Real-world practical systems inherently exhibit non-linearities in their dynamics. Also, it is known that a time-varying delay exists in the system state or input-output. Combined, it affects the stability of the clos...
详细信息
This paper presents the development air quality monitoring system for indoor workplace that send measurement CO, CO2, PM2.5, temperature and humidity and send it via IEEE 802.11 b/g wireless communication. The problem...
详细信息
In smart retail, the problem in grocery product image classification is fine-grained image representation. Product variants are characterized by differences in color, text, and size. However, while the process of imag...
详细信息
Automation testing is essential to carry out functional testing quickly and precisely. Software testing is beneficial for testers doing many testing processes according to the existing scenarios. So, there is an urgen...
详细信息
Currently, the companies are required to have conducting business activities and continue constantly in touch with its customers to provide IT service availability continuously. The systems must be available at all ti...
详细信息
Refasctoring is a technique used in software development to improve the quality of code without changing its functionality. One metric that is often used to measure code quality is Code Coverage. This study aims to ex...
详细信息
Evaluation of cryptocurrency's performance is performed questionably. There is no role for computer-model, make such an evaluation process does not have guidance. In this study, a simple decision support model (DS...
详细信息
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological *** a result,tens of billions or possibly hundreds of...
详细信息
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological *** a result,tens of billions or possibly hundreds of billions of devices will be linked *** smart devices will be able to gather data,process it,and even come to decisions on their *** is the most essential thing in these *** IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange *** majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation *** focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned *** proposed three-party AKEP is protected from several *** proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing *** protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client ***,the presented procedure offers better security features than the procedures currently available in the literature.
Every enterprise stores and operates its transactions confidentially, therefore it has to encrypt the transaction to protect it from data intruders. Technically, most encryption processes are ranging from hundreds of ...
详细信息
Automatic Speech Recognition (ASR) is useful for converting speech into text. ASR is needed to display automatic subtitles on movies or when conducting video conferencing. The use of deep learning in ASR applications ...
详细信息
暂无评论