In cloud computing, ensuring the high availability and reliability of data is dominant for efficient content delivery. Content replication across multiple clouds has emerged as a solution to achieve the above. However...
详细信息
Nowadays, the proliferation of open Internet of Things (IoT) devices has made IoT systems increasingly vulnerable to cyber attacks. It is of great practical significance to solve the security issues of IoT systems. Dr...
详细信息
Accurate prediction of above ground biomass (AGB) is critical for monitoring forest health and carbon cycling. It is crucial for understanding and managing forest ecosystems. In this paper, we propose an enhanced fram...
详细信息
Automated detection of plant diseases is crucial as it simplifies the task of monitoring large farms and identifies diseases at their early stages to mitigate further plant degradation. Besides the decline in plant he...
详细信息
This article introduces a novel approach to bolster the robustness of Deep Neural Network (DNN) models against adversarial attacks named "Targeted Adversarial Resilience Learning (TARL)". The initial ev...
详细信息
The purpose of this survey is to provide a comprehensive overview of recent advancements in text line segmentation and baseline detection techniques within the analysis of historical document images. Text line extract...
详细信息
This paper presents an analysis of computer networks courses offered by universities and colleges in the departments of computerscience, electrical engineering, or information science. The results are based on the in...
详细信息
This paper presents an analysis of computer networks courses offered by universities and colleges in the departments of computerscience, electrical engineering, or information science. The results are based on the information collected from course web sites from twenty-seven universities and colleges in computerscience, electrical engineering and information science departments, primarily within the United States. The data analyzed include the course titles, course structure, textbooks used, major topics and how they are covered, projects, and laboratory exercises, if any. We found that the courses can be divided into three categories: those that cover the general topics of computer networks using some practical examples, those that specifically discuss Internet protocols, and those that work through a set of programming projects after students have had a previous network course.
Aspect-based sentiment analysis is one of the famous and practical subjects in natural language processing. Traditional sentiment analysis assigns a polarity to the whole text or document and does not consider the asp...
详细信息
With the widespread global trend of voice phishing or vishing attacks, the development of effective detection models using artificial intelligence (AI) has been hindered by the lack of high-quality and large volumes o...
详细信息
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret...
详细信息
暂无评论