The collaboration of machine learning (ML) algorithms and cognitive psychological frameworks supports the enhancement of emotional intelligence. In light of Plutchik's emotional wheel, this study investigates how ...
详细信息
In the rapidly expanding field of the Internet of Things, ensuring secure and efficient communication between IoT devices and servers is crucial. This paper henceforth designs a lightweight authentication system under...
详细信息
With the increasing speed of advance of both Internet of Things (IoT) and the demands of utilizing IoT devices in different locations with high compatibility, fog computing has been foreseen as a sustainable solution....
详细信息
Research has primarily focused on fully automatic instrument-playing robots. However, it is difficult to support the experience of playing musical instruments for people with physical disabilities or those who are ine...
详细信息
Alzheimer's (AD) is a complex and multi-domain neurodegenerative disease characterized by amyloid-β (Aβ) and proteins aggregation holding both genotype and phenotype signatures. Increasing evidence suggests that...
详细信息
This paper proposes the use of Random Linear Network Coding (RLNC) as an erasure code in the forward error correction (FEC) mechanism for Internet telephony. It also designs and implements a forward error correction a...
详细信息
In today's rapidly growing digital era, cloud computing has emerged as an important technology, providing the ability to scale resources efficiently, accessibility, and cost-effectiveness for storing and processin...
详细信息
Fake news continues to proliferate, posing an increasing threat to public discourse. The paper proposes a framework of a Mixture of Experts, Sentiment Analysis, and Sarcasm Detection experts for improved fake news det...
详细信息
In today's rapidly evolving healthcare landscape, the integration of cutting-edge technologies such as IoT and wearable devices has led to significant advancements, particularly in the realm of remote patient moni...
详细信息
Malware analysis is a complex process of examining and evaluating malicious software's functionality, origin, and potential impact. This arduous process typically involves dissecting the software to understand its...
详细信息
暂无评论