|
|
|
Chenglin Yang, Dongliang Xu and Xiao Ma
Due to the increasing severity of network security issues, training corresponding detection models requires large datasets. In this work, we propose a novel method based on generative adversarial networks to synthesize network data traffic. We introduced...
ver más
|
|
|
|
|
|
Zhenyu Feng, Qianqian You, Kun Chen, Houjin Song and Haoxuan Peng
Evacuation simulation is an important method for studying and evaluating the safety of passenger evacuation, and the key lies in whether it can accurately predict personnel evacuation behavior in different environments. The existing models have good adap...
ver más
|
|
|
|
|
|
Alice Zaghini, Francesca Gagliardi, Valentina Marsili, Filippo Mazzoni, Lorenzo Tirello, Stefano Alvisi and Marco Franchini
Providing water with adequate quality to users is one of the main concerns for water utilities. In most countries, this is ensured through the introduction of disinfectants, such as chlorine, which are subjected to decay over time, with consequent loss o...
ver más
|
|
|
|
|
|
Ivan S. Maksymov
Ambiguous optical illusions have been a paradigmatic object of fascination, research and inspiration in arts, psychology and video games. However, accurate computational models of perception of ambiguous figures have been elusive. In this paper, we desig...
ver más
|
|
|
|
|
|
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d...
ver más
|
|
|