A real-time automatic pavement crack and pothole recognition system for mobile Android-based devices
Due to the rapid growth of vehicles and traffic accidents caused by road pavement defects,
road safety has become a pressing concern worldwide. For this reason, Countries and …
road safety has become a pressing concern worldwide. For this reason, Countries and …
Ultrasonic radar system (URAS): Arduino and virtual reality for a light-free map** of indoor environments
Recently, academia and industry have focused on the creation of new systems for map**
and exploration of unknown spaces in order to create advanced guide systems for robots …
and exploration of unknown spaces in order to create advanced guide systems for robots …
Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security
In the past few years, various lightweight cryptographic algorithms have been proposed to
balance the trade-offs between the requirements of resource constrained IoT devices and …
balance the trade-offs between the requirements of resource constrained IoT devices and …
[PDF][PDF] Mobile application for identification of coffee fruit maturity using digital image processing
Indonesia is an agricultural country that relies on the agricultural sector and is well known in
producing various plantation commodities, one of which is coffee. Coffee is a leading export …
producing various plantation commodities, one of which is coffee. Coffee is a leading export …
[HTML][HTML] Android traffic malware analysis and detection using ensemble classifier
This paper introduces the Systematic mAlware detection in android (STAR) technique
designed to enhance accuracy in identifying and classifying Android malware, addressing …
designed to enhance accuracy in identifying and classifying Android malware, addressing …
Moisture content evaluation for road surfaces monitoring by GPR image and data processing on mobile platforms
This work introduces a mobile application for moisture content evaluation aimed at road-
surfaces monitoring. Our application exploits Ground Penetrating Radar (GPR) image and …
surfaces monitoring. Our application exploits Ground Penetrating Radar (GPR) image and …
Cloud computing privacy security risk analysis and evaluation
Q Zhang, R Jiang, T Li, Z Ma, M Yang… - Recent Patents on …, 2018 - ingentaconnect.com
Background: The most important question about the application and development of cloud
computing is the privacy risk, as it has become the key factor for users in selecting cloud …
computing is the privacy risk, as it has become the key factor for users in selecting cloud …
A blind signal processing method for assessing users' movements in indoor Wi-Fi communications by Android-based smartphones
Mobile users are more and more requesting new value-added services, such as the
localization services, anyway anywhere and anytime, even in hostile propagation …
localization services, anyway anywhere and anytime, even in hostile propagation …
Design and implementation of multilevel security architectures
A Liguori - 2016 - arcadia.sba.uniroma3.it
The problem of securely storing and processing sensitive data is paramount in many
sectors. But ICT Security is not a Defense prerogative. Events like Vatileaks and Panama …
sectors. But ICT Security is not a Defense prerogative. Events like Vatileaks and Panama …
A PC-based cephalometric analysis system
Y Chen, K Cheng, J Liu - Proceedings. 11th IEEE Symposium …, 1998 - ieeexplore.ieee.org
Cephalograms are clinically useful for cephalometric diagnosis and superimposition. The
measurements for cephalometry has always been done manually in practice. We have …
measurements for cephalometry has always been done manually in practice. We have …