50   Artículos

 
en línea
Monika Rybczak and Krystian Kozakiewicz    
Today, specific convolution neural network (CNN) models assigned to specific tasks are often used. In this article, the authors explored three models: MobileNet, EfficientNetB0, and InceptionV3 combined. The authors were interested in investigating how q... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Abner Perez-Haro and Arturo Diaz-Perez    
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zhenping Li, Zhen Cao, Pengfei Li, Yong Zhong and Shaobo Li    
The task of multi-hop question generation (QG) seeks to generate questions that require a complex reasoning process that spans multiple sentences and answers. Beyond the conventional challenges of what to ask and how to ask, multi-hop QG necessitates sop... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuxing Wang, Nan Liu, Zhiwen Pan and Xiaohu You    
Network slicing is a key technology for 5G networks, which divides the traditional physical network into multiple independent logical networks to meet the diverse requirements of end-users. This paper focuses on the resource allocation problem in the sce... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu    
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yang Hu, Liangliang Gong, Xinyang Li, Hui Li, Ruoxin Zhang and Rentao Gu    
When applying 5G network slicing technology, the operator?s network resources in the form of mutually isolated logical network slices provide specific service requirements and quality of service guarantees for smart grid communication services. In the fa... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Sarmad Javed, Ahthasham Sajid, Tayybah Kiren, Inam Ullah Khan, Christine Dewi, Francesco Cauteruccio and Henoch Juli Christanto    
The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy Networks (RPL), such as the wormhole attack. In this study, the authors h... ver más
Revista: Information    Formato: Electrónico

 
en línea
Yves Adou, Ekaterina Markova and Yuliya Gaidamaka    
The Network Slicing (NS) technology, recognized as one of the key enabling features of Fifth Generation (5G) wireless systems, provides very flexible ways to efficiently accommodate common physical infrastructures, e.g., Base Station (BS), multiple logic... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Grigorios Kakkavas, Vasileios Karyotis and Symeon Papavassiliou    
This paper focuses on the design, implementation, experimental validation, and evaluation of a network tomography approach for performing inferential monitoring based on indirect measurements. In particular, we address the problems of inferring the routi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kyong Ju Kim, Bonghee Han, Min Seo Park, Kyoungmin Kim and Eu Wang Kim    
Most construction projects are delayed, and many are subject to claims or disputes. Therefore, delay analysis is a critical component of any construction project to determine who is responsible for delays. This research examines four different techniques... ver más
Revista: Buildings    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »