|
|
|
Monika Rybczak and Krystian Kozakiewicz
Today, specific convolution neural network (CNN) models assigned to specific tasks are often used. In this article, the authors explored three models: MobileNet, EfficientNetB0, and InceptionV3 combined. The authors were interested in investigating how q...
ver más
|
|
|
|
|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Zhenping Li, Zhen Cao, Pengfei Li, Yong Zhong and Shaobo Li
The task of multi-hop question generation (QG) seeks to generate questions that require a complex reasoning process that spans multiple sentences and answers. Beyond the conventional challenges of what to ask and how to ask, multi-hop QG necessitates sop...
ver más
|
|
|
|
|
|
|
Yuxing Wang, Nan Liu, Zhiwen Pan and Xiaohu You
Network slicing is a key technology for 5G networks, which divides the traditional physical network into multiple independent logical networks to meet the diverse requirements of end-users. This paper focuses on the resource allocation problem in the sce...
ver más
|
|
|
|
|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
|
Yang Hu, Liangliang Gong, Xinyang Li, Hui Li, Ruoxin Zhang and Rentao Gu
When applying 5G network slicing technology, the operator?s network resources in the form of mutually isolated logical network slices provide specific service requirements and quality of service guarantees for smart grid communication services. In the fa...
ver más
|
|
|
|
|
|
|
Sarmad Javed, Ahthasham Sajid, Tayybah Kiren, Inam Ullah Khan, Christine Dewi, Francesco Cauteruccio and Henoch Juli Christanto
The increasing use of wireless communication and IoT devices has raised concerns about security, particularly with regard to attacks on the Routing Protocol for Low-Power and Lossy Networks (RPL), such as the wormhole attack. In this study, the authors h...
ver más
|
|
|
|
|
|
|
Yves Adou, Ekaterina Markova and Yuliya Gaidamaka
The Network Slicing (NS) technology, recognized as one of the key enabling features of Fifth Generation (5G) wireless systems, provides very flexible ways to efficiently accommodate common physical infrastructures, e.g., Base Station (BS), multiple logic...
ver más
|
|
|
|
|
|
|
Grigorios Kakkavas, Vasileios Karyotis and Symeon Papavassiliou
This paper focuses on the design, implementation, experimental validation, and evaluation of a network tomography approach for performing inferential monitoring based on indirect measurements. In particular, we address the problems of inferring the routi...
ver más
|
|
|
|
|
|
|
Kyong Ju Kim, Bonghee Han, Min Seo Park, Kyoungmin Kim and Eu Wang Kim
Most construction projects are delayed, and many are subject to claims or disputes. Therefore, delay analysis is a critical component of any construction project to determine who is responsible for delays. This research examines four different techniques...
ver más
|
|
|
|