this paper investigates the transition to DevSecOps, where the security component is of paramount importance. As digital threats become increasingly sophisticated, the need for security to be embedded within the Softw...
详细信息
It is our great pleasure to welcome you to the twelfth edition of the international Workshop on Load Testing and Benchmarking of Software systems - LTB 2024, (https://***/). this one-day workshop brings together softw...
详细信息
ISBN:
(纸本)9798400704451
It is our great pleasure to welcome you to the twelfth edition of the international Workshop on Load Testing and Benchmarking of Software systems - LTB 2024, (https://***/). this one-day workshop brings together software testing and software performance researchers, practitioners, and tool developers to discuss the challenges and opportunities of conducting research on load testing and benchmarking software systems, including theory, applications, and experiences. LTB 2024 includes 2 keynote talks, 4 research papers, and 2 industry presentations. the topics cover performance of serverless computing, performance and load testing, performance-driven culture, workload generation, workload tracing, benchmarking, and performance verification.
Accurate anticipation and surveillance of seismic activities are crucial for safeguarding human life and infrastructure. the integration of advanced deep learning algorithms has emerged as a transformative approach, o...
详细信息
ISBN:
(纸本)9798350389166;9798350389173
Accurate anticipation and surveillance of seismic activities are crucial for safeguarding human life and infrastructure. the integration of advanced deep learning algorithms has emerged as a transformative approach, offering unprecedented precision in interpreting intricate seismic data patterns. this review delves into the spectrum of recent advancements in deep learning methodologies, including Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), and Long Short-Term Memory networks (LSTMs), among others. We scrutinize their implementation in seismic phase identification, event detection, and predictive modelling. Furthermore, we underscore the existing challenges and chart a course for future research, aiming to further integrate these algorithms into seismological practices.
the proceedings contain 108 papers. the topics discussed include: SESAR GEESE project validation with CIRA multi-agent simulation facility: preliminary study;medical decision support system in nuclear medicine diagnos...
ISBN:
(纸本)9798350368833
the proceedings contain 108 papers. the topics discussed include: SESAR GEESE project validation with CIRA multi-agent simulation facility: preliminary study;medical decision support system in nuclear medicine diagnosis for non-small cell lung cancer and coronary artery disease: a first stage prototype;infrared computer vision for utility-scale photovoltaic array inspection;multi-criteria building performance assessment;effective early polyp detection from medical images with YOLO-V7;enhancing green financing through AI analytics and cross-domain data sharing;applying LSTM for river’s water level forecasting as potential flood indication: a case study in Greece;audiovisual multimodal cough data analysis for tuberculosis detection;and smart garbage separators: a comparative evaluation.
the proceedings contain 6 papers. the topics discussed include: a holistic approach for equity-aware carbon reduction of ridesharing platforms;the green mirage: impact of location- and market-based carbon intensity es...
ISBN:
(纸本)9798400704802
the proceedings contain 6 papers. the topics discussed include: a holistic approach for equity-aware carbon reduction of ridesharing platforms;the green mirage: impact of location- and market-based carbon intensity estimation on carbon optimization efficacy;comfort-aware optimal space planning in shared workspaces;FedZero: leveraging renewable excess energy in federated learning;online search with predictions: Pareto-optimal algorithm and its applications in energy markets;and contributions of individual generators to nodal carbon emissions.
the rapid evolution of financial services has led to an increase in fraudulent activities, necessitating advanced detection methods. Traditional techniques often struggle withthe volume and complexity of financial tr...
详细信息
this special issue aims to present new developments and advances in techniques for assessment performance portability of high performance computing applications. It contains revised and extended versions of selected p...
详细信息
this special issue aims to present new developments and advances in techniques for assessment performance portability of high performance computing applications. It contains revised and extended versions of selected papers presented at the 10th Workshop on Language-Based Parallel Programming Models, WLPP 2024, which was a part of 15thinternationalconference on Parallel Processing and Applied Mathematics, PPAM 2024, held on September 8–11, 2024, in Ostrava, Czech Republic.
Covert database and Covert Channels can be represented regarding intriguing facet of information security, which had the confidential data within seemingly innocuous data *** review paper gives a quite comprehensive i...
详细信息
ISBN:
(纸本)9798331300579
Covert database and Covert Channels can be represented regarding intriguing facet of information security, which had the confidential data within seemingly innocuous data *** review paper gives a quite comprehensive idea of Covert databases and Covert Channels, providing a detailed analysis of its concepts, mechanisms, detection techniques and applications [1].the initial section of this review paper dives into the theoretical concepts of Covert databases & Covert Channels, its core principles and terminologies and historical *** describes how the Covert databases have developed over the time, from previous analogue communication methods to the modern *** we have described the difference between normal and covert *** next section describes Covert databases and Covert Channels, explaining how sensitive data can be included within seemingly benign data warehouse it brings light on topics like steganography, data hiding techniques and the challenges related with covert database *** also examined the inspiration behind the utilization of covert channels and databases highlighting their different uses in various fields, including cyber warfare, industrial espionage and intelligence *** also describes the risks related withthese Covert Communication Methods and the potential risks for individuals and *** is a crucial perspective of Covert Channel and database *** review paper gives an overview of already existing identification techniques and overcoming measures, including statistical analysis, intrusion detection systems and AI based *** conclusion, this comprehensive review paper influences as a precious resource for researches, security professionals and policy methods searching to understand the concepts of Covert database and Covert *** system will be published in upcoming papers with flowcharts and use cases along with results and *** will be usi
the research article investigates the development of Vertical Gallium Arsenide (GaAs) Channel High Electron Mobility Transistor (HEMT) for Power applications in IC Technology. this specialized transistor, the Vertical...
详细信息
the integration of Synthetic Aperture Radar (SAR) and optical imagery through image fusion techniques is important in refining the accuracy and interpretability of images in remote sensing applications. the current ar...
详细信息
暂无评论