|
|
|
Taehoon Lee, Byungjin Lee and Sangkyung Sung
This study proposes an enhanced integration algorithm that combines the magnetic field-based positioning system (MPS?Magnetic Pose Estimation System) with an inertial system with the advantage of an invariant filter structure. Specifically, to mitigate t...
ver más
|
|
|
|
|
|
Vinh Pham, Maxim Tyan, Tuan Anh Nguyen and Jae-Woo Lee
Multi-fidelity surrogate modeling (MFSM) methods are gaining recognition for their effectiveness in addressing simulation-based design challenges. Prior approaches have typically relied on recursive techniques, combining a limited number of high-fidelity...
ver más
|
|
|
|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
Jinghua Groppe, Sven Groppe, Daniel Senf and Ralf Möller
Given a set of software programs, each being labeled either as vulnerable or benign, deep learning technology can be used to automatically build a software vulnerability detector. A challenge in this context is that there are countless equivalent ways to...
ver más
|
|
|
|
|
|
Carlos Matos, Pedro Cabrera, José A. Carta and Noemi Melián-Martel
Water scarcity is a global problem that particularly affects islands located in arid regions or regions with limited water resources. This issue has prompted the development of non-conventional water sources such as fossil fuel-powered desalination syste...
ver más
|
|
|