|
|
|
Lin Xu, Shanxiu Ma, Zhiyuan Shen, Shiyu Huang and Ying Nan
In order to determine the fatigue state of air traffic controllers from air talk, an algorithm is proposed for discriminating the fatigue state of controllers based on applying multi-speech feature fusion to voice data using a Fuzzy Support Vector Machin...
ver más
|
|
|
|
|
|
Mazen Gazzan and Frederick T. Sheldon
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat...
ver más
|
|
|
|
|
|
Zhendong He, Wenbin Yang, Yanjie Liu, Anping Zheng, Jie Liu, Taishan Lou and Jie Zhang
Ensuring the safety of transmission lines necessitates effective insulator defect detection. Traditional methods often need more efficiency and accuracy, particularly for tiny defects. This paper proposes an innovative insulator defect recognition method...
ver más
|
|
|
|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
Hongyu Shao, Sizhe Pan, Yufei Song and Quanfu Li
In the context of rapid product iteration, design conflicts arise from discrepancies in designers? understanding of user needs, influenced by subjective preferences, behavioural stances, and other factors. This paper proposes a product conceptual design ...
ver más
|
|
|