|
|
|
Evaristo José Madarro-Capó, Eziel Christians Ramos Piñón, Guillermo Sosa-Gómez and Omar Rojas
This study describes the implementation of two algorithms in a parallel environment. These algorithms correspond to two statistical tests based on the bit?s independence criterion and the strict avalanche criterion. They are utilized to measure avalanche...
ver más
|
|
|
|
|
|
Fan Lin, Dengjie Chen, Cheng Liu and Jincheng He
This study pioneered a non-destructive testing approach to evaluating the physicochemical properties of golden passion fruit by developing a platform to analyze the fruit?s electrical characteristics. By using dielectric properties, the method accurately...
ver más
|
|
|
|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
Pin-Hung Juan and Ja-Ling Wu
In this study, we present a federated learning approach that combines a multi-branch network and the Oort client selection algorithm to improve the performance of federated learning systems. This method successfully addresses the significant issue of non...
ver más
|
|
|
|
|
|
Majid Aleyaasin
In this paper, the vibration control of the multivariable model of rotor bearing systems is considered for investigation. Some simply structured controllers that can suppress vibrational disturbances are tested for their robustness via the H8 optimality ...
ver más
|
|
|