Zobrazeno 1 - 10
of 1 049
pro vyhledávání: '"Baktir, A."'
Autor:
Alfa Akustia Widati, Tokok Adiarto, Mochamad Zakki Fahmi, Antonius Budi Prasetyo, Handoko Darmokoesoemo, Ganden Supriyanto, Sri Sumarsih, Aning Purwaningsih, Miratul Khasanah, Hartati Hartati, Afaf Baktir, Sofijan Hadi, Purkan Purkan, Yanuardi Raharjo, Fatiha Khairunnisa, Qurrota A'yuni, Ni Nyoman Tri Puspaningsih, Lee Hwei Voon
Publikováno v:
Jurnal Layanan Masyarakat (Journal of Public Services), Vol 8, Iss 3, Pp 329-338 (2024)
Community empowerment and household waste processing are two issues that need to be resolved by the government. An independent and educated society is an important pillar to support the development of country. Meanwhile, waste that continues to accum
Externí odkaz:
https://doaj.org/article/d3f6319de655455989a3e8fe1efd0eaa
Autor:
Muji Harsini, Ainy Nur Farida, Erna Fitriany, Denok Risky Ayu Paramita, Afaf Baktir, Fredy Kurniawan, Satya Candra Wibawa Sakti, Yudhi Dwi Kurniawan, Bernadeta Ayu Widyaningrum
Publikováno v:
Indonesian Journal of Chemistry, Vol 24, Iss 1, Pp 38-53 (2024)
Modification of electrode using polymelamine (PM) and gold nanoparticles (AuNPs) has been successfully developed via electropolymerization and electrodeposition onto carbon paste electrode (CPE) using cyclic voltammetry (CV) technique. The modified e
Externí odkaz:
https://doaj.org/article/755a7ad85292479eb0c1b32f0b70cf8b
Efficient ECC Processor Designs for IoT Using Edwards Curves and Exploiting FPGA Embedded Components
Publikováno v:
IEEE Access, Vol 12, Pp 167183-167200 (2024)
Elliptic Curve Cryptography (ECC) provides high security with shorter key sizes and higher performance. Internet of Things (IoT) is the interconnected network where a vast number of connected devices require high security to ensure data integrity and
Externí odkaz:
https://doaj.org/article/c6c60468d2a641a8863e0415140b5b59
Autor:
I. Melih Tas, Selcuk Baktir
Publikováno v:
IEEE Access, Vol 12, Pp 60123-60137 (2024)
Voice over Internet Protocol (VoIP) networks are vulnerable to caller-ID (caller-identification) spoofing attacks due to the open nature of Session Initiation Protocol (SIP) signaling. Caller-ID spoofing is a critical security threat in modern teleco
Externí odkaz:
https://doaj.org/article/6606febba5414fd69a730ec709aa68ea
The improvements in the edge computing technology pave the road for diversified applications that demand real-time interaction. However, due to the mobility of the end-users and the dynamic edge environment, it becomes challenging to handle the task
Externí odkaz:
http://arxiv.org/abs/2110.01863
Publikováno v:
In Future Generation Computer Systems August 2024 157:516-528
Autor:
Martin Lang, Laura S. Schmidt, Kelli M. Wilson, Christopher J. Ricketts, Carole Sourbier, Cathy D. Vocke, Darmood Wei, Daniel R. Crooks, Youfeng Yang, Benjamin K. Gibbs, Xiaohu Zhang, Carleen Klumpp-Thomas, Lu Chen, Rajarshi Guha, Marc Ferrer, Crystal McKnight, Zina Itkin, Darawalee Wangsa, Danny Wangsa, Amy James, Simone Difilippantonio, Baktir Karim, Francisco Morís, Thomas Ried, Maria J. Merino, Ramaprasad Srinivasan, Craig J. Thomas, W. Marston Linehan
Publikováno v:
Journal of Experimental & Clinical Cancer Research, Vol 42, Iss 1, Pp 1-14 (2023)
Abstract Background MiT-Renal Cell Carcinoma (RCC) is characterized by genomic translocations involving microphthalmia-associated transcription factor (MiT) family members TFE3, TFEB, or MITF. MiT-RCC represents a specific subtype of sporadic RCC tha
Externí odkaz:
https://doaj.org/article/6b0458681f774fc788c19d8f3ed9c6d2
Publikováno v:
In Journal of Hand Therapy October-December 2023 36(4):913-922
Failures in networks result in service disruptions which may cause deteriorated Quality of Service (QoS) for the end users. Since SDN is becoming the mainstream paradigm for networks, implementation of a robust fault tolerance scheme for SDN-based ne
Externí odkaz:
http://arxiv.org/abs/1912.11849
Autor:
Utku Gulen, Selcuk Baktir
Publikováno v:
IEEE Access, Vol 11, Pp 39531-39543 (2023)
We present a practical realization of Rivest-Shamir-Adleman (RSA) with a 2048-bit key on MSP430, a widely used microcontroller in wireless sensor network and Internet of things applications, and show that 2048-bit RSA is feasible on a constrained mic
Externí odkaz:
https://doaj.org/article/ec4a86e279ff40c08cd8449d4a80b393