As software versions are developed iteratively, we are always faced with the necessity to migrate code that depends on one or more modules from an older version to a newer one. This article introduces ideas of automat...
详细信息
As software versions are developed iteratively, we are always faced with the necessity to migrate code that depends on one or more modules from an older version to a newer one. This article introduces ideas of automatic source code migration based on a theory of nodes operations to compiled AST using Typescript and the Jasmine Testing Framework as an example.
The progress of the time promotes the gradual development of Internet applications, which is particularly important for the safety protection of computerdata. On such basis, it is required to make effective settings ...
详细信息
Convergence rate is greatly improved by using the new waveform relaxation (WR) methods, known as optimized waveform relaxation (OWR) algorithms, over the classical ones due to the new transmission conditions that exch...
详细信息
ISBN:
(纸本)9781665495523
Convergence rate is greatly improved by using the new waveform relaxation (WR) methods, known as optimized waveform relaxation (OWR) algorithms, over the classical ones due to the new transmission conditions that exchange more information between subsystems when solving in parallel using multi processors. The new transmission conditions include a free parameter whose value should be chosen in an appropriate way in order to get the best convergence result. In all previous work on OWR for transmission line type circuits, the analysis for finding such value of the free parameter was performed at the continuous level in which any impact of the temporal discretization is neglected. However, it is more realistic to perform the analysis at the discrete level for real computations in a computer when solving time dependant problems. Therefore, choosing transmission line type circuits as our model problem, we perform in this paper the analysis for finding the value of the free parameter appears in the transmission conditions at the discrete level and we study the resulting convergence behavior of the discrete OWR algorithm. We focus on revealing the influence of the time discretization parameter Delta t on the convergence rate of the OWR algorithm.
Differentiating child and adult images is a crucial requirement for many applications. This paper proposes an approach using a Convolutional Neural Network (CNN) model to distinguish between children's images from...
详细信息
ISBN:
(纸本)9781665495523
Differentiating child and adult images is a crucial requirement for many applications. This paper proposes an approach using a Convolutional Neural Network (CNN) model to distinguish between children's images from adults. In contrast to predetermined face landmarks, the suggested approach learns complex face features and achieves 85% accuracy regardless of variation in age, gender, race, or ethnicity. The approach could be used to leverage the performance of digital image forensic, security control and, surveillance monitoring, and robotics.
The network topology is constantly changing in the Internet of Vehicles (IoV), and the frequent disconnection and connection of nodes in the network affect the successful transmission of data. To separate data from th...
详细信息
With the constant increase in forest fires and the huge losses being experienced because of fire, having the information about a fire starting at the earliest has become a necessity. To cater to this, we have research...
详细信息
With the constant increase in forest fires and the huge losses being experienced because of fire, having the information about a fire starting at the earliest has become a necessity. To cater to this, we have researched and created a system that detects fire and smoke in outdoor and indoor environments using faster RCNN. We have received lesser false positives when compared to fire detection done using color space analysis.
In today's tech-driven landscape, cybersecurity stands out as a pivotal and focal point. This research paper provides an overview of the cybersecurity landscape in Fiji, focusing on the popularity of cyber-related...
In today's tech-driven landscape, cybersecurity stands out as a pivotal and focal point. This research paper provides an overview of the cybersecurity landscape in Fiji, focusing on the popularity of cyber-related crimes and the need for ethical behavior during online presence. It discusses various types of cyber-attacks, including digital scams, forgery and fraud, and cyberbullying, and acmes importance of confidentiality, integrity, and availability in maintaining a secure online environment. The research also discusses the laws and regulations of cyber security in Fiji and emphasizes the need for new mechanisms and improvements in the regulatory framework to support technological advancements. The research methodology utilized various data collection methods, including analyzing court cases, media articles, and relevant Acts, to address key research questions. The paper concludes by emphasizing the significance of pursuing ethical norms and behaviors to mitigate cyber-related crimes.
The chemical mixing plant could be automated using supervisory control and data acquisition (SCADA) technique. The SCADA system contains a central control unit, a remote terminal unit, and a communication medium. The ...
The chemical mixing plant could be automated using supervisory control and data acquisition (SCADA) technique. The SCADA system contains a central control unit, a remote terminal unit, and a communication medium. The chemical mixing plant operator may use the central control unit to automate the operations of the chemical mixing plant. The field devices of the chemical mixing plant are connected with the remote terminal unit. Ethernet, Profinet, or WAN network could be used to establish the communication medium between the central control unit and the remote terminal unit. The central control unit acts as the server and the remote terminal unit act as the client. The simple server-client communication system is used to exchange the messages between the central control unit and remote terminal unit. The communication medium uses Genesys protocol to exchange the messages between the central control unit and the remote terminal unit.
Information security effectiveness has become the focus of organizations whether they manage their own information, or rely on providers. The research literature suggests that organizational characteristics have a sig...
Information security effectiveness has become the focus of organizations whether they manage their own information, or rely on providers. The research literature suggests that organizational characteristics have a significant, positive effect on information security [1]–[4]. This paper examines the impact of organizational characteristics, specifically, the size of the organization, culture, IT budget, frequency of reported IT audits, and executive support, on the effectiveness of information security processes at higher educational institutions (HEI.) Nine information governance processes used in this study include communication of information security roles, the protection of sensitive data, and business agreement audits. Findings suggest that organizational culture, frequency of reported audits, and executive-level support positively influence information effectiveness, but the size of institutions and level of IT budget did not show any significant effect.
With the development of Internet technology, the rapid growth of data volume strongly promotes the construction of data centers, which also makes the security threats to data centers more and more serious. The archite...
详细信息
暂无评论