|
|
|
Shi-Yi Jin, Dong-Hyun Seo, Yeon-Jin Kim, Yong-Eun Kim, Samuel Woo and Jin-Gyun Chung
To authenticate a controller area network (CAN) data frame, a message authentication code (MAC) must be sent along with the CAN frame, but there is no space reserved for the MAC in the CAN frame. Recently, difference-based compression (DBC) algorithms ha...
ver más
|
|
|
|
|
|
Longxin Yao, Yun Lu, Mingjiang Wang, Yukun Qian and Heng Li
The construction of complex networks from electroencephalography (EEG) proves to be an effective method for representing emotion patterns in affection computing as it offers rich spatiotemporal EEG features associated with brain emotions. In this paper, ...
ver más
|
|
|
|
|
|
Jie Wang, Jie Yang, Jiafan He and Dongliang Peng
Semi-supervised learning has been proven to be effective in utilizing unlabeled samples to mitigate the problem of limited labeled data. Traditional semi-supervised learning methods generate pseudo-labels for unlabeled samples and train the classifier us...
ver más
|
|
|
|
|
|
Dariush Ashtab, Mehdi Gholamalifard, Parviz Jokar, Andrey G. Kostianoy and Aleksander V. Semenov
Protected areas are referred to around the world as the basis of conservation strategies. Designation of marine protected areas (MPAs) is to preserve marine biodiversity and protect species, habitats in the seas, and oceans. The simulated annealing algor...
ver más
|
|
|
|
|
|
Tatyana Aksenovich and Vasiliy Selivanov
During geomagnetic storms, which are a result of solar wind?s interaction with the Earth?s magnetosphere, geomagnetically induced currents (GICs) begin to flow in the long, high-voltage electrical networks on the Earth?s surface. It causes a number of ne...
ver más
|
|
|