the proceedings contain 97 papers. the topics discussed include: engineered devices to support stroke rehabilitation;a new challenge in ecological process control based on PLCs with Profinet communication protocol;Ric...
the proceedings contain 97 papers. the topics discussed include: engineered devices to support stroke rehabilitation;a new challenge in ecological process control based on PLCs with Profinet communication protocol;Richardson's method of segment counting versus boxcounting;box-count analysis of two dimensional images: methodology, analysis and classification;a device to measure the geophysical and hydrophysical parameters;an effective tool for the tropical cyclones monitoring;preliminary results for automatic detection of arteriovenous malformations from medical images;group greedy RLS sparsity estimation via information theoretic criteria;Bayesian networks applications in the reliability of software systems for monitoring electrical substations;characterization of tumor angiogenesis using fractal measures;fractal like kinetics and preconditioning;quaternary crack-edge representation for lossless contour compression;and a modified stochastic simulation algorithm for time-dependent intensity rates.
Smart water management imposes higher demands on the real-time capabilities and intelligence of watershed information monitoring systems. therefore, we propose an intelligent voice broadcast system for monitoring wate...
详细信息
Expert systems (ES) rely heavily on effective control mechanisms to navigate complex problem-solving tasks. these mechanisms govern how ES utilizes knowledge and data to make decisions and execute actions. Optimizing ...
详细信息
the volume of network traffic is ever-increasing, hence making DDoS attacks serious threats to the integrity of network security. this research paper focuses on improving the accuracy of detecting DDoS attacks using t...
详细信息
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823480
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-Based Cryptographic Protocols for three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-Based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for the Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script;Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial controlsystems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy o...
ISBN:
(纸本)9783031823619
the proceedings contain 33 papers. the special focus in this conference is on Data Privacy Management. the topics include: reteLLMe: Design Rules for Using Large Language Models to Protect the Privacy of Individuals in their Textual Contributions;plausible Deniability of Redacted Text;exploring Distribution Learning of Synthetic Data Generators for Manifolds;HEDAS: Secure and Efficient Distributed OLAP Using Fully Homomorphic Encryption;card-Based Cryptographic Protocols for three-Input Functions with a Standard Deck of Cards Using Private Operations;grid-Based Decompositions for Spatial Data Under Local Differential Privacy;balancing Privacy and Utility in Multivariate Time-Series Classification;dynamic k-Anonymity for Electronic Health Records: A Topological Framework;Using Static Code Analysis for GDPR Compliance Checks;privacy-Preserving Tabular Data Generation: Systematic Literature Review;A DPIA Repository for Interdisciplinary Data Protection Research;secrecy and Sensitivity: Privacy-Performance Trade-Offs in Encrypted Traffic Classification;route Discovery in Private Payment Channel Networks;A Comparative Study of Rust Smart Contract SDKs for Application-Specific Blockchains;offchain Runtime Verification (for the Tezos Blockchain);quantifying Liveness and Safety of Avalanche’s Snowball;We Will DAG You;assessing the Impact of Sanctions in the Crypto Ecosystem: Effective Measures or Ineffective Deterrents?;Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script;Homomorphic Encryption Based ECDSA Generation Over Five Party Protocol;benchmarking Post-quantum Cryptography in Ethereum-Based Blockchains;exploring Anomaly Detection for Marine Radar systems;hunting Vulnerabilities in the Maritime Domain: A Domain Wide Cybersecurity Vulnerability Analysis;threat Modeling in Satellite Communications for Maritime Operations;cybersecurity Challenges in Industrial controlsystems: An Interview Study with Asset Owners in Norway;usage of Cybersecurity Standards
the proceedings contain 18 papers. the special focus in this conference is on Artificial Intelligence: Methodology, systems, and Applications. the topics include: Cross-Lingual Style Transfer TTS for High-Quality...
ISBN:
(纸本)9783031815416
the proceedings contain 18 papers. the special focus in this conference is on Artificial Intelligence: Methodology, systems, and Applications. the topics include: Cross-Lingual Style Transfer TTS for High-Quality Machine Dubbing;an Approach to Discovering, Tracking Over Time, and Summarizing Publicly Available Information on a Given Topic;reinforcement Learning control of Cart Pole System with Spike Timing Neural Network Actor-Critic Architecture;Predictive and Explainable Modelling in Economics on the Case Study of Remittance Prediction Using the NeuDen AI Computational Architecture;deep Learning for Multi-class Diagnosis of thyroid Disorders Using Selective Features;Advanced CNN-SVM Machine Learning Techniques for Facial Skin Ultrasound Image Analysis;Testing the NEAT Algorithm on a PSPACE-Complete Problem;investigating the Regularization of Deep Neural Networks for Affect Recognition with Relevance-Guided Local Explanations;Layered Data-Centric AI to Streamline Data Quality Practices for Enhanced Automation;Combining Graph NN and LLM for Improved Text-Based Emotion Recognition;a Novel Study on Modelling and Adaptive Optimal control of a Tubular Reactor Based on Gaussian Processes;converging Dimensions: Information Extraction and Summarization through Multisource, Multimodal, and Multilingual Fusion;enhancing Question Answering in Lecture Videos with a Multimodal Retrieval-Augmented Generation Framework;agent-Based Simulation Leveraging Declarative Modeling for Efficient Resource Allocation in Emergency Scenarios;enhancing Security in Federated Learning: Detection of Synchronized Data Poisoning Attacks;Clinical and Acquisition Data for Optimizing MGMT Methylation Status Prediction: A Comprehensive Ensemble Strategy Emphasizing Non-invasive Approaches.
In this work, we address the computational challenges in personal audio systems implemented within a room environment, which typically operate under a multi-input multi-output (MIMO) framework. Traditional control alg...
详细信息
ISBN:
(纸本)9789819610440;9789819610457
In this work, we address the computational challenges in personal audio systems implemented within a room environment, which typically operate under a multi-input multi-output (MIMO) framework. Traditional control algorithms require long control filters to prevent performance degradation, substantially increasing the computational load due to matrix inversion and overall system complexity. We introduce a novel approach utilizing second-order Kronecker product decomposition, where the loudspeaker control filter is expressed as the Kronecker product of two shorter sub-filters. this method effectively reduces the matrix dimensions required for a single filter, significantly lowering computational complexity compared to traditional time-domain techniques. An iterative filter design is then employed to closely approximate the globally optimal solution. Simulation results demonstrate that our method achieves performance comparable to that of the conventional algorithm while significantly reducing computational demands.
this paper presents cybersecurity challenges related to industrial controlsystems (ICSs), identified through interviews with ICS asset owners. We interviewed participants from 10 companies within the oil and gas, foo...
详细信息
this research investigates the use of deep learning for automatic waste classification, specifically using ResNet50 for feature extraction and combining it with various classification algorithms. the dataset comprises...
详细信息
暂无评论