Bitcoin digital currency faces new Challenges in Communication, Software and Hardware Security.
Hello, I am looking for a way to compare the feature vectors of two images that contain a person in it. The application should be able to output a high similarity score for the same person and a...
10 May 2020 3,137 1 View
Given the current dynamic developments in the field of Big Data, Massive Data Storage and Ubiquitous access to high speed Internet 24/7 for anyone worldwide, the term Smart Cyberspace is becoming...
05 April 2020 6,213 13 View
Given the dynamic developments and innovation in computing, IT and Information Systems Industry, it appears that there is a shortage of well qualified professionals who will push the edge of...
25 December 2019 5,319 6 View
Physical layer (PHY) authentication based on the unique channel properties has proven effective due to its simple, fast, and distributed procedures with the recent explosion of the Internet of...
15 August 2019 9,322 1 View
Smart manufacturing, sometimes referred to as Industry 4.0, heralds a new age of responsive supply networks and tailored products and services made possible by advanced technologies such as the...
12 June 2019 4,963 2 View
12 June 2019 2,573 2 View
Text classification (TC) is a popular technique in the data mining and it used to get valuable information from the vast amount of data. The process of classifying or grouping documents into...
01 May 2019 1,789 3 View
Conducting research in the field of Cyber Security generate large volume of data that require large volume of computation and data analytics.
10 January 2019 192 1 View
The issue of agriculture is an important topic in particular in developing countries, this is because it will be influential in improving the quality of human resources and is also a means to...
22 October 2018 1,274 3 View
The low power is important in electronics industry especially in Very Large Scale Integration (VLSI) field. The multiplier utilize multiplication process with 70nm Complementary Metal Oxide...
14 October 2018 2,837 2 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View
I need to implement matrix inversion in hardware. The size of the matrix can be anywhere from 50 *50 to 8*8. Are ready-made standard codes available or inbuilt modules available with FPGA...
15 February 2021 4,006 3 View
I would appreciate if you answer my DBA research questionnaire. Thank you all in...
10 February 2021 1,990 3 View
HI Everyone! I am asking to know by you, expert in cybersecurity and mathematics, if Computer virology (the one of Cohen and Andler) is still an active field of research. That research made in...
08 February 2021 7,613 6 View
What if we go for one single global currency? than every country has its own currency. Currency exchange commission etc. (Advantages/Disadvantages)
04 February 2021 8,937 3 View
Hi, We are having issues using Desmond on our workstation. Simulations run fine on one of our gpus ("Gpu0") but crash consistently on the other gpu ("gpu1" - which is also set up as the display...
01 February 2021 5,866 3 View
Hello We are looking for a glue /sealant to fix and secure some glass parts of a live cell imaging chamber. It has to be biologically inert because it may come in contact with the medium, and...
01 February 2021 6,886 3 View
I want to apply a privacy-preserving algorithm in MQTT for IoT devices. Which tool do you suggest to simulate this algorithm? I want to measure the performance on the IoT battery device? Actually,...
28 January 2021 9,561 3 View
With emerging technologies, the availability of data at every point of customer interaction has increased. Consequently, the need to monitor and secure the data has increased. With data being...
19 January 2021 7,944 9 View
I am looking for constructs, measurement, scales and item to assess a users privacy and security concern regarding personal health information. More specific in the context in use of smart...
14 January 2021 375 3 View