The formal study of computer malware was initiated in the seminal work of Fred Cohen in the mid-80s who applied elements of Computation Theory in the investigation of the theoretical limits of using the Turing Machine...
详细信息
A Burling graph is an induced subgraph of some graph in Burling’s construction of triangle-free high-chromatic graphs. We provide a polynomial-time algorithm which decides whether a given graph is a Burling graph and...
详细信息
Intelligence Processing Units (IPU) have proven useful for many AI applications. In this paper, we evaluate them within the emerging field of AI for simulation, where traditional numerical simulations are supported by...
详细信息
This paper investigates the advancement of magnetic induction-based heart and respiration rate sensing by actively controlling the coil current. This is realized through the implementation of a current-starved inverte...
详细信息
ISBN:
(数字)9798350371499
ISBN:
(纸本)9798350371505
This paper investigates the advancement of magnetic induction-based heart and respiration rate sensing by actively controlling the coil current. This is realized through the implementation of a current-starved inverter mechanism. Experiments show a notable level of accuracy of the proposed circuit in measuring heart and respiration activity when compared to a reference sensor. The direct manipulation of current levels was found to have a direct impact on the signal strength. Incrementing the overall current within the proposed circuit from 60 mA to 100 mA resulted in an augmentation of the output amplitude of the heart rate signal from 8.5 mV to 27 mV, accompanied by a marginal enhancement in beat-to-beat interval accuracy. Moreover, the proposed sensor demonstrates noteworthy precision in monitoring the respiratory rate when compared with the reference sensor under different current values, exhibiting the same trend in signal strength. This finding offers valuable insight for the development of future power-optimized magnetic induction sensors with enhanced robustness.
This paper proposes an innovative generic wireless low-cost high-end Android-based board for use by the EMULSION IoT platform, which is being elaborated as IoT-service and IoT-system prototyping ready. Based on the Al...
详细信息
This paper presents an intelligent system for recommendation of services to mobile users (consumers) by considering the current context. The system builds up and dynamically manages personal profiles of consumers, aim...
详细信息
The advances of machine learning (ML) including deep learning (DL) have enabled several approaches to implicitly learn vulnerable code patterns to automatically detect software vulnerabilities. A recent study showed t...
The advances of machine learning (ML) including deep learning (DL) have enabled several approaches to implicitly learn vulnerable code patterns to automatically detect software vulnerabilities. A recent study showed that despite successes, the existing ML/DL-based vulnerability detection (VD) models are limited in the ability to distinguish between the two classes of vulnerability and benign code. We propose DeepVD, a graph-based neural network VD model that emphasizes on class-separation features between vulnerability and benign code. DeepVDleverages three types of class-separation features at different levels of abstraction: statement types (similar to Part-of-Speech tagging), Post-Dominator Tree (covering regular flows of execution), and Exception Flow Graph (covering the exception and error-handling flows). We conducted several experiments to evaluate DeepVD in a real-world vulnerability dataset of 303 projects with 13,130 vulnerable methods. Our results show that DeepVD relatively improves over the state-of-the-art ML/DL-based VD approaches 13%–29.6% in precision, 15.6%–28.9% in recall, and 16.4%–25.8% in F-score. Our ablation study confirms that our designed features and components help DeepVDachieve high class-separability for vulnerability and benign code.
Designing technologies that clothe, adorn, or are otherwise placed on the body raises questions concerning the role they will play in dressing ourselves. We situate self-fashioning - or the process through which we st...
详细信息
This work investigates the performance of simultaneous wireless information and power transfer (SWIPT) in a reconfigurable intelligent surface (RIS)-aided Internet of Things (IoT) communications under imperfect channe...
详细信息
The interpretable machine learning method is important in drug discovery. Unlike traditional ensemble learning methods, this paper proposes an interpretable algorithm based on Bayesian rule extraction to obtain reliab...
详细信息
暂无评论