|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
|
Manos Garefalakis, Zacharias Kamarianakis and Spyros Panagiotakis
As it concerns remote laboratories (RLs) for teaching microcontroller programming, the related literature reveals several common characteristics and a common architecture. Our search of the literature was constrained to papers published in the period of ...
ver más
|
|
|
|
|
|
|
Leon Kopitar, Iztok Fister, Jr. and Gregor Stiglic
Introduction: Type 2 diabetes mellitus is a major global health concern, but interpreting machine learning models for diagnosis remains challenging. This study investigates combining association rule mining with advanced natural language processing to im...
ver más
|
|
|
|
|
|
|
Heling Cao, Dong Han, Fangzheng Liu, Tianli Liao, Chenyang Zhao and Jianshu Shi
Automatic program repair has drawn more and more attention since software quality is facing increasing challenges. In existing approaches, the unlimited search space is considered to be the main limitation in finding the correct patch. So how to reduce t...
ver más
|
|
|
|
|
|
|
Patrick Steinert, Stefan Wagenpfeil, Paul Mc Kevitt, Ingo Frommholz and Matthias Hemmje
The volume of multimedia assets in collections is growing exponentially, and the retrieval of information is becoming more complex. The indexing and retrieval of multimedia content is generally implemented by employing feature graphs. Feature graphs cont...
ver más
|
|
|
|
|
|
|
Tao Peng, Kun She, Yimin Shen, Xiangliang Xu and Yue Yu
Requirement traceability links are an essential part of requirement management software and are a basic prerequisite for software artifact changes. The manual establishment of requirement traceability links is time-consuming. When faced with large projec...
ver más
|
|
|
|
|
|
|
Mikel Penagarikano, Amparo Varona, Germán Bordel and Luis Javier Rodriguez-Fuentes
In this paper, a semisupervised speech data extraction method is presented and applied to create a new dataset designed for the development of fully bilingual Automatic Speech Recognition (ASR) systems for Basque and Spanish. The dataset is drawn from an...
ver más
|
|
|
|
|
|
|
Jianan Bai, Danyang Qin, Ping Zheng and Lin Ma
In visual indoor positioning systems, the method of constructing a visual map by point-by-point sampling is widely used due to its characteristics of clear static images and simple coordinate calculation. However, too small a sampling interval will cause...
ver más
|
|
|
|
|
|
|
Dauren Ayazbayev, Andrey Bogdanchikov, Kamila Orynbekova and Iraklis Varlamis
This work focuses on determining semantically close words and using semantic similarity in general in order to improve performance in information retrieval tasks. The semantic similarity of words is an important task with many applications from informati...
ver más
|
|
|
|
|
|
|
Yujian Zhang and Daifu Liu
With the blooming of blockchain-based smart contracts in decentralized applications, the security problem of smart contracts has become a critical issue, as vulnerable contracts have resulted in severe financial losses. Existing research works have explo...
ver más
|
|
|
|