Whenever a shipped package crosses the border, logistic companies have to declare importer information for the clearance process. This information is not always provided by the customer, causing delays and additional ...
详细信息
Cyberattacks typically exploit software vulnerabilities to compromise computers and smart devices. To address vulnerabilities, many approaches have been developed to detect vulnerabilities using deep learning. However...
详细信息
With the development of modern information, the security of online videos content is receiving more and more *** work often ignores the correlation between different modalities. In order to solve the above problem, th...
详细信息
This paper aims to explore differences in hand motor capabilities with a focus for potential autistic intervention. In order to achieve that, a predefined drawing scenario is introduced with a metric of three complexi...
This paper aims to explore differences in hand motor capabilities with a focus for potential autistic intervention. In order to achieve that, a predefined drawing scenario is introduced with a metric of three complexity levels and predefined motion protocols. Then, a vision-based acquisition system for hand motor capability is proposed. It is evident that detecting differences in hand motor capabilities has a huge potential to detect hand motion difficulties in Autism. Hence, this study paves the way for the use of technology for early diagnosis and potential intervention in Autism.
The path planning of mobile robots is investigated to minimize energy loss in intelligent manufacturing. To achieve optimal energy consumption planning, this paper proposes a hybrid strategy that enhances the whale op...
详细信息
Differentiable architecture search (DARTS) method has gained noticeable popularity in neural architecture search (NAS) domain as it reduces the required search time compared to reinforcement learning and evolutionary ...
详细信息
This paper provides a comprehensive review of the significant literature in the area of user data security with a specific focus on how this integrates with the area of blockchain technologies and zero-knowledge proof...
This paper provides a comprehensive review of the significant literature in the area of user data security with a specific focus on how this integrates with the area of blockchain technologies and zero-knowledge proofs within the context of educational data storage. The overall objective of this review is to provide an in-sight into what has already been made available, with regards to implementation, and how these form an overall direction for the field. The purpose of which is to assist in the efforts to provide a solution that unifies the existing solutions and frameworks and provides real world benefits by targeting the highlighted research gaps.
Online advertisement is a key methodology to increase a company's RoI (Return on Investment). With the recent success of deep learning, many approaches generate target segments by predicting who will click the adv...
详细信息
Recently, mobile video service is booming and its traffic accounts for the vast majority of network traffic. The adaptive bitrate (ABR) algorithm in dynamic adaptive streaming over HTTP (DASH) is the key technology to...
详细信息
Aiming at the problem of slow processing efficiency of Apriori algorithm when the amount of data is large, the association rule algorithm is combined with hash link-table, and an improved association rule algorithm ba...
详细信息
暂无评论