We applied Deep Learning algorithm known as Generative Adversarial Networks (GANs) to perform solar image-to-image translation. That is, from Solar Dynamics Observatory (SDO)/Helioseismic and Magnetic Imager (HMI) lin...
详细信息
Nowadays, smartphones are used for various activities, including checking emails, paying bills, and playing games, which have become essential parts of daily life. Also, IoT devices can be managed and controlled using...
详细信息
Nowadays, smartphones are used for various activities, including checking emails, paying bills, and playing games, which have become essential parts of daily life. Also, IoT devices can be managed and controlled using applications. While applications can provide numerous benefits, they have also led to several security risks, such as theft of data, eavesdropping, compromised data, and denial-of-service attacks. This study examines security breaches, attacks targeting Android system applications, and vulnerabilities present at every layer of the Android architecture. Additionally, the study aims to compare and evaluate various treatment methods to identify their advantages and disadvantages. Furthermore, the study aims to examine Android's architecture for weaknesses that might lead to app vulnerabilities and potential attacks. To achieve the objectives of this study, a comprehensive analysis of security breaches and attacks targeting Android system applications will be conducted. Various treatment methods will be compared and evaluated through rigorous examination. Additionally, Android's architecture will be thoroughly examined to identify potential weaknesses and vulnerabilities. The analysis will focus on identifying the security risks associated with the use of applications on smartphones and IoT devices. The vulnerabilities present at every layer of the Android architecture will also be analyzed. Furthermore, the advantages and disadvantages of various treatment methods will be assessed. The findings of this study will reveal the various security risks, vulnerabilities, and potential weaknesses present in Android system applications and the Android architecture. The advantages and disadvantages of different treatment methods will also be highlighted. This study contributes to the development of more precise and robust security measures for Android, aiming to mitigate security breaches, attacks, and vulnerabilities. By identifying weaknesses and vulnerabilities,
With the increasing digitization and modernization of enterprise management, employee fingerprint identification management systems have become a key tool to ensure the safety and efficiency of the office space. Such ...
详细信息
With the increasing dimensionality of the data,High-dimensional Feature Selection(HFS)becomes an increasingly dif-ficult *** is not simple to find the best subset of features due to the breadth of the search space and...
详细信息
With the increasing dimensionality of the data,High-dimensional Feature Selection(HFS)becomes an increasingly dif-ficult *** is not simple to find the best subset of features due to the breadth of the search space and the intricacy of the interactions between *** of the Feature Selection(FS)approaches now in use for these problems perform sig-nificantly less well when faced with such intricate situations involving high-dimensional search *** is demonstrated that meta-heuristic algorithms can provide sub-optimal results in an acceptable amount of *** paper presents a new binary Boosted version of the Spider Wasp Optimizer(BSWO)called Binary Boosted SWO(BBSWO),which combines a number of successful and promising strategies,in order to deal with *** shortcomings of the original BSWO,including early convergence,settling into local optimums,limited exploration and exploitation,and lack of population diversity,were addressed by the proposal of this new variant of *** concept of chaos optimization is introduced in BSWO,where initialization is consistently produced by utilizing the properties of sine chaos mapping.A new convergence parameter was then incorporated into BSWO to achieve a promising balance between exploration and *** exploration mechanisms were then applied in conjunction with several exploitation strategies to effectively enrich the search process of BSWO within the search ***,quantum-based optimization was added to enhance the diversity of the search agents in *** proposed BBSWO not only offers the most suitable subset of features located,but it also lessens the data's redundancy *** was evaluated using the k-Nearest Neighbor(k-NN)classifier on 23 HFS problems from the biomedical domain taken from the UCI *** results were compared with those of traditional BSWO and other well-known meta-heuristics-based *** findings indicate that,in comparison to other competing techn
In the contemporary era,driverless vehicles are a reality due to the proliferation of distributed technologies,sensing technologies,and Machine to Machine(M2M)***,the emergence of deep learning techniques provides mor...
详细信息
In the contemporary era,driverless vehicles are a reality due to the proliferation of distributed technologies,sensing technologies,and Machine to Machine(M2M)***,the emergence of deep learning techniques provides more scope in controlling and making such vehicles energy *** existing methods,it is understood that there have been many approaches found to automate safe driving in autonomous and electric vehicles and also their energy ***,the models focus on different aspects *** is need for a comprehensive framework that exploits multiple deep learning models in order to have better control using Artificial Intelligence(AI)on autonomous driving and energy *** this end,we propose an AI-based framework for autonomous electric vehicles with multi-model learning and decision *** focuses on both safe driving in highway scenarios and energy *** deep learning based framework is realized with many models used for localization,path planning at high level,path planning at low level,reinforcement learning,transfer learning,power control,and speed *** reinforcement learning,state-action-feedback play important role in decision *** simulation implementation reveals that the efficiency of the AI-based approach towards safe driving of autonomous electric vehicle gives better performance than that of the normal electric vehicles.
With the rapid development of web technology,Social Networks(SNs)have become one of the most popular platforms for users to exchange views and to express their *** and more people are used to commenting on a certain h...
详细信息
With the rapid development of web technology,Social Networks(SNs)have become one of the most popular platforms for users to exchange views and to express their *** and more people are used to commenting on a certain hot spot in SNs,resulting in a large amount of texts containing *** Emotion Cause Extraction(TECE)aims to automatically extract causes for a certain emotion in texts,which is an important research issue in natural language *** is different from the previous tasks of emotion recognition and emotion *** addition,it is not limited to the shallow-level emotion classification of text,but to trace the emotion *** this paper,we provide a survey for ***,we introduce the development process and classification of ***,we discuss the existing methods and key factors for ***,we enumerate the challenges and developing trend for TECE.
We consider the problem of allocating m indivisible chores to n agents with additive disvaluation (cost) functions. It is easy to show that there are picking sequences that give every agent (that uses the greedy picki...
详细信息
Inevitable technological progress changes the very nature of work. On the one hand, more and more processes are subject to automation, and cooperating with a robotic workforce becomes an increasing challenge. On the o...
详细信息
This research discusses the advancements in developing smart skin by employing Force Sensitive Resistor (FSR). The objective of this research is to advance research on the fundamental concept of artificial skin that r...
详细信息
5G will support transparent multi-path connectivity for mobile users through the Access Traffic Steering, Switching and Splitting function. For real-time traffic, this can be implemented by a multi-path proxy that imp...
详细信息
暂无评论