This tutorial aims to introduce Event Graphs (EGs), invented 40 years ago by Lee Schruben to allow eventbased modeling of discrete dynamic systems. Their simplicity and naturalness in causality modelling and simulatio...
Cyberattacks are prevalent in the age of the Internet. Each year, both the quantity and severity of cybercrimes increase. Protection against cyber-attacks has become a primary responsibility, Significant in the intern...
Cyberattacks are prevalent in the age of the Internet. Each year, both the quantity and severity of cybercrimes increase. Protection against cyber-attacks has become a primary responsibility, Significant in the internet society of today. However, providing cyber security is a highly difficult task that requires experience in the field of attacks and the ability to evaluate the possibility of threats. The continual evolution of cyberattacks is the biggest challenge in this industry. This article describes the significance of cyber security and enumerates the hazards that exist in the present digital environment. The statistics and evaluation of cyberattacks demonstrate the seriousness of these occurrences. Several sorts of cyber security threats are outlined, along with the machine learning approaches that may be used to detect these attacks.
Keyword extraction is an effective method to extract keywords from a text which can express the main content of the text. However, it is difficult to extract useful information quickly from a large number of documents...
详细信息
We use fixed relays deployed by network operators to reduce re-transmission (thereby reducing network power requirements) in addition to providing excellent end-to-end error performance in a revisit to automatic repea...
详细信息
Laboratories are an integral part of Engineering education. In this post-pandemic era, there is an increased emphasis on distance learning and hybrid approaches, which demands novel teaching and learning approaches to...
Laboratories are an integral part of Engineering education. In this post-pandemic era, there is an increased emphasis on distance learning and hybrid approaches, which demands novel teaching and learning approaches to maintain the hands-on aspects of laboratory work. In this paper, different approaches for online laboratories are explored by encapsulating recent literature as well as the authors’ own experience in Electrical Engineering courses. Specific surveys are used to capture both student and staff perspectives and feedback on online learning approaches for laboratory classes. Recommendations are made based on student and staff experience with these approaches.
The aim of this paper is to study the possibility of improving the gamma/hadron discrimination in extensive air showers. For this purpose, the identification of hadronic extensive air showers is carried out by means o...
详细信息
Recent research on the Generated Adversarial Network models has made great progress in the task of generating images on human demand. Among them, Transparent Latent-space GAN tries to solve the problem by analyzing th...
Interactive evolutionary design (IED) systems, based on interactive evolutionary algorithm, have been the hot topic in both computer science and design recently. Due to the difference in both designer preferences and ...
详细信息
This one-day hybrid workshop builds on previous feminist CSCW workshops to explore feminist theoretical and methodological approaches that have provided us with useful tools to see things differently and make space fo...
详细信息
This paper presents the inventory management system based on IoT and microservices architecture that synced between IoT (Internet of Things) and web application. There are two main parts consisting of IoT forklift veh...
详细信息
This paper presents the inventory management system based on IoT and microservices architecture that synced between IoT (Internet of Things) and web application. There are two main parts consisting of IoT forklift vehicle and data transmitted system by MQTT protocol. Microservice can utilize data to process business logic and provides API. Inventory area includes a zone, a subzone and parking area for forklifts to scan QR code on each subzone. Data of forklifts is published to back-end service. The results of system microservice publish information events and processes business data to the admin client with a delay under a second.
暂无评论