According to the requirements of UN/WP.29 R156, the management system and vehicle technology requirements for vehicle manufacturers to use RX software identification number are put forward. In order to meet the compli...
详细信息
Phishing attacks pose serious challenges to users, commercial institutions and governments alike including identity theft, companies and government secrets. The weakest link in any computer security system is the peop...
详细信息
ISBN:
(纸本)9798350326970
Phishing attacks pose serious challenges to users, commercial institutions and governments alike including identity theft, companies and government secrets. The weakest link in any computer security system is the people and the success of phishing attacks is substantially based on manipulating human emotions. Therefore, we cannot solely rely on humans to detect phishing attacks as phishing attacks are becoming more and more sophisticated and can bypass filters set by anti-phishing techniques. More effective and automatic phishing detection mechanisms are required and many detectors have been proposed. However, the high number of phishing emails and attacks urges additional efforts. In this study, the effectiveness of word embedding in classifying phishing emails is investigated. Pre-trained transformer model BERT (Bidirectional Encoder Representations from Transformers) is fine-tuned to execute the task of classifying emails into phishing and non-phishing. The results show that transformer technology is accurate enough to improve phishing emails detection and can complement existing classifiers.
Anomaly detection in video surveillance systems is an eminently vital field due to the widespread utility of the method, ranging from public security to monetary safety. Numerous architectures can be used for detectio...
详细信息
Modeling from the perspectives of softwareengineering and systems engineering have co-evolved over the last two decades as orthogonal approaches. Given the central role of software in modern cyber-physical systems an...
详细信息
ISBN:
(纸本)9798350358810;9798350358803
Modeling from the perspectives of softwareengineering and systems engineering have co-evolved over the last two decades as orthogonal approaches. Given the central role of software in modern cyber-physical systems and the increasing adoption of digital engineering practices in complex systems design, there is now significant opportunity for collaborative design among system users, software developers, and systems engineers. Model-based systems engineering (MBSE) and systems modeling languages can support seamless cross-domain connectivity for design, simulation, and analysis of emerging technologies such as Augmented Reality (AR). This paper presents a co-design process for extending the capability of an existing AR application referred to as a No-Code AR Systems (NCARS) framework. NCARS enables content developed by multi-domain authors to be deployed on AR devices through a software layer that bridges the content to the game engine that drives the AR system. Utilizing a software dependency diagram of the AR Annotation function, an existing MBSE model of the AR system is extended to include the structure and behavior of relevant software components. This allows a modular design of the system to address needs in integrating new requirements into the existing application. New user requirements for tracking items in motion in the user's physical environment with virtual annotations in the augmented space are collaboratively designed and visualized through use case, block definition, internal block, and sequence diagrams. They capture the required structure and behavior of the proposed to-be system.
Municipal buildings are major energy consumers in urban areas, contributing significantly to greenhouse gas emissions and climate change. Understanding and predicting their energy consumption patterns is crucial for i...
详细信息
Universities are increasingly integrating real-world projects into softwareengineering curricula to prepare students for careers involving complex concepts like Microservices Architecture (MSA). Students frequently s...
详细信息
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic sta...
详细信息
The sorting system is the core of the tobacco logistics distribution center, the current distribution center cigarette sorting volume is large, and different order sorting orders have a greater impact on the total pro...
详细信息
Unit testing is a crucial quality assurance activity within the computersoftware development process. The efficacy of unit testing significantly impacts the final quality of software products. However, given the rapi...
详细信息
Majority of modern-day industries operate with the help of computer applications which contain hardware and software parts. software programs are extremely important and developing them can be quite challenging. Creat...
详细信息
暂无评论