|
|
|
Shruti Daggumati and Peter Z. Revesz
This paper analyzes the relationships among eight ancient scripts from between Greece and India. We used convolutional neural networks combined with support vector machines to give a numerical rating of the similarity between pairs of signs (one sign fro...
ver más
|
|
|
|
|
|
Mohamed Elsaka and C. Guedes Soares
In pursuit of more efficient load-bearing solutions for ship deck panels of Very Large Crude Carriers exposed to vertical hull girder bending forces, laser-welded web-core sandwich panels are considered as an alternative to conventional stiffened panels....
ver más
|
|
|
|
|
|
Junqiang Chen, Guang Cheng and Hantao Mei
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno...
ver más
|
|
|
|
|
|
Xin Tong, Bo Jin, Jingya Wang, Ying Yang, Qiwei Suo and Yong Wu
In recent years, the number of malicious web pages has increased dramatically, posing a great challenge to network security. While current machine learning-based detection methods have emerged as a promising alternative to traditional detection technique...
ver más
|
|
|
|
|
|
Jiaxiu Cao, Chao Wang and Zeping Wang
Based on the assumption of linear potential flow theory, the scattering problem of a composite breakwater placed in front of an impermeable back wall is theoretically investigated. The velocity potential in each subregion is found using the eigenfunction...
ver más
|
|
|