We present implantable silicon photonic probes for selective plane illumination imaging in vivo. The small form factor of the probes minimizes tissue displacement and heat dissipation while providing planar illuminati...
详细信息
In this work, we present a Physical Unclonable Function (PUF) implemented on a Commercial Off-The-Shelf (COTS) NAND Flash memory module using programming disturbances, and examine the robustness of its responses to en...
详细信息
The maximal regularity property of discontinuous Galerkin methods for linear parabolic equations is used together with variational techniques to establish a priori and a posteriori error estimates of optimal order und...
详细信息
The Heuristic Rating Estimation Method enables decision-makers to decide based on existing ranking data and expert comparisons. In this approach, the ranking values of selected alternatives are known in advance, while...
详细信息
This paper considers the problem of image segmentation for medical images, in particular, cutaneous lesions. Given a digital image of a skin lesion, our goal is to compute the border curve separating the lesion from t...
详细信息
There has been great interest in fairness in machine learning, especially in relation to classification problems. In ranking-related problems, such as in online advertising, recommender systems, and HR automation, muc...
详细信息
Several efforts have been recently devoted to the hardware implementations of fractional systems. This manuscript makes a contribution to the topic by introducing the first example of hardware implementation of a 2D f...
详细信息
This study aims to present a feasible LFC (Load Frequency Control) model that integrates physical security limitations, namely GRC, GDB, and TD. The presence of this characteristic guarantees that the design is not on...
详细信息
Codes for correcting sticky insertions/deletions and limited-magnitude errors have attracted significant attention due to their applications of flash memories, racetrack memories, and DNA data storage systems. In this...
Codes for correcting sticky insertions/deletions and limited-magnitude errors have attracted significant attention due to their applications of flash memories, racetrack memories, and DNA data storage systems. In this paper, we first consider the error type of t sticky deletions with ℓ-limited-magnitude and propose a non-systematic code for correcting this type of error with redundancy 2t(1 − 1/p) • log(n + 1) + O(1), where p is the smallest prime larger than ℓ + 1. Next, we present a systematic code construction with an efficient encoding and decoding algorithm with redundancy $\frac{{\left\lceil {2t(1 - 1/p)} \right\rceil \cdot \left\lceil {\log p} \right\rceil }}{{\log p}}\log (n + 1) + O(\log \log n)$, where p is the smallest prime larger than ℓ + 1.
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha...
详细信息
ISBN:
(数字)9798331531119
ISBN:
(纸本)9798331531126
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing behavior of the IT students at the University of Dunaujvaros. A survey made in May 2024 questioned 68 students, 59 males and 9 females, about behaviors such as using passwords with complexity, not repeating them for multiple accounts or machines, changing them regularly, and which applications they use for password management. The findings have depicted that, as a whole, students appear to be moderately sensitive about the password security instructions. Nonetheless, most continue to indulge in unsafe practices, including easily remembered or weak passwords and infrequent password changes. Furthermore, approximately half of the responders use password management applications, indicating room for significant improvement in the future. The results suggest that intervention and special education measures should be taken to enhance the practice of password security among future IT experts. This research has good potential to contribute toward strategies designed for people behaving safely in password management, and hence promote a secure digital environment.
暂无评论