Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Babak D."'
Publikováno v:
Problems of the Regional Energetics, Vol 61, Iss 1, Pp 127-139 (2024)
The purpose of the research is determining the influence of pre-treatment by extrusion of rape and maize straw on the output of biogas and the energy efficient mode of the extrusion process. The set goal is achieved by solving the following problems:
Externí odkaz:
https://doaj.org/article/82e58a94a8dc464fbb8877df47bc1de0
Publikováno v:
Journal of Environmental Studies and Sciences. 6:200-207
Advances in sensors and wireless sensor networks (WSNs) are enabling real-time environmental monitoring, which has the potential to provide a plethora of fine-grained data to assist in understanding the symbiosis between food, energy, and water (FEW)
Publikováno v:
Proceedings of the Future Technologies Conference (FTC) 2018 ISBN: 9783030026851
The Internet of Things (IoT) is going to change the way we live dramatically. Devices like alarm clocks, lights and speaker systems can interconnect and exchange information. Billions of devices are expected to be interconnected by the year 2020, thu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a1beb5821a55774832a412ac8693fbd8
https://doi.org/10.1007/978-3-030-02686-8_16
https://doi.org/10.1007/978-3-030-02686-8_16
Autor:
Suzan Sallam, Babak D. Beheshti
Publikováno v:
TENCON
The emergence of Internet of Things (IoT) devices is challenging the conventional design targets for integrated systems such as energy efficiency, cost, noise, and performance. With the prospected proliferation of IoT devices with 5G networks, ensuri
Publikováno v:
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
Information is more vulnerable than ever; and every technological advance raises new security threat that requires new security solutions. Penetration testing is conducted to evaluate the security of an IT infrastructure by safely exposing its vulner
Publikováno v:
2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
The future of Internet is “Internet of Things” where trillions of physical objects, most of them with low or extremely low resources, communicate with each other without human intervention. Light weight cryptography includes cryptographic algorit
Publikováno v:
2017 Fourth HCT Information Technology Trends (ITT).
Internet of Things (IoT) are affecting our daily lives significantly. They are used in the homes, hospitals; installed outside to control and report the changes in the environment. IoT is a worldwide system of physical and, virtual “things” assoc
Publikováno v:
2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
Dirty Copy on Write (COW) vulnerability, discovered by Phil Oester on October 2016, it is a serious vulnerability which could escalate unprivileged user to gain full control on devices (Computers, Mobile Smart Phones, Gaming devices that run Linux ba
Autor:
Babak D. Beheshti
Publikováno v:
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
Wireless Sensor Networks (WSNs) have become prolific in the past few years as low cost and easily deployable means to collect environmental data. With the increased scope of applications of WSNs it is imperative to assure security of the network itse
Autor:
Babak D. Beheshti
Publikováno v:
2015 Long Island Systems, Applications and Technology.
Date collection in wireless networks is performed by sampling the phenomenon to be measured at recurring intervals in time. In situations where the sensors must operate over a very long time without the possibility of battery replacement, the sleep c