Numerous nations have prioritised the inclusion of citizens with disabilities, such as hearing loss, in all aspects of social life. Sign language is used by this population, yet they still have trouble communicating w...
详细信息
Pilot-operated solenoid valves have the advantage of fast response times and can meet high pressure and large diameter requirements through their structural characteristics, making them widely used in various fields. ...
详细信息
We study a boundary value problem for a Caputo-type fractional differential equation subjected to periodic boundary conditions. For an auxiliary problem with the simplified right-hand side, we explicitly construct its...
详细信息
The Dirac equation plays an essential role in the relativistic quantum systems, which is reduced to a form similar to Schrodinger equation when a certain potential’s type is selected as the Cornell potential. By choo...
详细信息
Until a ransom is paid, ransomware, a crypto virology virus, tries to disclose or constantly restrict access to the accused's confidential information. While simple ransomware may merely lock the computer without ...
详细信息
ISBN:
(数字)9798350394962
ISBN:
(纸本)9798350394979
Until a ransom is paid, ransomware, a crypto virology virus, tries to disclose or constantly restrict access to the accused's confidential information. While simple ransomware may merely lock the computer without deleting any files, more sophisticated viruses employ a strategy called crypto viral blackmail. Files belonging to the victim are encrypted, rendering them unavailable, and a ransom demand is made to unlock them. Data belonging to the user is encrypted, making it illegible, and a ransom is demanded to open them. The characteristics of ransomware, its functionality, and its variations are addressed in this study. A thorough literature study is conducted to identify the research areas, defence mechanisms against ransomware assaults, and potential future applications of the prior studies in this field.
This paper focuses on developing a framework for uncovering insights about NDD children’s performance (e.g., raw gaze cluster analysis, duration analysis & area of interest for sustained attention, stimuli expect...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
This paper focuses on developing a framework for uncovering insights about NDD children’s performance (e.g., raw gaze cluster analysis, duration analysis & area of interest for sustained attention, stimuli expectancy, loss of focus/motivation, inhibitory control) and informing their teachers. The hypothesis behind this work is that self-adaptation of games can contribute to improving students’ well-being and performance by suggesting personalized activities (e.g., highlighting stimuli to increase attention or choosing a difficulty level that matches students’ abilities). The aim is to examine how AI can be used to help solve this problem. The results would not only contribute to a better understanding of the problems of NDD children and their teachers but also help psychologists to validate the results against their clinical knowledge, improve communication with patients and identify areas for further investigation, e.g., by explaining the decision made and preserving the children’s private data in the learning process.
Wind energy has emerged as one of the most vital and economically viable forms of renewable energy. The integration of wind energy sources into power grids across the globe has been increasing substantially, largely d...
详细信息
Publishing big data and making it accessible to researchers is important for knowledge building as it helps in applying highly efficient methods to plan,conduct,and assess scientific ***,publishing and processing big ...
详细信息
Publishing big data and making it accessible to researchers is important for knowledge building as it helps in applying highly efficient methods to plan,conduct,and assess scientific ***,publishing and processing big data poses a privacy concern related to protecting individuals’sensitive information while maintaining the usability of the published *** anonymization methods,such as slicing and merging,have been designed as solutions to the privacy concerns for publishing big ***,the major drawback of merging and slicing is the random permutation procedure,which does not always guarantee complete protection against attribute or membership ***,merging procedures may generatemany fake tuples,leading to a loss of data utility and subsequent erroneous knowledge *** study therefore proposes a slicingbased enhanced method for privacy-preserving big data publishing while maintaining the data *** particular,the proposed method distributes the data into horizontal and vertical *** lower and upper protection levels are then used to identify the unique and identical attributes’*** unique and identical attributes are swapped to ensure the published big data is protected from disclosure *** outcome of the experiments demonstrates that the proposed method could maintain data utility and provide stronger privacy preservation.
Message Service (SMS) Spam is one form of mobile device attack that can affect mobile user's security and privacy. This study developed a Malay SMS Spam detection framework specifically for Malay language. The pap...
详细信息
暂无评论