Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally...
详细信息
The process of a supply chain involves a series of activities that distribute, assemble, and manage products, transferring them from the supplier to the end consumer. It operates as a complex, interconnected network r...
详细信息
Human activity prediction has become increasingly prevalent in a plethora of time-critical applications. To realize accurate identification and prediction of human behaviour, we propose a situation-aware wearable comp...
详细信息
The detection and classification of malware pose significant challenges in cybersecurity due to the ever-evolving nature of malicious threats. In this study, we propose a novel approach for classifying malware using d...
详细信息
This study proposes the Cyber Range environment built in a virtual space on the Cloud via a local web browser. The training contents are developed using Docker, which has excellent portability, and attack and defense ...
详细信息
In this study, the proposal system investigates the possibility of simplifying the emotional speech synthesis system by embedding styles built with a feature extractor based on a CNN image classification model. To sim...
详细信息
This paper describes modified robust algorithms for a line clipping by a convex polygon in E2 and a convex polyhedron in E3. The proposed algorithm is based on the Cyrus-Beck algorithm and uses homogeneous coordinates...
详细信息
The selection of optimal neural models in Spiking Neural Networks (SNNs) traditionally depends on a trial-and-error approach, which is both time-consuming and sometimes tends to suboptimal selection of the neural mode...
详细信息
This paper aims to analyze the potential effect of the Electric Vehicle charging process (EVCP) on the mean and sub-cycle grid access impedance from 20 kHz to 500 kHz. The characterization is carried out in a controll...
详细信息
Context Space Theory (CST) is a geometrical approach used to represent contexts and situations in situation-aware computing applications. In this theory, situations are represented in a multidimensional space, where e...
详细信息
暂无评论