Bilatu
385-tik 301-310 emaitza erakusten
Estudio de modelado de perifericos para habilitar emulaciones de firmware embebido
(Tecnalia. Incibe, 2022)
Los sistemas embebidos aumentan cada vez más en número y con ello también lo hacen los ataques dirigidos a estos. Uno de los factores clave para reducir la superficie de ataque es descubrir y corregir vulnerabilidades en ...
High-Speed Material Characterization Using an Instrumented Forging Hammer
(Springer, 2021)
Hammer forging is a widely employed manufacturing process to produce parts with excellent mechanical properties. Although the rheological behavior and the microstructural transformation phenomena of metals under hammer ...
Optimising Maintenance: What are the expectations for Cyber Physical Systems
(IEEE, 2016)
The need for maintenance is based on the wear of components of machinery. If this need can be defined reliably beforehand so that no unpredicted failures take place then the maintenance actions can be carried out economically ...
Dynamic DNS Request Monitoring of Android Applications via networking
(IEEE, 2018)
Smart devices are very popular and are becoming ubiquitous in the modern society, with Android OS as the most widespread operating system on current smartphones/tablets. However, malicious applications is one of the major ...
A collaborative framework for android malware detection using DNS & dynamic analysis
(IEEE, 2018)
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, ...
Labor Induction failure prediction using Gabor filterbanks and Center Symmetric Local Binary Patterns
(IEEE, 2018)
Labor induction is defined as the artificial stimulation of uterine contractions aimed to induce vaginal birth. Occurring in about 20% of pregnancies labor induction has become one the most commonly practiced procedures ...
Reputation-based intrusion detection system for wireless sensor networks
(IEEE, 2012)
Wireless Sensor Networks (WSNs) can be used in a broad range of applications from complex military operations to simple domestic environments. This makes security a vital characteristic in WSNs. There have been numerous ...
Labor Induction failure prediction based on B-Mode Ultrasound Image Processing using Multiscale Local Binary Patterns
(IEEE, 2016)
Labor induction is defined as the artificial onset of labor for the purpose of vaginal birth. Cesarean section is one of the potential risks of labor induction as it occurs in about 20% of the inductions. A ripe cervix ...
E-Learning Experience with Flipped Classroom Quizzes Using Kahoot, Moodle and Google Forms: A Comparative Study
(ACM, 2023)
In recent years, the use of technology is gaining weight in higher education. Today’s students are digital natives and e-Learning is common for them. Furthermore, they find traditional teaching methods tedious. In order ...
Modular Battery Energy Storage Systems for Available Energy Increase
(IEEE, 2022)
The aim of this work is to dive into the available energy of different configurations of battery packs, a vital factor when it comes to improving the driving range of electric vehicles. To that end, two different storage ...