|
|
|
Alexander Lange, Ronghua Xu, Max Kaeding, Steffen Marx and Joern Ostermann
Regular inspections of important civil infrastructures are mandatory to ensure structural safety and reliability. Until today, these inspections are primarily conducted manually, which has several deficiencies. In context of prestressed concrete structur...
ver más
|
|
|
|
|
|
|
Somayeh Shahrabadi, Telmo Adão, Emanuel Peres, Raul Morais, Luís G. Magalhães and Victor Alves
The proliferation of classification-capable artificial intelligence (AI) across a wide range of domains (e.g., agriculture, construction, etc.) has been allowed to optimize and complement several tasks, typically operationalized by humans. The computatio...
ver más
|
|
|
|
|
|
|
Wenjun Li, Xueying Yang, Chao Xu and Yongjie Yang
In the directed co-graph edge-deletion problem, we are given a directed graph and an integer k, and the question is whether we can delete, at most, k edges so that the resulting graph is a directed co-graph. In this paper, we make two minor contributions...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr...
ver más
|
|
|
|
|
|
|
Imran, Megat Farez Azril Zuhairi, Syed Mubashir Ali, Zeeshan Shahid, Muhammad Mansoor Alam and Mazliham Mohd Su?ud
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent years, with the rise of the Internet of Things (IoT) application. Anomalies, often known as outliers, are defined as the discovery of anomalous occurrence...
ver más
|
|
|
|
|
|
|
Thanatat Pasupa and Sadami Suzuki
We present a novel mathematical programming model to address a team-oriented worker assignment problem, called the team formation and worker assignment problem (TFWAP). The model establishes a multi-skilled team with high group cohesion to meet cell oper...
ver más
|
|
|
|
|
|
|
Martin Gjoreski, Vladimir Kuzmanovski and Marko Bohanec
Multi-attribute decision analysis is an approach to decision support in which decision alternatives are evaluated by multi-criteria models. An advanced feature of decision support models is the possibility to search for new alternatives that satisfy cert...
ver más
|
|
|
|
|
|
|
Marcus R. Garvie and John Burkardt
The general problem of tiling finite regions of the plane with polyominoes is ????
NP
-complete, and so the associated computational geometry problem rapidly becomes intractable for large instances. Thus, the need to reduce algorithm complexity for tilin...
ver más
|
|
|
|