Search
Now showing items 1-10 of 13
Geopolitics and gas-transit security through pipelines
(Springer International Publishing, 2020)
Hydrocarbons are valuable only if they can be transited from where they are produced to where they are consumed. Despite the enduring importance of transit to the global energy system, the topic did not begin to be extensively ...
Physical-Layer Security With Optical Generalized Space Shift Keying
(Ieee-Inst Electrıcal Electronıcs Engıneers Inc, 2020)
Spatial modulation (SM) is a promising technique that reduces inter-channel interference while providing high power efficiency and detection simplicity. In order to ensure the secrecy of SM, precoding and friendly jamming ...
Applications of ML/DL in the management of smart cities and societies based on new trends in information technologies: A systematic literature review
(Elsevier, 2022)
The goal of managing smart cities and societies is to maximize the efficient use of finite resources while enhancing the quality of life. To establish a sustainable urban existence, smart cities use some new technologies ...
Resilient and dependability management in distributed environments: a systematic and comprehensive literature review
(Springer, 2023)
With the galloping progress of the Internet of Things (IoT) and related technologies in multiple facets of science, distribution environments, namely cloud, edge, fog, Internet of Drones (IoD), and Internet of Vehicles ...
Adults' recollection of the earliest memories: early parental elaboration mediated the link between attachment and remembering
(Springer, 2022)
Social interactions are a major factor in organizing the earliest experiences in the memory system. In the current study, we tested the role of parental reminiscing on the relationship between parental attachment and ...
Cloud healthcare services: A comprehensive and systematic literature review
(Wiley, 2022)
Over the last decade, the landscape of cloud computing has been significantly changed. It has been known as a paradigm in which a shared pool of computing resources is accessible for users. The rapid growth of the healthcare ...
AnomalyAdapters: Parameter-Efficient Multi-Anomaly Task Detection
(IEEE-Inst Electrical Electronics Engineers Inc, 2022)
The emergence of technological innovations brings sophisticated threats. Cyberattacks are increasing day by day aligned with these innovations and entails rapid solutions for defense mechanisms. These attacks may hinder ...
Physical-Layer Security in 6G Networks
(IEEE-Inst Electrical Electronics Engineers Inc, 2021)
The sixth generation (6G) of mobile network will be composed by different nodes, from macro-devices (satellite) to nano-devices (sensors inside the human body), providing a full connectivity fabric all around us. These ...
Security and Reliability Performance of Noise-Loop Modulation: Theoretical Analysis and Experimentation
(IEEE-Inst Electrical Electronics Engineers Inc, 2022)
Security is a crucial feature of current (5G) and even more for future (6G) communication networks. While the innate nature of the wireless channel is an issue for guaranteeing security, its physical characteristics can ...
Blockchain Systems in Embedded Internet of Things: Systematic Literature Review, Challenges Analysis, and Future Direction Suggestions
(Mdpi, 2022)
Internet of Things (IoT) environments can extensively use embedded devices. Without the participation of consumers; tiny IoT devices will function and interact with one another, but their operations must be reliable and ...