|
|
|
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p...
ver más
|
|
|
|
|
|
Haizhou Liu, Yixin Huang and Yang Zhao
Structures with inhomogeneous materials, non-uniform cross-sections, non-uniform supports, and subject to non-uniform loads are increasingly common in aerospace applications. This paper presents a simple and unified numerical dynamics model for all beams...
ver más
|
|
|
|
|
|
Yixian Fu, Yuanyao Lu and Ran Ni
Lip reading has attracted increasing attention recently due to advances in deep learning. However, most research targets English datasets. The study of Chinese lip-reading technology is still in its initial stage. Firstly, in this paper, we expand the na...
ver más
|
|
|
|
|
|
Bardia Rafieian, Pedro Hermosilla and Pere-Pau Vázquez
In data science and visualization, dimensionality reduction techniques have been extensively employed for exploring large datasets. These techniques involve the transformation of high-dimensional data into reduced versions, typically in 2D, with the aim ...
ver más
|
|
|
|
|
|
Kashan Ahmed, Ayesha Altaf, Nor Shahida Mohd Jamail, Faiza Iqbal and Rabia Latif
Modern distributed systems that operate concurrently generate interleaved logs. Identifiers (ID) are always associated with active instances or entities in order to track them in logs. Consequently, log messages with similar IDs can be categorized to aid...
ver más
|
|
|