Power electronics is an emerging and rapidly advancing technology within the realm of electrical engineering, finding wide-ranging applications in areas such as renewable energy, electric vehicles, and industrial auto...
详细信息
The rapid development of spatial transcriptomics (ST) has revolutionized the study of spatial heterogeneity and increased the demand for comprehensive methods to effectively characterize spatial domains. As a prerequi...
详细信息
This paper presents a comprehensive study on the application of Artificial Intelligence (AI) techniques for classifying the reasons behind an infant's cry. The aim of the study is to develop an effective model tha...
详细信息
While lower limb exoskeleton robots can realize assisted walking by extracting the user's motion intention, it is difficult to effectively obtain the motion intention of the human body and convert it into informat...
详细信息
In this study, our goal is to show the impact of self-supervised pre-training of transformers for organ at risk (OAR) and tumor segmentation as compared to costly fully-supervised learning. The proposed algorithm is c...
详细信息
In the context of the digital economy era, smart agriculture represents a crucial direction for agricultural modernization, with its core lying in the utilization of information technologies such as big data, cloud co...
详细信息
Scattering noise reduction is a challenging project to remove noise under scattering media conditions such as fog or turbid water. In previous study, blurring caused by scattering medium particles in fog or turbid wat...
详细信息
The aim of this undergraduate research paper is to investigate the use of continuous authentication with mobile touch dynamics, using three different algorithms: Neural Network, Extreme Gradient Boosting, and Support ...
详细信息
ISBN:
(纸本)9798350322972
The aim of this undergraduate research paper is to investigate the use of continuous authentication with mobile touch dynamics, using three different algorithms: Neural Network, Extreme Gradient Boosting, and Support Vector Machine. Something that is starting to occur in the modern day is the use of mobile devices rising steadily, and in today's world, the number of mobile phone subscriptions has surpassed 6 billion [1]. What we will be looking into is the touch dynamics of users and how their interactions on a device can be utilized for authentication and security. The term touch dynamics refers to patterns from an individual, these patterns being completely unique, on a mobile device via the touch screen. These interactions could be swipes, taps, the amount of pressure on the screen, and several more. The use of this type of data expands well into continuous authentication for security. Continuous authentication refers to monitoring and verifying a user's identity on a device continuously, rather than just a login or a one-time security feature [2]. For this research to have enough data for algorithms to utilize, we collected touch data from 40 participants, since this is seen to be a good starting point [3],[4], using the LG V30+. The way this data was collected was through each participant playing 4 different mobile games, Minecraft, ***, PUBG, and *** for 10 minutes each game. Since these games are high-action games that utilize two-finger input, it allowed us to gather a lot more data from everyone. Once the data was collected and cleaned, the three algorithms stated before were then trained and tested, and their performance was evaluated based on their Accuracy, F1 Score, False Negative Rate, and False Positive Rate. The results from each of these models show that they were able to accurately classify unique users with an accuracy ranging from 75% to 95%, very similar to [5]. The SVC and XGBoost algorithms performed slightly behind the Neural Netwo
This paper reports the lesson design of theory and technology of computer networks and information security, designed for the informatics course for non-CS major university students. The lesson unit consists of two le...
详细信息
ISBN:
(纸本)9781665453318
This paper reports the lesson design of theory and technology of computer networks and information security, designed for the informatics course for non-CS major university students. The lesson unit consists of two lessons applied by flipped learning style, in which students first watch on-demand video lectures to acquire basic knowledge of network theory and technology, then they do hands-on activities using some web tools that we developed to consolidate the knowledge. The questionnaire results after the CS0 course where the lesson design was applied suggested that the hands-on activity was effective in improving the understanding of network and security.
In current military and private spheres, the demand for exact localization within the home of mobile agents, especially small unmanned aircraft (UAVs), has attracted significant attention. This paper shows a new metho...
详细信息
暂无评论