Welcome to Bilingual Publishing Group
Page Header
  • Login / Register
Skip to main content Skip to main navigation menu Skip to site footer
Electrical Science & Engineering
  • Home
  • All Issues
  • Author Guidelines
  • Announcements
  • Editorial Team
  • Contact
Apply for Editorial Board Submit an Article

About the Journal

Aims and Scope

Open Access Policy

Indexing & Archiving

Peer Review Process

Publishing Ethics

Correction&Withdrawal Policy

Article Processing Charges (APC)

Copyright Policy

Advertising Policy

Most Viewed
  • Terahertz (THz) Generator and Detection
    1406
  • Design and Economic Analysis of a Grid-connected Rooftop Solar PV System for Typical Home Applications in Oman
    1322
  • Cyber Security Awareness among Students and Faculty Members in a Sudanese College
    1311
  • Design and Construction of A Single-Phase Power Factor Meter
    1225
  • An Approach to Carbon Emissions Prediction Using Generalized Regression Neural Network Improved by Genetic Algorithm
    1081
  1. Home /
  2. Search

Search

Advanced filters
Published After
Published Before

Search Results

Found 5 items.
  • Overview of Key Technologies for Water-based Automatic Security Marking Platform

    Aijuan Li, Chunpeng Gong, Xin Huang, Xinnian Sun, Gang Liu
    30-40

    Article ID: 4710
    121  (Abstract) 54  (Download)

    Abstract: Water-based automatic security marking platform composed of multifunctional underwater robots and unmanned surface vessel has become the development trend and focus for exploring complex and dangerous waters,and its related technologies have flourished and gradually developed from single control to multi-platform collaborative direction in complex and dangerous waters to reduce casualties. This paper composes and analyzes... More

    2022-06-14
  • Cyber Security Awareness among Students and Faculty Members in a Sudanese College

    Mohammed Daffalla Elradi, Altigani Abd alraheem Altigani, Osman Idriss Abaker
    24-28

    Article ID: 2477
    1311  (Abstract) 202  (Download)

    Abstract:

    In the last few years, cyber security has been an essential prerequisite for almost every organization to handle the massive number of emerging cyber attacks worldwide. A critical factor in reducing the possibility of being exploited is cyber security awareness. Not only having the adequate knowledge but how to utilize this knowledge to prevent cyber attacks. In this paper we conducted a... More

    2020-11-30
  • High-Throughput CBC Mode Crypto Circuit

    Kai-Chun Chang, You-Tun Teng, Wen-Long Chin
    21-31

    Article ID: 5636
    17  (Abstract) 37  (Download)

    Abstract:

    The objective of this study is to investigate a high-throughput cipher-block chaining (CBC) mode crypto circuit, which can be embedded in commercial home gateways or switches/routers. Concurrently, the area efficiency of block ciphers can be improved as well. However, the CBC mode encounters the problem of data dependency. To solve this issue, a data scheduling... More

    2023-05-24
  • Representing Increasing Virtual Machine Security Strategy in Cloud Computing Computations

    Mohammad Shirzadi
    7-16

    Article ID: 3786
    465  (Abstract) 82  (Download)

    Abstract:

    This paper proposes algorithm for Increasing Virtual Machine Security Strategy in Cloud Computing computations. Imbalance between load and energy has been one of the disadvantages of old methods in providing server and hosting, so that if two virtual severs be active on a host and energy load be more on a host, it would... More

    2021-11-15
  • Cyber Security Professionals’ Challenges: A Proposed Integrated Platform Solution

    Mohammed Daffalla Elradi, Khalid Abass Abdelmaged, Mutaz Osman Mohammad
    1-6

    Article ID: 3376
    453  (Abstract) 108  (Download)

    Abstract:

    As cyber threats and attacks are immensely increasing and broadly spreading catastrophically worldwide, cyber security professionals need to cope up with such a highly demanding environment. Security teams, such as Security operation Centre (SOC), Incident Response (IR) and Threat management teams are the people responsible for dealing with cyber security threats and attacks from detection... More

    2021-08-24
1 - 5 of 5 items

About Us

  • Profile
  • Payment Collection Information
  • Contact and support

Further Information

  • All Journals
  • Other Journals

Follow Us

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
Copyright © 2023 Bilingual Publishing Group
Disclaimer|Privacy Policy