be beneficia... ver más
Revista: Acoustics    Formato: Electrónico

 
en línea
Te-Kwei Wang, Yu-Hsun Lin, Jian-Yuan Shen     Pág. 169 - 180
This research proposes an artificial intelligence (AI) detection model using convolutional neural networks (CNN) to automatically detect gas leaks in a long-distance pipeline. The change of gap pressure is collected when leakage occurs in the pipeline, a... ver más
Revista: Advances in Technology Innovation    Formato: Electrónico

 
en línea
Guoqing Jin, Zhe Sun, Zhi Zong, Li Zou and Yingjie Hu    
A novel technique based on conformal mapping and the circle theorem has been developed to tackle the boundary penetration issue, in which vortex blobs leak into structures in two-dimensional discrete vortex simulations, as an alternative to the tradition... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Likittanawong Supawat and Leemakdej Arnat    
Studies that quantify the price impact of the information in corporate press releases and news articles mainly focus on quantitative news, such as earnings announcements, dividends, and financial performance-related events, but leave out other corporate ... ver más
Revista: International Journal of Financial Studies    Formato: Electrónico

 
en línea
José García, Andres Leiva-Araos, Emerson Diaz-Saavedra, Paola Moraga, Hernan Pinto and Víctor Yepes    
Water infrastructure integrity, quality, and distribution are fundamental for public health, environmental sustainability, economic development, and climate change resilience. Ensuring the robustness and quality of water infrastructure is pivotal for sec... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Islam T. Almalkawi,Jafar Raed,Ayoub Alsarhan,Alaa Abdallah,Emad Abdallah     Pág. pp. 43 - 69
Even though many security schemes proposed for wireless sensor networks protect transmitted data content from being revealed to different types of attacks and fulfill most of the desired security requirements, they are not addressing concealing the priva... ver más

 
en línea
Andrei Tevyashev,Olga Matviyenko,Glib Nikitenko     Pág. 29 - 38
We have constructed a stochastic model of a water supply network with leaks, which, compared to the previously proposed models (excluding leaks), more adequately describes the processes of transportation and water distribution in water supply systems. Ma... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »