|
|
|
Thanda Shwe and Masayoshi Aritsugi
Intelligent applications in several areas increasingly rely on big data solutions to improve their efficiency, but the processing and management of big data incur high costs. Although cloud-computing-based big data management and processing offer a promi...
ver más
|
|
|
|
|
|
|
Julien Touboul, Veronica Morales-Marquez and Kostas Belibassakis
The wave?current?seabed interaction problem is studied by using a coupled-mode system developed for modeling wave scattering by non-homogeneous, sheared currents in variable bathymetry regions. The model is based on a modal series expansion of wave veloc...
ver más
|
|
|
|
|
|
|
Moon Hwan Kim, Teasuk Yoo, Seok Joon Park and Kyungwon Oh
Autonomous Underwater Vehicles (AUVs) have emerged as pivotal tools for intricate underwater missions, spanning seafloor exploration to meticulous inspection of subsea infrastructures such as pipelines and cables. Although terrestrial obstacle avoidance ...
ver más
|
|
|
|
|
|
|
Siyu Gao, Yuchen Wang, Nan Feng, Zhongcheng Wei and Jijun Zhao
With the proliferation of video surveillance system deployment and related applications, real-time video analysis is very critical to achieving intelligent monitoring, autonomous driving, etc. Analyzing video stream with high accuracy and low latency thr...
ver más
|
|
|
|
|
|
|
Taylor Joyal, Alexander K. Fremier and Jan Boll
In the humid tropics, forest conversion and climate change threaten the hydrological function and stationarity of watersheds, particularly in steep terrain. As climate change intensifies, shifting precipitation patterns and expanding agricultural and pas...
ver más
|
|
|
|
|
|
|
Xin Tong, Bo Jin, Jingya Wang, Ying Yang, Qiwei Suo and Yong Wu
In recent years, the number of malicious web pages has increased dramatically, posing a great challenge to network security. While current machine learning-based detection methods have emerged as a promising alternative to traditional detection technique...
ver más
|
|
|
|
|
|
|
Yubo Zheng, Yingying Luo, Hengyi Shao, Lin Zhang and Lei Li
Contrastive learning, as an unsupervised technique, has emerged as a prominent method in time series representation learning tasks, serving as a viable solution to the scarcity of annotated data. However, the application of data augmentation methods duri...
ver más
|
|
|
|
|
|
|
Brian G. Sanderson, Richard H. Karsten, Cameron C. Solda, David C. Hardie and Daniel J. Hasselman
Tidal stream energy is a renewable energy resource that might be developed to offset carbon emissions. A tidal energy demonstration (TED) area has been designated in Minas Passage, Bay of Fundy, for testing and installing marine hydrokinetic (MHK) turbin...
ver más
|
|
|
|
|
|
|
Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang
The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs) ar...
ver más
|
|
|
|
|
|
|
Luigi Rovito, Andrea De Lorenzo and Luca Manzoni
Stream ciphers usually rely on highly secure Boolean functions to ensure safe communication within unsafe channels. However, discovering secure Boolean functions is a non-trivial optimization problem that has been addressed by many optimization technique...
ver más
|
|
|
|