This research aimed to design the illustrations of Himmapan animals in Super Deformed (SD) form for application to new media and to evaluate the suitability of designing the illustrations of Himmapan animals in SD for...
详细信息
A bird strike is a common occurrence during an aircraft's takeoff and landing and is classified as a high-velocity impact, which can cause severe damage, a decrease in aerodynamic efficiency, and may lead to catas...
详细信息
In recent years, social networks have grown rapidly, and their applications in the healthcare domain are increasingly proposed. Using the crowd wisdom generated from social networks, we can find similar and reliable p...
详细信息
In recent years,with the development of blockchain,electronic bidding auction has received more and more *** at the possible problems of privacy leakage in the current electronic bidding and auction,this paper propose...
详细信息
In recent years,with the development of blockchain,electronic bidding auction has received more and more *** at the possible problems of privacy leakage in the current electronic bidding and auction,this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries,which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third *** protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve *** can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants,which can solve the problem of resisting malicious adversary *** security of the protocol is proved by the real/ideal model paradigm,and the efficiency of the protocol is *** efficiency of the protocol is verified by simulating experiments,and the protocol has practical value.
This research study explores the transformative potential of IoT-Enabled Smart Mirrors to redefine home connectivity by enabling seamless internet browsing and smart home integration. It introduces a novel model algor...
详细信息
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work...
详细信息
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing works on Arabic ABSA content separately address them,assume that aspect terms are preidentified,or use a pipeline *** solutions design different models for each task,and the output from the ATE model is used as the input to the APC model,which may result in error propagation among different steps because APC is affected by ATE *** methods are impractical for real-world scenarios where the ATE task is the base task for APC,and its result impacts the accuracy of ***,in this study,we focused on a multi-task learning model for Arabic ATE and APC in which the model is jointly trained on two subtasks simultaneously in a *** paper integrates themulti-task model,namely Local Cotext Foucse-Aspect Term Extraction and Polarity classification(LCF-ATEPC)and Arabic Bidirectional Encoder Representation from Transformers(AraBERT)as a shred layer for Arabic contextual text *** LCF-ATEPC model is based on a multi-head selfattention and local context focus mechanism(LCF)to capture the interactive information between an aspect and its ***,data augmentation techniques are proposed based on state-of-the-art augmentation techniques(word embedding substitution with constraints and contextual embedding(AraBERT))to increase the diversity of the training *** paper examined the effect of data augmentation on the multi-task model for Arabic *** experiments were conducted on the original and combined datasets(merging the original and augmented datasets).Experimental results demonstrate that the proposed Multi-task model outperformed existing APC *** results were obtained by AraBERT and LCF-ATEPC with fusion layer(AR-LCF-ATEPC-Fusion)and the proposed data augmentation
Differential Evolution (DE) is a potent stochastic evolutionary optimization algorithm garnering increasing research attention. Over the years, it has been found applicable in solving diverse real-world problems. DE e...
详细信息
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our *** conduct research in this field,periodic comparative analysis is needed with the new techniques c...
详细信息
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our *** conduct research in this field,periodic comparative analysis is needed with the new techniques coming up *** purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way *** review follows Kitchenham’s review *** review has been divided into three main stages including planning,execution,and *** the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation *** risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation *** a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat *** review reveals that threat analysis and security testing are needed to develop automated tools for the *** estimation of effort required to prioritize potential security risks is a big challenge in software *** accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep *** is also imperative to validate these effort estimation methods to ensure all potential security threats are *** challenge is selecting the right model for each specific security *** achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
The occurrence of Polycystic Ovarian Syndrome (PCOS) among women of reproductive age is increasing worldwide. PCOS is recognized as a critical health issue that can harm physical and mental health of women. This motiv...
详细信息
The Taiwanese livestock industry grapples with escalating costs and challenges such as labor shortages, environmental changes, pollution, and disease threats. Trade liberalization and cheaper imports further highlight...
详细信息
暂无评论