|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
|
Abdelghani Azri, Adil Haddi and Hakim Allali
Collaborative filtering (CF), a fundamental technique in personalized Recommender Systems, operates by leveraging user?item preference interactions. Matrix factorization remains one of the most prevalent CF-based methods. However, recent advancements in ...
ver más
|
|
|
|
|
|
|
Thomas Kopalidis, Vassilios Solachidis, Nicholas Vretos and Petros Daras
Recent technological developments have enabled computers to identify and categorize facial expressions to determine a person?s emotional state in an image or a video. This process, called ?Facial Expression Recognition (FER)?, has become one of the most ...
ver más
|
|
|
|
|
|
|
Xie Lian, Xiaolong Hu, Liangsheng Shi, Jinhua Shao, Jiang Bian and Yuanlai Cui
The parameters of the GR4J-CemaNeige coupling model (GR4neige) are typically treated as constants. However, the maximum capacity of the production store (parX1) exhibits time-varying characteristics due to climate variability and vegetation coverage chan...
ver más
|
|
|
|
|
|
|
Haiqiang Yang and Zihan Li
The objective imbalance between the taxi supply and demand exists in various areas of the city. Accurately predicting this imbalance helps taxi companies with dispatching, thereby increasing their profits and meeting the travel needs of residents. The ap...
ver más
|
|
|
|
|
|
|
Tuan Phong Tran, Anh Hung Ngoc Tran, Thuan Minh Nguyen and Myungsik Yoo
Multi-access edge computing (MEC) brings computations closer to mobile users, thereby decreasing service latency and providing location-aware services. Nevertheless, given the constrained resources of the MEC server, it is crucial to provide a limited nu...
ver más
|
|
|
|
|
|
|
Xiaoping Jiang, Huilin Zhao, Junwei Liu, Suliang Ma and Mingzhen Hu
To address the problems of difficult online monitoring, low recognition efficiency and the subjectivity of work condition identification in mineral flotation processes, a foam flotation performance state recognition method is developed to improve the iss...
ver más
|
|
|
|
|
|
|
Chao Fu, Kuan Lu, Qian Li, Yuandong Xu, Fengshou Gu, Andrew D. Ball and Zhaoli Zheng
The engine system is critical for a marine vehicle, and its performance significantly affects the efficiency and safety of the whole ship. Due to the harsh working environment and the complex system structure, a marine system is prone to have many kinds ...
ver más
|
|
|
|
|
|
|
Stefania Zourlidou, Monika Sester and Shaohan Hu
In this paper, a new method is proposed to detect traffic regulations at intersections using GPS traces. The knowledge of traffic rules for regulated locations can help various location-based applications in the context of Smart Cities, such as the accur...
ver más
|
|
|
|
|
|
|
Danjie Chen, Yan Zheng, Liqun Ma and Fen Qin
Typhoons are destructive weather events. News media reports contain large amounts of typhoon information. Transforming this information into useful knowledge to provide a basis for mining typhoon knowledge and supporting disaster prevention and relief is...
ver más
|
|
|
|