|
|
|
Taehoon Lee, Byungjin Lee and Sangkyung Sung
This study proposes an enhanced integration algorithm that combines the magnetic field-based positioning system (MPS?Magnetic Pose Estimation System) with an inertial system with the advantage of an invariant filter structure. Specifically, to mitigate t...
ver más
|
|
|
|
|
|
Vinh Pham, Maxim Tyan, Tuan Anh Nguyen and Jae-Woo Lee
Multi-fidelity surrogate modeling (MFSM) methods are gaining recognition for their effectiveness in addressing simulation-based design challenges. Prior approaches have typically relied on recursive techniques, combining a limited number of high-fidelity...
ver más
|
|
|
|
|
|
Jinghua Groppe, Sven Groppe, Daniel Senf and Ralf Möller
Given a set of software programs, each being labeled either as vulnerable or benign, deep learning technology can be used to automatically build a software vulnerability detector. A challenge in this context is that there are countless equivalent ways to...
ver más
|
|
|
|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
Murat Mustafin and Hiba Moussa
The technology for determining a point?s coordinates on the earth?s surface using the global navigation satellite system (GNSS) is becoming the norm along with ground-based methods. In this case, determining coordinates does not cause any particular diff...
ver más
|
|
|