|
|
|
Antonio Maci, Alessandro Santorsola, Antonio Coscia and Andrea Iannacone
Web phishing is a form of cybercrime aimed at tricking people into visiting malicious URLs to exfiltrate sensitive data. Since the structure of a malicious URL evolves over time, phishing detection mechanisms that can adapt to such variations are paramou...
ver más
|
|
|
|
|
|
Vinay Kanwar, Alicia Cordero, Juan R. Torregrosa, Mithil Rajput and Ramandeep Behl
In this paper, we present a new third-order family of iterative methods in order to compute the multiple roots of nonlinear equations when the multiplicity (m≥1)" role="presentation">(??=1)(m=1)
(
m
=
1
)
is known in advance. There is a pleth...
ver más
|
|
|
|
|
|
Owen Tamin, Badrul Ikram, Ahmad Lutfi Amri Ramli, Ervin Gubin Moung and Christie Chin Pei Yee
Travel time is a measure of time taken to travel from one place to another. Global Positioning System (GPS) navigation applications such as Waze and Google Maps are easily accessible presently and allow users to plan a route based on travel time from one...
ver más
|
|
|
|
|
|
Jijun Tong, Shuai Xu, Fangliang Wang and Pengjia Qi
This paper presents a novel method based on a curve descriptor and projection geometry constrained for vessel matching. First, an LM (Leveberg?Marquardt) algorithm is proposed to optimize the matrix of geometric transformation. Combining with parameter a...
ver más
|
|
|
|
|
|
Chengwei Huang, Yong Liu, Ke Wang and Bing Bai
Based on the bionic behavior of geckos, this paper presents a land?air?wall cross-domain robot which can fly in air, run on the ground, and adhere to various wall surfaces. When geckos jump and adsorb to vertical surfaces such as trunks, they can still a...
ver más
|
|
|