Articles with "security aware" as a keyword



Photo from wikipedia

An enhanced security-aware dynamic packet scheduling scheme for wireless networks using intelligent time slice-based krill herd algorithm

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Electromagnetic Waves and Applications"

DOI: 10.1080/09205071.2018.1497549

Abstract: ABSTRACT Wireless networks perform computing on grouped users together through networks that suffer with improper scheduling and less security awareness results in terms of bandwidth, increase in error rate, power constraints, authentication problem, etc. In… read more here.

Keywords: enhanced security; security aware; security; wireless networks ... See more keywords
Photo from wikipedia

Security-Aware Data-Driven Intelligent Transportation Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Sensors Journal"

DOI: 10.1109/jsen.2020.3012046

Abstract: Intelligent transportation systems have been envisioned to bring more intelligence and cooperative sensing to meet the imminent demands of overall improved autonomous transportation. However, dynamic era of modern applications and fixed architecture of legacy Internet… read more here.

Keywords: transportation systems; transportation; security aware; aware data ... See more keywords
Photo by aaronburden from unsplash

A 22-nm 1-Mb 1024-b Read Data-Protected STT-MRAM Macro With Near-Memory Shift-and-Rotate Functionality and 42.6-GB/s Read Bandwidth for Security-Aware Mobile Device

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Journal of Solid-State Circuits"

DOI: 10.1109/jssc.2021.3112182

Abstract: The development of security-aware mobile devices using wide-input–output (IO) nonvolatile memory (NVM) is hindered by high peak current, large area overhead for high read bandwidth (BWR), and considerable energy consumption for data movement between NVM… read more here.

Keywords: mram macro; stt mram; security aware; near memory ... See more keywords