|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
|
Krzysztof Drachal and Michal Pawlowski
This study firstly applied a Bayesian symbolic regression (BSR) to the forecasting of numerous commodities? prices (spot-based ones). Moreover, some features and an initial specification of the parameters of the BSR were analysed. The conventional approa...
ver más
|
|
|
|
|
|
|
Yifan Wang, Jinglei Xu, Qihao Qin, Ruiqing Guan and Le Cai
In this study, we propose a novel dynamic mode decomposition (DMD) energy sorting criterion that works in conjunction with the conventional DMD amplitude-frequency sorting criterion on the high-dimensional schlieren dataset of the unsteady flow of a spik...
ver más
|
|
|
|
|
|
|
Galina Ilieva, Tania Yankova, Margarita Ruseva, Yulia Dzhabarova, Veselina Zhekova, Stanislava Klisarova-Belcheva, Tanya Mollova and Angel Dimitrov
The objective of this study is to investigate and determine factors influencing user perception and acceptance of electronic government services in the context of technological advancements. The research focuses on classifying the main features of e-admi...
ver más
|
|
|
|
|
|
|
Roman Golman, Robert Giterman and Adam Teman
Embedded memories occupy an increasingly dominant part of the area and power budgets of modern systems-on-chips (SoCs). Multi-ported embedded memories, commonly used by media SoCs and graphical processing units, occupy even more area and consume higher p...
ver más
|
|
|
|
|
|
|
Lei Yang, Mengxue Xu and Yunan He
Convolutional Neural Networks (CNNs) have become essential in deep learning applications, especially in computer vision, yet their complex internal mechanisms pose significant challenges to interpretability, crucial for ethical applications. Addressing t...
ver más
|
|
|
|
|
|
|
Giampaolo D?Alessandro, Pantea Tavakolian and Stefano Sfarra
The present review aims to analyze the application of infrared thermal imaging, aided by bio-heat models, as a tool for the diagnosis of skin and breast cancers. The state of the art of the related technical procedures, bio-heat transfer modeling, and th...
ver más
|
|
|
|
|
|
|
Wenqi Lyu, Wei Ke, Hao Sheng, Xiao Ma and Huayun Zhang
In response to the challenge of handling large-scale 3D point cloud data, downsampling is a common approach, yet it often leads to the problem of feature loss. We present a dynamic downsampling algorithm for 3D point cloud maps based on an improved voxel...
ver más
|
|
|
|
|
|
|
Ji-Woon Lee and Hyun-Soo Kang
The escalating use of security cameras has resulted in a surge in images requiring analysis, a task hindered by the inefficiency and error-prone nature of manual monitoring. In response, this study delves into the domain of anomaly detection in CCTV secu...
ver más
|
|
|
|
|
|
|
Abdelghani Azri, Adil Haddi and Hakim Allali
Collaborative filtering (CF), a fundamental technique in personalized Recommender Systems, operates by leveraging user?item preference interactions. Matrix factorization remains one of the most prevalent CF-based methods. However, recent advancements in ...
ver más
|
|
|
|