|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
|
Marisol García-Valls and Alejandro M. Chirivella-Ciruelos
The lack of sufficient guarantee about the authenticity of running smart contracts is a major entry barrier to blockchain networks. By authenticity,we refer to the smart contract ownership or provenance; this implies perfect matching between a published ...
ver más
|
|
|
|
|
|
|
Ioana Branescu, Octavian Grigorescu and Mihai Dascalu
Effectively understanding and categorizing vulnerabilities is vital in the ever-evolving cybersecurity landscape, since only one exposure can have a devastating effect on the entire system. Given the increasingly massive number of threats and the size of...
ver más
|
|
|
|
|
|
|
Soe Thandar Aung, Nobuo Funabiki, Lynn Htet Aung, Safira Adine Kinari, Mustika Mentari and Khaing Hsu Wai
The Flutter framework with Dart programming allows developers to effortlessly build applications for both web and mobile from a single codebase. It enables efficient conversions to native codes for mobile apps and optimized JavaScript for web browsers. S...
ver más
|
|
|
|
|
|
|
Leon Kopitar, Iztok Fister, Jr. and Gregor Stiglic
Introduction: Type 2 diabetes mellitus is a major global health concern, but interpreting machine learning models for diagnosis remains challenging. This study investigates combining association rule mining with advanced natural language processing to im...
ver más
|
|
|
|
|
|
|
Anik Baul, Gobinda Chandra Sarker, Prokash Sikder, Utpal Mozumder and Ahmed Abdelgawad
Short-term load forecasting (STLF) plays a crucial role in the planning, management, and stability of a country?s power system operation. In this study, we have developed a novel approach that can simultaneously predict the load demand of different regio...
ver más
|
|
|
|
|
|
|
Assaf B. Spanier, Dor Steiner, Navon Sahalo, Yoel Abecassis, Dan Ziv, Ido Hefetz and Shimon Kimchi
Fingerprint analysis has long been a cornerstone in criminal investigations for suspect identification. Beyond this conventional role, recent efforts have aimed to extract additional demographic information from fingerprints, such as gender, age, and nat...
ver más
|
|
|
|
|
|
|
Marko Jevtic, Sa?a Mladenovic and Andrina Granic
Due to the everchanging and evergrowing nature of programming technologies, the gap between the programming industry?s needs and the educational capabilities of both formal and informal educational environments has never been wider. However, the need to ...
ver más
|
|
|
|
|
|
|
Min-Jen Tsai, Ya-Chu Lee and Te-Ming Chen
QR codes (short for Quick Response codes) were originally developed for use in the automotive industry to track factory inventories and logistics, but their popularity has expanded significantly in the past few years due to the widespread applications of...
ver más
|
|
|
|
|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|