Big social data analysis has played an important role in understanding learners’ preferences in Massive Open Online Courses (MOOCs). This study investigates learners’ satisfaction with MOOCs using big social data an...
详细信息
Sri Lanka faces drinking water related issues often due to many reasons like weather changes, floods, droughts, and tsunamis, affecting the drinking water availability. In such instances, people find difficult to gath...
详细信息
Challenge-response mechanisms have become widely adopted as a means of user verification. In this process, users are required to provide a set of challenge questions, with their actual answers serving as a means to au...
Challenge-response mechanisms have become widely adopted as a means of user verification. In this process, users are required to provide a set of challenge questions, with their actual answers serving as a means to authenticate the user’s identity. Despite the widespread usability of challenge-response as an authentication mechanism, it remains vulnerable to evasion by attackers who can employ social engineering tactics or gather information to guess or steal the necessary credentials. To address this inherent challenge, this paper presents a novel technique for dynamically generating challenge-response questions based on authentic historical interactions, such as daily communication via email or messaging platforms. We developed deep learning models, utilizing language models such as BERT, and employed semantic analysis to extract and validate highly usable challenge-response questions. These questions are designed to be easily answerable by legitimate users while presenting an unpredictable challenge to potential attackers. As an effective use case demonstration for our proposed system, we developed an email sender verification system capable of real-time identification of suspicious email senders. This system prompts the senders with carefully crafted challenge questions based on previous email exchanges with authentic users, enabling the identification of advanced spear-phishing emails that would otherwise remain undetected. We evaluated the effectiveness of our system, named VeriActor, through the use of annotated datasets and a user study. The experimental results exhibited promising outcomes, with a verification accuracy of 87.8% and a protection accuracy of 83.33%.
The development of novel therapeutic approaches that target gene alterations in melanoma cells remains an area of active research. This study prioritized ten genes out of 76 genes - associated with melanoma through a ...
The development of novel therapeutic approaches that target gene alterations in melanoma cells remains an area of active research. This study prioritized ten genes out of 76 genes - associated with melanoma through a transcriptome-wide association study (TWAS). We investigated the potential of the identified ten genes in prognosis of metastasis in melanoma *** Relevance: Our findings have clinical implications for melanoma treatment strategies. Targeted therapies that specifically address the dysregulation of our 10 genes may hold promise in preventing or slowing melanoma metastasis.
The uptake of personalised approaches in education apart from students' learning needs should also involve teachers' needs. This paper addresses the understudied topic of integrating a Recommender System (RS) ...
详细信息
Federated learning (FL) is a classic paradigm of 6G edge intelligence (EI), which alleviates privacy leaks and high communication pressure caused by traditional centralized data processing in the artificial intelligen...
详细信息
As rain streaks hinder feature extraction based on image gradients, the performance of computer vision algorithms such as pedestrian detection and lane detection can be negatively affected. Image deraining is an essen...
详细信息
The incorporation of UAVs in 5G and envisioned 6G wireless communication systems is considered for many applications and use-cases, either as part of the infrastructure, providing coverage and connectivity (e.g., duri...
详细信息
ISBN:
(数字)9789082797091
ISBN:
(纸本)9781665467995
The incorporation of UAVs in 5G and envisioned 6G wireless communication systems is considered for many applications and use-cases, either as part of the infrastructure, providing coverage and connectivity (e.g., during unforeseen and rare events) or as an end-user, e.g., in remote sensing, real-time monitoring and surveillance, to name a few. From the perspective of the physical layer and the involved signal processing algorithms, the transmission environment between the UAVs and the ground communication devices, along with the utilisation of massive MIMO in the mmWave spectrum, require new channel estimation algorithms to support the required physical layer functionality. In this paper, the problem of channel estimation in a multi-user, UAV-based mmWave massive MIMO system is considered in view of the so-called beam squint effect as well as the time-varying nature of the involved channels due to mobility. The proposed approach takes advantage of the low-rank channel matrix and solves a minimisation problem via ADMM, leading to a low complexity, iterative algorithm. The performance of the proposed algorithm is evaluated via simulations and its efficacy is demonstrated over other algorithms from the relevant literature.
In this paper, we present an Integrated Sensing and Communications (ISAC) system enabled by in-band Full Duplex (FD) radios, where a massive Multiple-Input Multiple-Output (MIMO) base station equipped with hybrid Anal...
详细信息
QLC (4-bit-per-cell) and more-bit-per-cell 3D NAND flash memories are increasingly adopted in large storage systems. While achieving significant cost reduction, these memories face degraded performance and reliability...
详细信息
QLC (4-bit-per-cell) and more-bit-per-cell 3D NAND flash memories are increasingly adopted in large storage systems. While achieving significant cost reduction, these memories face degraded performance and reliability issues. The industry has adopted two-step programming (TSP), rather than one-step programming, to perform fine-granularity program control and choose gray-code encoding, as well as LDPC (Low-Density Parity-Check Code) for error correction. Different flash manufacturers often integrate different gray-codes in their products, which exhibit different performance and reliability characteristics. Unfortunately, a fixed gray-code encoding design lacks the ability to meet the dynamic read and program performance requirements at both application and device *** this paper, we propose MGC, a multiple-gray-code encoding strategy, that adaptively chooses the best gray-code to meet the optimization goals at runtime. In particular, MGC first extracts the performance and reliability requirements based on application-level access patterns and detects the reliability degree of SSD. It then determines the appropriate gray-code to encode the data, either from host/user application or due to garbage collection, before writing the pages to the flash memory. MGC is integrated in FTL (flash translation layer) and enhances the flash controller to enable runtime gray-code arbitration. We evaluate the proposed MGC scheme. The results show that MGC achieves better performance and lifetime guarantee compared with state-of-the-arts and introduces little overhead.
暂无评论