Modern automation schemes have substantially improved by using standard communication protocols, upgraded technologies and user-friendly tools in power distribution domain. Nevertheless, this fundamental functionality...
详细信息
作者:
Gabr, MohamedKorayem, YousefChen, Yen-LinYee, Por LipKu, Chin SoonAlexan, Wassim
Faculty of Media Engineering and Technology Computer Science Department Cairo11835 Egypt National Taipei University of Technology
Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya
Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman
Department of Computer Science Kampar31900 Malaysia
Faculty of Information Engineering and Technology Communications Department Cairo11835 Egypt
New Administrative Capital Mathematics Department Cairo13507 Egypt
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Ch...
详细信息
Question answering (QA) tasks in natural language processing (NLP) are tricky, particularly when used with Arabic private documents. This is due to the complexity of Arabic language and the lack of sufficient annotate...
详细信息
Asynchronous Graph Neural Network (AGNN) has attracted much research attention because it enables faster convergence speed than the synchronous GNN. However, existing software/hardware solutions suffer from redundant ...
详细信息
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t...
详细信息
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is to automate adaptive network defense, which is however a difficult problem. As a first step towards automation, we propose investigating how to attain semi-automated adaptive network defense(SAND). We propose an approach extending the architecture of software-defined networking, which is centered on providing defenders with the capability to program the generation and deployment of dynamic defense rules enforced by network defense tools. We present the design and implementation of SAND, as well as the evaluation of the prototype implementation. Experimental results show that SAND can achieve agile and effective dynamic adaptations of defense rules(less than 15 ms on average for each operation), while only incurring a small performance overhead.
Different techniques have been developed for object detection and recognition. These techniques can be divided into single-shot and two-shot methods. Single-shot methods focus on real-time applications, while two-shot...
详细信息
With the growing technological advancements in the Internet and advanced functionalities in vehicular networks, it becomes crucial to execute tasks quickly and efficiently. However, the limited onboard computational c...
详细信息
Web search engines are used for retrieving information but still there exists ambiguity in their retrieval process. It is so because traditional search engines laid emphasis on matching of keywords rather than maintai...
详细信息
In the Fog-based Environmental Monitoring system (FEMS), the frequency at which Internet of Thing (IoT) devices upload monitoring data and the frequency at which users obtain monitoring data can highly affect energy c...
详细信息
Increasingly popular decentralized applications (dApps) with complex application logic incur significant overhead for executing smart contract transactions, which greatly limits public block chain performance. Pre-exe...
暂无评论