|
|
|
Mazen Gazzan and Frederick T. Sheldon
Ransomware attacks have emerged as a significant threat to critical data and systems, extending beyond traditional computers to mobile and IoT/Cyber?Physical Systems. This study addresses the need to detect early ransomware behavior when only limited dat...
ver más
|
|
|
|
|
|
Abdelghani Azri, Adil Haddi and Hakim Allali
Collaborative filtering (CF), a fundamental technique in personalized Recommender Systems, operates by leveraging user?item preference interactions. Matrix factorization remains one of the most prevalent CF-based methods. However, recent advancements in ...
ver más
|
|
|
|
|
|
Lei Yang, Xinze Chen, Yuanqi Zhang, Baoxiang Feng, Haibing Wen, Ting Yang, Xin Zhao, Jingjing Huang, Darui Zhu, Yaopeng Zhao, Aimin Zhang and Xiangqian Tong
Underwater wireless power transfer (UWPT) systems are appropriate for battery charging of compact, submerged devices without a complicated and expensive sealing structure or human contact because the power source and load are not physically connected. Fo...
ver más
|
|
|
|
|
|
Yan Liu and Zhichun Lei
Mitigating low-frequency noise in various industrial applications often involves the use of the filter-x least mean squares (FxLMS) algorithm, which relies on the mean square error criterion. This algorithm has demonstrated effectiveness in reducing nois...
ver más
|
|
|
|
|
|
Yu Chen, Jianwan Ding, Yu Chen and Dong Yan
The introduction of a dynamic model in robot trajectory tracking control design can significantly improve its trajectory tracking accuracy, but there are many uncertainties in the robot dynamic model which can be dealt with through robust control and ada...
ver más
|
|
|