|
|
|
Zafer Adiguzel, Fatma Sonmez Cakir
Pág. 230 - 250
|
|
|
|
|
|
|
Tuan Phong Tran, Anh Hung Ngoc Tran, Thuan Minh Nguyen and Myungsik Yoo
Multi-access edge computing (MEC) brings computations closer to mobile users, thereby decreasing service latency and providing location-aware services. Nevertheless, given the constrained resources of the MEC server, it is crucial to provide a limited nu...
ver más
|
|
|
|
|
|
|
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru...
ver más
|
|
|
|
|
|
|
Ivo Pereira, Ana Madureira, Nuno Bettencourt, Duarte Coelho, Miguel Ângelo Rebelo, Carolina Araújo and Daniel Alves de Oliveira
|
|
|
|
|
|
|
Xu Feng, Mengyang He, Lei Zhuang, Yanrui Song and Rumeng Peng
SAGIN is formed by the fusion of ground networks and aircraft networks. It breaks through the limitation of communication, which cannot cover the whole world, bringing new opportunities for network communication in remote areas. However, many heterogeneo...
ver más
|
|
|
|
|
|
|
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w...
ver más
|
|
|
|
|
|
|
Piotr Sliz
Purpose: The advancements in deep learning and AI technologies have led to the development of such language models, in 2022, as OpenAI?s ChatGPT. The primary objective of this paper is to thoroughly examine the capabilities of ChatGPT within the realm of...
ver más
|
|
|
|
|
|
|
Cen-Ying Liao, Lin Zhang, Si-Yu Hu, Shuai-Jie Xia and D. M. Li
Empowering materials with self-healing capabilities is an attractive approach for sustainable development. This strategy involves using different methods to automatically heal microcracks and damages that occur during the service life of materials or str...
ver más
|
|
|
|
|
|
|
Wei Wang, Huanhuan Feng, Yanzong Li, Quanwei You and Xu Zhou
At present, the determination of tunnel parameters mainly rely on engineering experience and human judgment, which leads to the subjective decision of parameters and an increased construction risk. Machine learning algorithms could provide an objective t...
ver más
|
|
|
|
|
|
|
Qasem Abu Al-Haija and Ahmed Al-Tamimi
Automatic dependent surveillance-broadcast (ADS-B) is the future of aviation surveillance and traffic control, allowing different aircraft types to exchange information periodically. Despite this protocol?s advantages, it is vulnerable to flooding, denia...
ver más
|
|
|
|