Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Aravind Prakash"'
Autor:
Andrew Henderson, Aravind Prakash
Key FeaturesBook DescriptionWhat you will learnInstall Android on your BeagleBone Black Explore the three primary hardware interfaces of the BeagleBone Black-GPIO, SPI, and I2C Construct circuits that interface the BeagleBone Black with high-speed se
Autor:
Megalingam, Rajesh Kannan, Senthil, Aravind Prakash, Raghavan, Dhananjay, Manoharan, Sakthiprasad Kuttankulangara
Publikováno v:
Journal of Field Robotics; Mar2024, Vol. 41 Issue 2, p211-226, 16p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE/ACM Transactions on Computational Biology and Bioinformatics. :1-12
Publikováno v:
2022 IEEE 29th International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW).
Autor:
Farasat Kazmi, Guhan Shanmugasundaram, Aravind Prakash, Olasumbo Taiwo, David Maskell, Robert Wade, Gaurav Kapur
Publikováno v:
Clinical Oncology. 34:e4-e5
Autor:
Matthew Cole, Aravind Prakash
Publikováno v:
Secure IT Systems ISBN: 9783031222948
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a03a1e9003d03411508eb17013e3aaf4
https://doi.org/10.1007/978-3-031-22295-5_12
https://doi.org/10.1007/978-3-031-22295-5_12
Publikováno v:
Annual Computer Security Applications Conference.
Recently machine learning algorithms are utilized for identifying network threats. Threats otherwise called as intrusions, will harm the network in a stern manner, thus it must be dealt cautiously. In the proposed research work, a deep learning model
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::368f4a541edff695da2bc8f6e5776e98
https://doi.org/10.3233/apc210005
https://doi.org/10.3233/apc210005
Publikováno v:
2021 International Symposium on Secure and Private Execution Environment Design (SEED).
Code Reuse Attacks (CRAs) are dangerous exploitation strategies that allow attackers to compose malicious programs out of existing application and library code gadgets, without requiring code injection. Previously, researchers explored hardware-assis