Hardware Trojan (HT) detection using test pattern generation is very difficult because HTs are intended to be activated by infrequent state of logic at internal circuit nodes. The functionality of these types of circu...
详细信息
Using the YOLO v8 model and deep learning approaches, this study explores the field of e-waste management and provides effective item detection. Our research attempts to increase the accuracy and scalability of e-wast...
详细信息
In recent years, there has been a persistent focus on developing systems that can automatically identify the hate speech content circulating on diverse social media platforms. This paper describes the team "Trans...
详细信息
The rapid expansion of cloud computing has led to increased energy consumption, raising concerns about its environmental impact. Despite advancements in scheduling algorithms, existing methods face critical challenges...
详细信息
Over the past years, researchers across the globe have made significant efforts to develop systems capable of identifying the presence of hate speech in different languages. This paper describes the team Transformers&...
详细信息
For autonomous driving to operate in a safe and effective manner, efficient and precise object detection is essential. The efficacy of the network model is heavily challenged because of the high-speed movement of vehi...
详细信息
This paper presents MACPGANA, a novel multimodal agriculture commodity price prediction model leveraging Generative Adversarial Networks (GAN) and Autoencoders (AEs). The model integrates multimodal data to extract an...
详细信息
Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services *** this system,Platform as a Service(PaaS)offers a medium headed for a web development plat...
详细信息
Cloud computing is the technology that is currently used to provide users with infrastructure,platform,and software services *** this system,Platform as a Service(PaaS)offers a medium headed for a web development platform that uniformly distributes the requests and *** using Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks abruptly interrupt these *** though several existing methods like signature-based,statistical anomaly-based,and stateful protocol analysis are available,they are not sufficient enough to get rid of Denial of service(DoS)and Distributed Denial of Service(DDoS)attacks and hence there is a great need for a definite *** this issue,we propose an improved hybrid algorithm which is a combination of Multivariate correlation analysis,Spearman coefficient,and mitigation *** can easily differentiate common traffic and attack *** only that,it greatly helps the network to distribute the resources only for authenticated *** effects of comparing with the normalized information have shown an extra encouraging detection accuracy of 99%for the numerous DoS attack as well as DDoS attacks.
Digital microfluidic biochip provides an alternative platform to synthesize the biochemical protocols. Droplet routing in biochemical synthesis involves moving multiple droplets across the biochip simultaneously. It i...
详细信息
Since the list update problem was applied to data compression as an effective encoding technique, numerous deterministic algorithms have been studied and analyzed. A powerful strategy, Move-to-Front (MTF), involves mo...
详细信息
暂无评论