One of the buzzwords in the Information Technology is Internet of Things (IoT). The future is Internet of Things, which will transform the real world objects in
Building the prediction model(s) from the historical time series has attracted many researchers in last few decades. For example, the traders of hedge funds and
In this paper, we implement a content authoring and cloud system for cloud-based smart cloud learning. With the advent of the smartphone and mobile devices such
Mobile Security has been a rapidly growing field in the security area. With the increases of mobile devices and mobile applications, the need for mobile securit
For the purpose of motor fault real-time monitoring, this research developed a nano-silicon ni- tride film based magnetic field (MF) sensor, and applied this se
X-ray image might be corrupted by noise or blurring because of signal transmission or the bad X- ray lens. This paper presents a two-stage shock filter based on
A security architecture using secret key algorithm and vertical authentication mode is proposed. Establish security protocols in the chip of smart key at networ