|
|
|
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of...
ver más
|
|
|
|
|
|
|
Meng-Leong How and Sin-Mei Cheah
The fusion of quantum computing and artificial intelligence (AI) heralds a transformative era for Industry 4.0, offering unprecedented capabilities and challenges. This paper delves into the intricacies of quantum AI, its potential impact on Industry 4.0...
ver más
|
|
|
|
|
|
|
George Papageorgiou, Vangelis Sarlis and Christos Tjortjis
This study utilized advanced data mining and machine learning to examine player injuries in the National Basketball Association (NBA) from 2000?01 to 2022?23. By analyzing a dataset of 2296 players, including sociodemographics, injury records, and financ...
ver más
|
|
|
|
|
|
|
Moatsum Alawida, Bayan Abu Shawar, Oludare Isaac Abiodun, Abid Mehmood, Abiodun Esther Omolara and Ahmad K. Al Hwaitat
The Chat Generative Pre-training Transformer (GPT), also known as ChatGPT, is a powerful generative AI model that can simulate human-like dialogues across a variety of domains. However, this popularity has attracted the attention of malicious actors who ...
ver más
|
|
|
|
|
|
|
Chih-Hung Wu, Te-Cheng Wu and Wen-Bin Lin
Originality/Contribution: The newly developed computer vision pose estimation technique in artificial intelligence (AI) is an emerging technology with potential advantages, such as high efficiency and contactless detection, for improving competitive adva...
ver más
|
|
|
|
|
|
|
Fernando Vives, Javier Lázaro, José Francisco Guzmán, Rafael Martínez-Gallego and Miguel Crespo
This study used a novel machine learning approach to uncover key serve variables that maximize effectiveness in men?s professional doubles tennis. A large dataset of 14,146 serves from 97 Davis Cup doubles matches played between 2010 and 2019 was analyze...
ver más
|
|
|
|
|
|
|
Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Michael Plain, Jadarius Hill and Marshall Elam
There has been a great deal of research in the area of using graph engines and graph databases to model network traffic and network attacks, but the novelty of this research lies in visually or graphically representing the Reconnaissance Tactic (TA0043) ...
ver más
|
|
|
|
|
|
|
Jelena Atanackovic Jelicic, Milan R. Rapaic, Igor Mara?, Erne Tot and Dejan Ecet
The main question proposed in this research is whether different types of organizational approaches could help in shortening the response time needed to analyze advanced design solutions in accordance with the changed circumstances. Approaches that we ar...
ver más
|
|
|
|
|
|
|
Eddy Truyen, Hongjie Xie and Wouter Joosen
Kubernetes (K8s) defines standardized APIs for container-based cluster orchestration such that it becomes possible for application managers to deploy their applications in a portable and interopable manner. However, a practical problem arises when the sa...
ver más
|
|
|
|
|
|
|
Pawinee Iamtrakul, Sararad Chayphong, Emese Makó and Souvathone Phetoudom
This study explores road users? behaviors and accident analyses on different travel modes in the Bangkok Metropolitan Region (BMR). The questionnaire survey was adopted and designed based on contributing factors related to risk behavior perceptions in di...
ver más
|
|
|
|