A multipurpose software tool for building web apps and software-based Open Education Resources, called 'Digital Makerspace' (DMS), was developed in the last 8 years at the applied university and is now ready f...
详细信息
Spectroscopic analysis relies on identifying and understanding the spectral peaks that represent unique characteristics of an analyte. In high-speed real-time settings, current peak fitting techniques, particularly Ba...
详细信息
In this study, Tangispeak is introduced as a language learning system for preschoolers, incorporating Digital Game-Based learning (DGBL), Augmented Reality (AR), and tangible objects. It aims to enhance English langua...
详细信息
Developers' qualifications and their professional development are the important aspects of IT project's success. Software developers are interested in advancing their careers and improving their skills in orde...
详细信息
Open-ended question responses are an unstructured data source that contains extremely useful information. The idea of obtaining information using open-ended questions is particularly popular and frequently employed in...
详细信息
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant ...
详细信息
ISBN:
(数字)9798350362701
ISBN:
(纸本)9798350362718
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant role. These onboard Time-Sensitive Networks (TSNs) require monitoring for safety and - as versatile platforms to host Network Anomaly Detection Systems (NADSs) - for security. Still a thorough evaluation of anomaly detection methods in the context of hard real-time operations, automotive protocol stacks, and domain specific attack vectors is missing along with appropriate input datasets. In this paper, we present an assessment framework that allows for reproducible, comparable, and rapid evaluation of detection algorithms. It is based on a simulation toolchain, which contributes configurable topologies, traffic streams, anomalies, attacks, and detectors. We demonstrate the assessment of NADSs in a comprehensive in-vehicular network with its communication flows, on which we model traffic anomalies. We evaluate exemplary detection mechanisms and reveal how the detection performance is influenced by different combinations of TSN traffic flows and anomaly types. Our approach translates to other real-time Ethernet domains, such as industrial facilities, airplanes, and UAVs.
In the field of emotion recognition, there are two approaches used to develop predictive models that recognize emotions from EEG signals: subject-dependent and subject-independent. Subject-independent models, although...
详细信息
ISBN:
(数字)9798350371628
ISBN:
(纸本)9798350371635
In the field of emotion recognition, there are two approaches used to develop predictive models that recognize emotions from EEG signals: subject-dependent and subject-independent. Subject-independent models, although more practical, tend to yield a lower performance due to the high variability of EEG signals between individuals. Recent studies have indicated that incorporating prior demographic information about individuals can improve the accuracy of subject-independent approaches. Some studies have supported this claim by showing that including individuals’ sex can boost model accuracy. However, until now, no one has used interpretable models to measure to what extent demographics can enhance subject-independent approaches. In this work, we follow this direction by using a logistic regression model to correlate the output of a deep learning model with subjects’ age and sex, thereby evaluating whether these factors impact emotion prediction. Our analysis indicates that the ‘sex’ variable significantly influenced the predictions of the deep learning model in three out of five emotions, whereas ‘age’ does not have any effect. These findings suggest that sex is a factor that needs to be considered when designing EEG-based emotion recognition models, which could lead to more robust subject-independent models with potential applications in areas such as healthcare, education, and marketing.
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant ...
详细信息
With the rapid growth of deep learning methods, AI technologies for generating deepfake videos also have been significantly advanced. Nowadays, the manipulated videos such as deepfakes are so sophisticated that one ca...
详细信息
We introduce the term Super-Reactive Systems to refer to reactive systems whose construction and behavior are complex, constantly changing and evolving, and heavily interwoven with other systems and the physical world...
详细信息
暂无评论