In modern era, data has become precious and important, data leak can lead to high damage to business, impact on losing profit. To avoiding those problems, organization need equip with updated security tools to protect...
ISBN:
(纸本)9781538684030
In modern era, data has become precious and important, data leak can lead to high damage to business, impact on losing profit. To avoiding those problems, organization need equip with updated security tools to protecting data and network. As computer network growing rapidly, currently security become important to prevent from attack, both from outside and inside the network. In line with that, new vulnerability grown on everyday basis and resulting increment number of intrusion and attack. Unfortunately, each intrusion and attack have a different pattern and unique behavior, continuous development and research on intrusion detection is mandatory. By statistic, in 2017 attack associated with XSS attack is grew 39% compared with 2015.
The use of the MathML language made possible to improve the accessibility of mathematics for blind or low-vision persons in digital media. Synthetic speech technologies have advanced significantly using MathML, howeve...
详细信息
ISBN:
(纸本)9781450389372
The use of the MathML language made possible to improve the accessibility of mathematics for blind or low-vision persons in digital media. Synthetic speech technologies have advanced significantly using MathML, however, the speech synthesizers' standard reading style is still not suitable for mathematics. Making mathematical reading of the speech synthesizers more natural and expressive is still a challenge. The creation of models to produce the appropriate prosody in the synthesized speech of math content is therefore necessary, as shown in previous research. This article presents a proposal for a model to improve prosody in the synthesized speech of mathematical expressions based on MathML. A corpus of mathematical expressions spoken by Mathematics teachers was created to support the model's development. The Fujisaki intonation model was adopted for intonation control, accent and phrase commands have been extracted from the corpus, and some adjustments have been made to manipulate prosodic parameters in the speech of mathematical expression in correlation with the MathML tree; additionally, a pattern of pauses control is being created.
Proton beam therapy is an advanced form of cancer radiotherapy that uses high-energy proton beams to deliver precise and targeted radiation to tumors. This helps to mit-igate unnecessary radiation exposure in healthy ...
详细信息
The use of Unmanned Aerial Vehicles (in short, UAVs, aka drones) for cultural and entertainment purposes, such as drone light shows, has grown exponentially. One such innovative and creative application is the visual ...
详细信息
ISBN:
(数字)9798350357882
ISBN:
(纸本)9798350357899
The use of Unmanned Aerial Vehicles (in short, UAVs, aka drones) for cultural and entertainment purposes, such as drone light shows, has grown exponentially. One such innovative and creative application is the visual arts using drones to explore long-exposure photography. Light painting are generally performed indoors and outdoors in a dedicated space with a human using a moving light source to create spectacular images and save the movement perception in a picture. In this work, we propose a robotic perception system designed to choreograph UAV movements based on time-parametric curves or image edges, serving as reference motions. Our framework begins by processing a digital image, extracting its contours through boundary tracing, and subsequently generating a safe, navigable, and precise path for UAV motion planning. This process involves optimizing waypoints within the UAV workspace to determine a feasible trajectory that encompasses all designated points or computes safe trajectories utilizing established mathematical equations. The validation of the motion planning is performed through light painting, where the UAV can either fly through the motion reference to mimic the original image. The generated trajectories on light painting mode by physical robots are compared against the ground-truth demonstrating the accuracy of the applied control scheme.
Confocal photoluminescence is shown to be a powerful tool for analyzing defect structure in epitaxial CdTe appropriate for photovoltaic applications. Non-radiative defects such as dislocations are easily mapped and qu...
详细信息
ISBN:
(纸本)9781479943975
Confocal photoluminescence is shown to be a powerful tool for analyzing defect structure in epitaxial CdTe appropriate for photovoltaic applications. Non-radiative defects such as dislocations are easily mapped and quantified. Photoluminescence intensity measurements are shown to be a valuable tool for quantifying interface state density. Very low dislocation density and twin content can be achieved for epitaxial CdTe, and low interface state densities result from using CdMgTe barriers.
Using MD5 hashing of passwords in web logins is highly vulnerable to dictionary attacks. One online application for cracking hashed passwords using a dictionary attack that is free and easy to use is ***. Even so, the...
Using MD5 hashing of passwords in web logins is highly vulnerable to dictionary attacks. One online application for cracking hashed passwords using a dictionary attack that is free and easy to use is ***. Even so, the use of hashing passwords using MD5 which has a low level of security is still commonly found to secure web login passwords. This research presents an increase in security through a combination of salt hash passwords when using MD5. The methodology of this study uses a quantitative experimental method to apply hash salt passwords using the MD5 combination. The password cracking test was carried out using the *** online hash cracking application on weak passwords such as “admin” with the addition of a password hash salt using the MD5 combination. The results showed that Salt Password using the MD5 combination could not be cracked by *** using a dictionary attack.
The mental lexicon is a complex cognitive system representing information about the words/concepts that one knows. Decades of psychological experiments have shown that conceptual associations across multiple, interact...
详细信息
Instance segmentation can be applied for the discrimination and diagnosis of cancer cells in pathology images. Accurate segmentation of each pathological cell in the pathology images can improve the efficiency of clin...
Instance segmentation can be applied for the discrimination and diagnosis of cancer cells in pathology images. Accurate segmentation of each pathological cell in the pathology images can improve the efficiency of clinical diagnosis. In this paper, we aim to evaluate the state-of-the-art transformer-based instance segmentation method, masked-attention mask transformer (Mask2Former)[1], on pathology datasets. With the pretrained model of Mask2Former on the natural image instance segmentation dataset, we show that Mask2Former can be adaptive to small pathological datasets and achieve comparable or even better instance segmentation performance compared with the state-of-the-art task-specific pathology image instance segmentation methods.
Air pollution is a leading risk factor for the global burden of disease. There are limited data from Sub-Saharan Africa (SSA). This study addresses significant data gaps in air quality monitoring in South-Central Ugan...
Air pollution is a leading risk factor for the global burden of disease. There are limited data from Sub-Saharan Africa (SSA). This study addresses significant data gaps in air quality monitoring in South-Central Uganda. Using a network of 27 low-cost air quality monitors in the rural Rakai region and urban cities of Masaka and Kampala, we developed a locally tailored calibration model for ambient PM 2.5 concentrations. The model incorporates ambient temperature and relative humidity, demonstrating robust performance with an R 2 of 0.93 and a root mean squared error (RMSE) of 3.97 μg/m 3 . Mean PM 2.5 concentrations during the dry and wet seasons were 20.2 μg/m 3 and 11.8 μg/m 3 in rural areas, and 29.6 μg/m 3 and 18.1 μg/m 3 in urban areas, respectively. We observed diurnal variations, with PM 2.5 levels peaking in the early morning (7 AM to 9 AM) and late evening (6 PM to 10 PM), correlating with peak traffic hours. Low-cost sensors can enhance air quality research in regions like South-Central Uganda that lack air pollution data. Calibration tailored to local conditions can improve measurement accuracy of ambient PM 2.5 concentrations.
暂无评论