We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 5,956 results
  1. Development of Crosspoint Memory Arrays for Neuromorphic Computing

    Memristor-based hardware accelerators play a crucial role in achieving energy-efficient big data processing and artificial intelligence, overcoming...
    Saverio Ricci, Piergiulio Mannocci, ... Daniele Ielmini in Special Topics in Information Technology
    Chapter Open access 2024
  2. Innovative Cross-Layer Optimization Techniques for the Design of Optical Networks

    Optical networks have become indispensable in the era of 5G-and-beyond communications, supporting applications that require unprecedented capacity,...
    Mëmëdhe Ibrahimi in Special Topics in Information Technology
    Chapter Open access 2024
  3. Synthesis of Filters and Filtering Antennas for Micro and Millimeter Waves Applications

    Filters and antennas are the closest building blocks to the air interface in modern wireless communications systems. Filters allow the transmission...
    Steven Caicedo Mejillones, Matteo Oldoni, Michele D’Amico in Special Topics in Information Technology
    Chapter Open access 2024
  4. FPGA-Based Design and Implementation of a Code-Based Post-quantum KEM

    Post-quantum cryptography aims to design cryptosystems that can be deployed on traditional computers and resist attacks from quantum computers, which...
    Chapter Open access 2024
  5. Electronic Bio-Reconfigurable Impedance Platform for High Sensitivity Detection of Target Analytes

    The present research presents a portable bioelectronic platform for multiplex detection to read biosensor chips with several sensing sites for...
    Chapter Open access 2024
  6. Combining Cyber Security and Data Science: ACutting-Edge Approach for Public Health Education Masters

    The need to include data science and cyber security into Master of Public Health (MPH) degree programs is summarized in this abstract. This method...
    Conference paper 2024
  7. Security Analysis of Drone Communication Methods

    The use of drones in various applications has increased significantly in recent years, including agriculture, transportation, and military...
    Conference paper 2024
  8. Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication

    Fog nodes are established to be intermediate between the IoT devices node and the cloud data center to alleviate the latency of data transmission....
    Mohamad Al-Samhouri, Maher Abur-rous, Nuria Novas in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  9. Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication

    The growing reliance on real-time communication in Internet of Things (IoT) devices raises concerns about security vulnerabilities. Our research...
    Conference paper 2024
  10. Case Study of an Interdisciplinary Academic Project for Reading Fluency Analysis

    During the first semester of 2023, at the Aeronautics Institute of Technology (ITA, Brazil), an Interdisciplinary Problem-Based Learning (IPBL) Case...
    Matheus Silva Martins Mota, Luis Felipe Silva Rezende Soares, ... Johnny Cardoso Marques in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  11. Cyber Attack Intensity Prediction Using Feature Selection and Machine Learning Models

    Cybercrimes are becoming increasingly more sophisticated and dangerous as we rely more on technology in all aspects of our lives. Crimes, such as...
    Mustafa Hammad, Khalid Altarawneh, Abdulla Almahmood in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  12. Enhanced AES for Securing Hand Written Signature Using Residue Number System

    The uncertainty and vulnerability of symmetric algorithm, Advanced Encryption Standard (AES), which uses a shared public secret key, however, timing...
    Ifedotun Roseline Idowu, Bamidele Samson Alobalorun, Abubakar Abdulsalam in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  13. TickTrax: A Mobile and Web-Based Application for Tick Monitoring and Analysis

    Due to the impact of climate change on environmental factors, tick populations are expanding in various regions, posing a growing public health...
    Denielle Oliva, Ryan Dahan, ... Frederick C. Harris in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  14. Initial Design and Implementation of an Edge-to-Edge LoRaWAN Data Collection System

    Democratizing established research infrastructure yields profound beneficial effects on local regions, especially with sensor networks deployed...
    Chase Carthen, Zach Estreito, ... Sergiu M. Dascalu in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  15. Comparative Study of the Clarity of Privacy Policies in Social Media

    A look into the privacy policies set by major social networking websites. Policies are intentionally unclear and lengthy to trick users to accepting...
    Conference paper 2024
  16. Introductory Pathway to Virtual Reality by Develo** Immersive Games of Skill

    As the Virtual Reality (VR) market grows with more innovations in the field, the demand for Virtual Reality developers has increased. With the market...
    Levi Scully, Araam Zaremehrjardi, ... Sergiu M. Dascalu in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  17. A Review on the Use of Machine Learning for Pharmaceutical Formulations

    The development of pharmaceutical formulations is a costly and uncertain process, which includes testing different combinations. We present a...
    Helder Pestana, Rodrigo Bonacin, ... Mariangela Dametto in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  18. An Application of Support Vector Machine, Random Forest, and Related Machine Learning Algorithms on California Wildfire Data

    Computerized weather predictions have allowed the National Weather Service to identify meteorological conditions that give rise to thunderstorms and...
    Conference paper 2024
  19. Keep Sailing: An Investigation of Effective Navigation Controls and Subconscious Learning in Simulated Maritime Environment

    Simulation engines are gradually being used by researchers for creating maritime datasets for various analysis, detection and surveillance purposes....
    Mayamin Hamid Raha, Md. Abu Sayed, ... Mircea Nicolescu in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
  20. A Method Based on Behavior Driven Development (BDD) and System-Theoretic Process Analysis (STPA) for Verifying Security Requirements in Critical Software Systems

    Security failures in critical software systems can lead to severe economic, environmental, and human consequences. To ensure the security of these...
    Vitor Rubatino, Alice Batista Nogueira, ... Rodrigo Martins Pagliares in ITNG 2024: 21st International Conference on Information Technology-New Generations
    Conference paper 2024
Did you find what you were looking for? Share feedback.