Flying ad hoc networks (FANET) are defined by their energetic topology and the absence of fixed infrastructure, which makes efficient routing an important challenge. Traditional routing protocols faced an indeed impos...
详细信息
this article proposes a new deep video hashing algorithm to improve video retrieval speed. this method utilizes the powerful feature extraction ability of neural networks (CNNs) to extract representative video and tem...
详细信息
the paper analyzes the features of the Prophet library as a platform for forecasting the local meteorological situation. Annual and weekly forecasting of temperature changes in the environment in the city of Lviv was ...
详细信息
the transport layer is a vital network layer component responsible for ensuring the reliable delivery of data between two points in a communication network. the delivery layer protocols in cellular networks are essent...
详细信息
Research purpose of the article is to explore new ideas for the reform of university computer basic courses. the proposed method starts withthe background of the construction of new liberal arts and the demand for co...
详细信息
—In this paper, we propose a monocular image depth estimation method based on ResNet and bitmap estimation. Traditional monocular depth estimation methods usually utilize convolutional neural networks (CNNs) for end-...
详细信息
Manifold learning method is a dimensionality reduction method that treats the data in non-Euclidean space as a Euclidean space in a local scope. However, most existing manifold learning methods cannot obtain the true ...
详细信息
the proceedings contain 108 papers. the special focus in this conference is on computer Science Online. the topics include: Methodology for Solving the Problem of Classification of Professional Orientation Using Encep...
ISBN:
(纸本)9783031705946
the proceedings contain 108 papers. the special focus in this conference is on computer Science Online. the topics include: Methodology for Solving the Problem of Classification of Professional Orientation Using Encephalogram Data;Investigation of the Influence of External Conditions on the Process of Automated Landing of an UAV on a Seismic Sensor Using Technical Vision;methodology for a Business Intelligence Platform by Using Oracle 19C Database Engine and its Limitations;control of the State of Agrocenosis and Soil Environment According to Remote Sensing Data;design of a Web Platform for Smoke and Flood Monitoring in a Data Center Based on the Internet of things (IoT);enhancing Quality of Experience in Omnidirectional Video: Strategies Overview;optimizing 360° Video Delivery: Advancements and Strategic Approaches;identification and Interpretation of Significant Factors Influencing Client Defaults in Microfinance Institutions Using Machine Learning Methods;a Study About Complexity of Social Network;Limitations and Benefits of the ChatGPT for Python Programmers and Its Tools for Evaluation;Security Testing in IEEE 802.11 Wireless networks;technology Transfer in the Field of Additive Medical Technologies Based on Patent Informatics Research;personnel Privacy and Organisational Data: the Awareness and Policy Enforcement for Smartphone Security Among the Malaysian Armed Forces Personnel;Forensic Analysis of Cyber Attacks Using the Cyber Kill Chain Model to Enhance Antivirus Protection in an IT Solutions Company;integral Assessment of Cryptocurrency Quality;proposed Model for the Detection of Diabetic Retinopathy Using Convolutional Neural networks;proposed Ransomware Detection Model Based on Machine Learning;unbiasing on the Fly: Explanation-Guided Human Oversight of Machine Learning Decisions;Analyzing Nonlinear Behavior Sequences through ASM.
Apps and websites increasingly employ dark patterns, malicious interface design strategies that nudge people towards making decisions against their best interests. So far, dark patterns research has focused almost exc...
详细信息
ISBN:
(纸本)9798400709661
Apps and websites increasingly employ dark patterns, malicious interface design strategies that nudge people towards making decisions against their best interests. So far, dark patterns research has focused almost exclusively on adults. Today, however, children grow up with easy access to apps and online content, and they are particularly vulnerable to manipulation. therefore, we aim to better understand how dark patterns impact children. To this end, we conducted a triangulated elicitation study at a German school with 66 fifth-graders (10-11 years old) to start understanding how they perceive dark patterns. We found that many children understood the intentions behind simple dark patterns. When asked to actively search for manipulations, about half noticed overly complex wordings and color-based manipulations. About every fourth child spotted manipulative formulations. Most, however, completely missed Bad Defaults nudging them towards sharing personal data. this indicates that children may be particularly susceptible to bad privacy defaults.
the proceedings contain 108 papers. the special focus in this conference is on computer Science Online. the topics include: Methodology for Solving the Problem of Classification of Professional Orientation Using Encep...
ISBN:
(纸本)9783031702990
the proceedings contain 108 papers. the special focus in this conference is on computer Science Online. the topics include: Methodology for Solving the Problem of Classification of Professional Orientation Using Encephalogram Data;Investigation of the Influence of External Conditions on the Process of Automated Landing of an UAV on a Seismic Sensor Using Technical Vision;methodology for a Business Intelligence Platform by Using Oracle 19C Database Engine and its Limitations;control of the State of Agrocenosis and Soil Environment According to Remote Sensing Data;design of a Web Platform for Smoke and Flood Monitoring in a Data Center Based on the Internet of things (IoT);enhancing Quality of Experience in Omnidirectional Video: Strategies Overview;optimizing 360° Video Delivery: Advancements and Strategic Approaches;identification and Interpretation of Significant Factors Influencing Client Defaults in Microfinance Institutions Using Machine Learning Methods;a Study About Complexity of Social Network;Limitations and Benefits of the ChatGPT for Python Programmers and Its Tools for Evaluation;Security Testing in IEEE 802.11 Wireless networks;technology Transfer in the Field of Additive Medical Technologies Based on Patent Informatics Research;personnel Privacy and Organisational Data: the Awareness and Policy Enforcement for Smartphone Security Among the Malaysian Armed Forces Personnel;Forensic Analysis of Cyber Attacks Using the Cyber Kill Chain Model to Enhance Antivirus Protection in an IT Solutions Company;integral Assessment of Cryptocurrency Quality;proposed Model for the Detection of Diabetic Retinopathy Using Convolutional Neural networks;proposed Ransomware Detection Model Based on Machine Learning;unbiasing on the Fly: Explanation-Guided Human Oversight of Machine Learning Decisions;Analyzing Nonlinear Behavior Sequences through ASM.
暂无评论