the proceedings contain 91 papers. the topics discussed include: toward active and passive confidentiality attacks on cryptocurrency off-chain networks;AMNESIA: a technical solution towards GDPR-compliant machine lear...
ISBN:
(纸本)9789897583995
the proceedings contain 91 papers. the topics discussed include: toward active and passive confidentiality attacks on cryptocurrency off-chain networks;AMNESIA: a technical solution towards GDPR-compliant machine learning;email spoofing attack detection through an end to end authorship attribution system;evaluating the effect of justification and confidence information on user perception of a privacy policy summarization tool;a homomorphic proxy re-authenticators based efficient multi-client non-interactive verifiable computation scheme;comparison of the Paillier and ElGamal cryptosystems for smart grid aggregation protocols;integration of data envelopment analysis in business process models: a novel approach to measure information security;and quantifying the significance of cybersecurity text through semantic similarity and named entity recognition.
In contemporary diagnostic workflows, medical image captioning has emerged as a pivotal advancement, combining deep learning methodologies and transformer architectures to enhance accuracy and efficiency in medical in...
详细信息
In this work, a frequency adaptable planar monopole antenna is designed for use in 5G communication systems. the proposed antenna is made up of two patches, a partial ground plane, and a 50-W microstrip feed line. the...
详细信息
the proceedings contain 13 papers. the special focus in this conference is on Algorithmic Aspects of Cloud computing. the topics include: Olive Leaf Infection Detection Using the Cloud-Edge Continuum;intent-Based...
ISBN:
(纸本)9783031493607
the proceedings contain 13 papers. the special focus in this conference is on Algorithmic Aspects of Cloud computing. the topics include: Olive Leaf Infection Detection Using the Cloud-Edge Continuum;intent-Based Allocation of Cloud computing Resources Using Q-Learning;a Double-Decision Reinforcement Learning Based Algorithm for Online Scheduling in Edge and Fog computing;real-Time Leakage Zone Detection in Water Distribution Networks: A Machine Learning-Based Stream Processing Algorithm;multi-agent Reinforcement Learning-Based Energy Orchestrator for Cyber-Physical systems;clustering-Based Numerosity Reduction for Cloud Workload Forecasting;planning Workflow Executions over the Edge-to-Cloud Continuum;decentralized algorithms for Efficient Energy Management over Cloud-Edge Infrastructures;i-Deliver P&D Engine: A Decentralized Middleware for a Delivery-as-a-Service System;preface;Application of Federated Learning Techniques for Arrhythmia Classification Using 12-Lead ECG Signals.
the emergence of 6G networks, characterized by ultra-low latency, high bandwidth, and dense device connectivity, demands robust and adaptive security mechanisms to counter sophisticated cyber threats. this paper prese...
详细信息
A brain tumor is an abnormal growth of cells in the brain that damage normal brain function. Now, it is the deadliest illness, brain tumors have a very low prognosis when they reach their greatest degree. Misdiagnosis...
详细信息
Image recognition technology has advanced to the point where it can help address challenges such as communication barriers faced by individuals with hearing impairments. Due to the societal rarity of learning and prac...
详细信息
Decision tree is one of the most popular classifiers in supervised learning to address classification tasks. It is easy to build and easy to understand. It is a divide-and-conquer algorithm and provides a clear path f...
详细信息
the proceedings contain 52 papers. the topics discussed include: application for rural internet access services logistics travel duration in Indonesia;remotely operated vehicle (ROV) robot for monitoring quality of wa...
ISBN:
(纸本)9781728175966
the proceedings contain 52 papers. the topics discussed include: application for rural internet access services logistics travel duration in Indonesia;remotely operated vehicle (ROV) robot for monitoring quality of water based on IoT;design of automatic under water robot system based on Mamdani fuzzy logic controller;CMA based blind equalization for GFDM systems;decision support system for determining inventory and sales of goods using economic order quantity methods and linear regression;fish feeding automation and aquaponics monitoring system base on IoT;and a heuristic algorithm for ring topology optimization.
the proceedings contain 29 papers. the special focus in this conference is on Software Engineering for Defence Applications. the topics include: Recruiting Software Developers a Survey of Current Russian Practices;com...
ISBN:
(纸本)9783030146863
the proceedings contain 29 papers. the special focus in this conference is on Software Engineering for Defence Applications. the topics include: Recruiting Software Developers a Survey of Current Russian Practices;comparison of Agile, Quasi-Agile and Traditional Methodologies;Innopolis Going Global: internationalization of a Young IT University;a Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks: Prevention and Prediction for Combating Terrorism;game theoretic Framework to Mutation Testing;a Survey on Code Analysis Tools for Software Maintenance Prediction;stance Prediction for Russian: Data and Analysis;Software Requirements Complexity Analysis to Support the “ADVISORY NETWORK IN TO thE NATION FORCES BUILD-UP”;hybrid Agile Software Development for Smart Farming Application;detection of Inconsistent Contracts through Modular Verification;evolving Diverse Cellular Automata Based Level Maps;balanced Map Generation Using Genetic algorithms in the Siphon Board-Game;distributed Composition of Highly-Collaborative Services and Sensors in Tactical Domains;Safety and Security in GNU/Linux Real Time Operating System Domain;mapping Event-B Machines into Eiffel Programming Language;a Tool-Supported Approach for Building the Architecture and Roadmap in MegaM@Rt2 Project;the Key Role of Memory in Next-Generation Embedded systems for Military Applications;vulnerabilities and Security Breaches in Cryptocurrencies;question-Answer Nets Objectifying a Conceptual Space in the Design of a System with Software;on the Time Performance of Automated Fixes;on the Parcellation of Functional Magnetic Resonance Images;Affordance theory Applied to Agile Development: A Case Study of LC2EVO;multi-level Security Approach on Weapon systems.
暂无评论