Lip reading is a technique that aims to understand spoken words by analyzing people's lip movements. Deep learning algorithms are used as a powerful tool for detecting and recognizing lip movements more accurately...
详细信息
In this study, a new generalized model of thermo-viscoelasticity with three phase-lag (TPL) theory concerning memory-dependent derivative (MDD) theory is emphasized. The governing combined equations of the novel model...
详细信息
This work is devoted to the determination of influence of the internal forces on the propagation of the waves in electromechanical systems. The task is simplified to an inverse problem for the third order hyperbolic e...
详细信息
ISBN:
(数字)9798350378627
ISBN:
(纸本)9798350378634
This work is devoted to the determination of influence of the internal forces on the propagation of the waves in electromechanical systems. The task is simplified to an inverse problem for the third order hyperbolic equation with the integral overdetermination condition and with the unknown function in the right-hand side of the equation. Some numerical results are presented for viscoelastic medium and for liquid like water with solid parameters. The presented method gives us opportunity to find the precise analytical solutions to the mathematical problems that simulate the wave propagation.
We have developed a visual programming tool called SmrAI for function testing, and investigated whether wrapping existing source code with Scratch Blocks is an effective means of mitigating the shortage of programming...
详细信息
The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation "financial technologies (FinTech)" around the globe. However, the security of FinTech syst...
详细信息
The fourth industrial revolution has seen the evolution and wide adoption of game-changing and disruptive innovation "financial technologies (FinTech)" around the globe. However, the security of FinTech systems and networks remains critical. This paper comprehensively reviews the evolving landscape of cybersecurity issues within the FinTech sector and explores effective mitigation measures. Four independent researchers reviewed relevant literature from IEEE Xplore Digital Library, ScienceDirect, Taylor & Francis, Emerald Insight, Springer, SAGE, Wiley Online Library, Hindawi, MDPI, ACM Digital Library, IGI Global, and Google Scholar. The research paper begins by examining the history and evolution of FinTech, drivers for the growth of FinTech, segments of the FinTech industry, FinTech ecosystem, FinTech business model, and FinTech application. Subsequently, it then delves into an analysis of the most pressing cybersecurity issues confronting FinTech firms, such as privacy concerns, data breaches, malware attacks, hacking, insider threats, identity theft, social engineering attacks, distributed denial-of-service attacks, and others. In response to these cybersecurity issues, the paper evaluates various mitigation strategies and best practices adopted by FinTech firms and regulatory bodies globally. These measures include technological solutions such as authentication and access control mechanisms, cryptography, big data analytics, intrusion detection/prevention systems, regular data backup, artificial intelligence and machine learning, cloud computing technologies, blockchain technologies, and fraud detection and prevention systems. The paper also emphasizes the importance of FinTech regulatory sandboxes, regulatory compliance, basic security training, continuous monitoring of threats, zero-trust policy, robust cybersecurity culture, regular testing, and stringent security policies to strengthen the FinTech ecosystem's cyber resilience. Based on empirical research, i
The quality of medical images is paramount. Being of high grade, it guarantees the quality of medical diagnosis, treatment and quality of patient’s life through the means of health care or using automate intelligent ...
详细信息
ISBN:
(纸本)9781665458429
The quality of medical images is paramount. Being of high grade, it guarantees the quality of medical diagnosis, treatment and quality of patient’s life through the means of health care or using automate intelligent systems for medical diagnosing, treatment and monitoring. The paper presents the computational challenges in medical images processing. The great challenges are to propose parallel computational models and parallel program implementations based on the algorithms for medical images filtering. Parallel computational model based on two-dimensional filters is designed. The proposed parallel model is verified by multithreaded parallel program implementation. An investigation of the efficiency of medical images filters based on parallel multithreaded program implementation, applying two-dimensional filters on a given list of compressed jpeg medical images and generating output jpeg images for each type of applied filter. The applied filters are Brightness Control, horizontal and vertical filter of Sobel, Laplace and Blur. A number of experiments have been carried out for the case of dataset consisted of 162 whole mount slide images of Breast Cancer (BCa) specimens scanned at 40x and various number of threads. Parallel performance parameters execution time and speedup are estimated experimentally. The performance estimation and scalability analyses show that the suggested model has good scalability.
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate method...
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate methods of balancing classes and to develop a classification method on imbalanced data to increase the level of network security. The methods used are: methods of artificial intelligence, machine learning. The following results were obtained: Class balancing methods based on Undersampling, Oversampling and their combinations were studied. The following methods were chosen for further research: SMOTEENN, SVMSMOTE, BorderlineSMOTE, ADASYN, SMOTE, KMeansSMOTE. The UNSW-NB 15 set was used as the source data, which contains information about the normal functioning of the network and during intrusions. A decision tree based on the CART (Classification And Regression Tree) algorithm was used as the basic classifier. According to the research results, it was found that the use of the SMOTEENN method provides an opportunity to improve the quality of detection of intrusions in the functioning of the network. Conclusions. The scientific novelty of the obtained results lies in the complex use of data balancing methods and the method of data classification based on decision trees to detect intrusions into computer networks, which made it possible to reduce the number of Type II errors.
A method for determining the probability of occurrence of a critical combination of events for the three-element minimum cross-sections of attributes of the characteristics of the software quality model of intelligent...
A method for determining the probability of occurrence of a critical combination of events for the three-element minimum cross-sections of attributes of the characteristics of the software quality model of intelligent decision support systems is proposed.
Heterogeneous IoT architectures are evolving rapidly and different challenged are faced with the traditional IoT architectures including the performance time of real-time IoT application. Parallel computing programmin...
详细信息
ISBN:
(数字)9798350349740
ISBN:
(纸本)9798350349757
Heterogeneous IoT architectures are evolving rapidly and different challenged are faced with the traditional IoT architectures including the performance time of real-time IoT application. Parallel computing programming technique could enhance the performance and efficiency for distributed systems and multicore processors as well as the IoT systems. However, parallel computing, presents certain difficulties and constraints, including synchronization, communication, security concerns, and load balancing. In this regard, a novel IoT workload balancing model for heterogeneous IoT architectures is presented in this paper. This model is intended to reduce the execution time of large systems by redistributing part of their functions to other involved IoT nodes. An experiment has been conducted to evaluate the actual real load for each IoT node and tried to rebalance the load using the proposed model. The results were encouraging as the performance time was reduced by about one third on two cores.
暂无评论