Πλοήγηση ανά Θέμα "Security systems"
Αποτελέσματα 1-12 από 12
-
ASPIDA: A client-oriented platform for assessing websites security practices adoption and reward
(2021)The adoption of good security practices for the e-commerce business is a challenging problem. The enforcement of a strict legal framework is not always effective. On the other hand, simple recommendations and raising ... -
An automated blastomere identification method for the evaluation of day 2 embryos during IVF/ICSI treatments
(2018)Purpose Evaluation of human embryos is one of the most important challenges in vitro fertilization (IVF) programs. The morphology and the morphokinetic parameters of the early cleaving embryo are of critical clinical ... -
Camera-driven probabilistic algorithm for multi-elevator systems
(2020)A fast and reliable vertical transportation system is an important component of modern office buildings. Optimization of elevator control strategies can be easily done using the state-of-the-art artificial intelligence ... -
Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks
(2020)In this paper, we are concerned with the problem of estimating the speed of an RF jammer that moves towards a group/platoon of moving wireless communicating nodes. In our system model, the group of nodes receives an ... -
DReDBox: Materializing a full-stack rack-scale system prototype of a next-generation disaggregated datacenter
(2018)Current datacenters are based on server machines, whose mainboard and hardware components form the baseline, monolithic building block that the rest of the system software, middleware and application stack are built upon. ... -
Full action instances for motion analysis
(2009)Motion analysis is an important component of surveillance,video annotation and many other applications. Current work focuses on the tracking of moving entities, the representation of their actions and the classification ... -
A quantitative and qualitative analysis of blocking in association rule hiding
(2004)Data mining provides the opportunity to extract useful information from large databases. Various techniques have been proposed in this context in order to extract this information in the most efficient way. However, ... -
Queue and channel state awareness for maximum throughput access control in CSMA/CA-based wireless LANs
(2009)This paper introduces two important enhancements to the IEEE 802.11 medium access control (MAC) protocols which are not considered in the current IEEE 802.11 MAC protocol: the channel state between the transmitter and the ... -
A secure VoIP conference system: Architecture analysis and design issues
(2007)In this paper we present the architectural design of a secure VoIP conference system for mobile devices, which is using the strong security mechanisms of the Z Real Time Transport Protocol (ZRTP). We also provide implementation ... -
Sub-Sampled Time Domain Sparse Information in Wired OFDM and STBC-OFDM Systems
(2022)A sub-sampling method developed for wired or wireless Orthogonal Frequency Division Multiplexing (OFDM) systems is presented. The proposed technique can be activated during the exchange of sparse data. The sub-sampling ... -
Video-surveillance and context aware system for activity recognition
(2010)Fall detection is the main issue in design an AAL system for elderly. This paper describes an algorithm for vision and audio fall detection. The main problem with video surveillance is the distinction of a fall from similar ... -
Voice interactive personalized security protocol: Definition and security analysis
(2007)Security is a major issue in VoIP communications over the Internet, especially in mobile environments. Voice Interactive Personalized Security (VIPSec) constitutes a method for leveraging the security for Internet ...