This study provides an innovative architectural model for e-Health systems that aims to improve cyber resilience while maintaining high availability under fluctuating traffic loads. We examined typical cybersecurity i...
详细信息
Internet of Things (IOT) has its importance in the field of data exchange and control, makes great effects when applied in the fitness field. Applying IOT technology in fitness field could introduce an auto judge for ...
详细信息
Human Activity Recognition (HAR) is a research area that involves wearable devices integrating inertial and/or physiological sensors to classify human actions and status across various application domains, such as hea...
详细信息
Satellite still image plays a crucial role in various domains, such as law enforcement, disaster response, and environmental monitoring. The ability to manually identify objects and facilities within these images is o...
详细信息
Traffic sign detection and recognition (TSDR) is a pivotal component of contemporary transportation systems, designed to enhance road safety and operational efficiency. In an era where automation is indispensable, TSD...
详细信息
Our system, submitted to the Nuanced Arabic Dialect Identification (NADI-23), tackles the first sub-task: Closed Country-level dialect identification. In this work, we propose a model that is based on an ensemble of l...
The challenge of credit card fraud presents a significant threat to both consumers and financial institutions alike, leading to substantial economic detriment. In response, this research applies various machine learni...
详细信息
This paper aimed to suggest a new Secured Hash Algorithm 3 (SHA-3) with seed value implementation. Seed worth ensuring that there are fewer expectations collisions, despite an attacker selecting the data. Furthermore,...
详细信息
Robotic arms play an important role in the automation industry. Robotic arms plan processing paths based on the shape of the workpiece. However, the processing path often deviates due to inaccurate placement of the wo...
详细信息
Fifth-generation (5G) networks are prone to jamming attacks, which are particularly dangerous in mission-critical applications such as factory automation. In this paper, we present a simple method to detect jamming at...
详细信息
暂无评论