Search
Search Results
-
Development of Crosspoint Memory Arrays for Neuromorphic Computing
Memristor-based hardware accelerators play a crucial role in achieving energy-efficient big data processing and artificial intelligence, overcoming... -
Innovative Cross-Layer Optimization Techniques for the Design of Optical Networks
Optical networks have become indispensable in the era of 5G-and-beyond communications, supporting applications that require unprecedented capacity,... -
Synthesis of Filters and Filtering Antennas for Micro and Millimeter Waves Applications
Filters and antennas are the closest building blocks to the air interface in modern wireless communications systems. Filters allow the transmission... -
FPGA-Based Design and Implementation of a Code-Based Post-quantum KEM
Post-quantum cryptography aims to design cryptosystems that can be deployed on traditional computers and resist attacks from quantum computers, which... -
Electronic Bio-Reconfigurable Impedance Platform for High Sensitivity Detection of Target Analytes
The present research presents a portable bioelectronic platform for multiplex detection to read biosensor chips with several sensing sites for... -
Combining Cyber Security and Data Science: ACutting-Edge Approach for Public Health Education Masters
The need to include data science and cyber security into Master of Public Health (MPH) degree programs is summarized in this abstract. This method... -
Security Analysis of Drone Communication Methods
The use of drones in various applications has increased significantly in recent years, including agriculture, transportation, and military... -
Innovative Lightweight Key Agreement Protocol Based on Hyperelliptic Curve for IoT Mutual Authentication
Fog nodes are established to be intermediate between the IoT devices node and the cloud data center to alleviate the latency of data transmission.... -
Analysis of IoT Vulnerabilities and Proposed Solution Approach for Secure Real-Time IoT Communication
The growing reliance on real-time communication in Internet of Things (IoT) devices raises concerns about security vulnerabilities. Our research... -
Case Study of an Interdisciplinary Academic Project for Reading Fluency Analysis
During the first semester of 2023, at the Aeronautics Institute of Technology (ITA, Brazil), an Interdisciplinary Problem-Based Learning (IPBL) Case... -
Cyber Attack Intensity Prediction Using Feature Selection and Machine Learning Models
Cybercrimes are becoming increasingly more sophisticated and dangerous as we rely more on technology in all aspects of our lives. Crimes, such as... -
Enhanced AES for Securing Hand Written Signature Using Residue Number System
The uncertainty and vulnerability of symmetric algorithm, Advanced Encryption Standard (AES), which uses a shared public secret key, however, timing... -
TickTrax: A Mobile and Web-Based Application for Tick Monitoring and Analysis
Due to the impact of climate change on environmental factors, tick populations are expanding in various regions, posing a growing public health... -
Initial Design and Implementation of an Edge-to-Edge LoRaWAN Data Collection System
Democratizing established research infrastructure yields profound beneficial effects on local regions, especially with sensor networks deployed... -
Comparative Study of the Clarity of Privacy Policies in Social Media
A look into the privacy policies set by major social networking websites. Policies are intentionally unclear and lengthy to trick users to accepting... -
Introductory Pathway to Virtual Reality by Develo** Immersive Games of Skill
As the Virtual Reality (VR) market grows with more innovations in the field, the demand for Virtual Reality developers has increased. With the market... -
A Review on the Use of Machine Learning for Pharmaceutical Formulations
The development of pharmaceutical formulations is a costly and uncertain process, which includes testing different combinations. We present a... -
An Application of Support Vector Machine, Random Forest, and Related Machine Learning Algorithms on California Wildfire Data
Computerized weather predictions have allowed the National Weather Service to identify meteorological conditions that give rise to thunderstorms and... -
Keep Sailing: An Investigation of Effective Navigation Controls and Subconscious Learning in Simulated Maritime Environment
Simulation engines are gradually being used by researchers for creating maritime datasets for various analysis, detection and surveillance purposes.... -
A Method Based on Behavior Driven Development (BDD) and System-Theoretic Process Analysis (STPA) for Verifying Security Requirements in Critical Software Systems
Security failures in critical software systems can lead to severe economic, environmental, and human consequences. To ensure the security of these...