this article focuses on cyber security issues related to content. Recent surveys show that youth are being exposed to cyber-aggression at increasing rates, with over 43% of youth reporting in one recent survey that th...
详细信息
User’s privacy management in an environment with many restrictions such as the Internet of things is a challenge. this paper aims at showing that it is possible to handle the user’s privacy in a distributed environm...
详细信息
Understanding the profile and analysis of individuals’ consumption behavior in order to identify opinions about products and services available on websites has been an increasingly necessary research area. the Behavi...
详细信息
this paper examines efficiency of hardware realizations of DES cracking engines implemented in contemporary low-cost Spartan-7 devices from Xilinx, Inc. the engines are designed for the known plaintext attack scheme a...
详细信息
Sampling based planning is an important step for long-range navigation for an autonomous vehicle. this work proposes a GPU-accelerated sampling based path planning algorithm which can be used as a global planner in au...
详细信息
Fishermen are being caught and killed by the naval forces of the neighbouring country, due to the lack of awareness about the ocean frontiers and advanced alert instruments in the boats. For this reason, maritime secu...
详细信息
Rapid and haphazard city growth in developing countries like India leads to urban sprawl, traffic congestion, pollution, etc., which increases transportation externalities of the city. In case of a smart city, the use...
详细信息
this research discusses the pedagogy, Culturally Responsive Teaching and its significant role in the Noyce project curriculum. Culturally Responsive Teaching has been incorporated into all three of the chief tiers of ...
详细信息
Smart mobile devices coupled withthe Internet of things (IoT) and Artificial Intelligence (AI) have emerged as a key enabler of modern digital health applications. While cloud computing is now a well established para...
详细信息
the methodology used for assessing the cloud security of a given cloud infrastructure plays a crucial role in predicting the risk or security threats arises between interplay of the cloud server. the development of tr...
详细信息
暂无评论