Showing the design and layout of the building using a model, making this model requires time and accuracy because the model is built on a scale that has been adjusted to the building to be made later, a problem that o...
详细信息
Showing the design and layout of the building using a model, making this model requires time and accuracy because the model is built on a scale that has been adjusted to the building to be made later, a problem that o...
Showing the design and layout of the building using a model, making this model requires time and accuracy because the model is built on a scale that has been adjusted to the building to be made later, a problem that often occurs in modeling is the suitability of the scale and detail of the model. Augmented Reality as a variation of the virtual environment. Users of AR technology can see the real world, with virtual objects added to the real world. So, users see virtual objects and real objects in the same place. Submission of information by utilizing the three-dimensional visualization technique is very interesting because it can display the 3D model of an object before it is built in real terms. The faculty of computer science and information technology Mulawarman University Samarinda has an exterior building design of a new building, but there are no interactive media that can display the exterior of the building as a whole and in detail. This application is able to be used to apply the 3D model of the building as a whole and can be seen from various viewpoints.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Many things, such as goods, products, and websites are evaluated based on user's notes and comments. One popular research project is sentiment analysis, which aims to extract information from notes and comments as...
详细信息
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce ***,this trend introduces security challenges,such as unauthorized *** access control systems,such as Attribute-Base...
详细信息
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce ***,this trend introduces security challenges,such as unauthorized *** access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and *** paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN *** technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access *** proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy ***,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern ***,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.
Liver cirrhosis often occurs as a result of the lengthy and persistent progression of chronic liver disorders. It is a key crucial cause of death on a global scale. Early diagnosis and identification of cirrhosis are ...
详细信息
The coronavirus disease 2019 (COVID-19) has posed significant challenges globally, with image classification becoming a critical tool for detecting COVID-19 from chest X-ray and CT images. Convolutional neural network...
详细信息
With the rise of Arabic digital content, effective summarization methods are essential. Current Arabic text summarization systems face challenges such as language complexity and vocabulary limitations. We introduce an...
详细信息
Object recognition is significantly improving, allowing us to better understand and extract information from images. This paper presents a novel method for 3D scene reconstruction using a single RGB image, based on a ...
详细信息
Steganography is a technique used to hide data within other data, emerging from the realization that information is valuable and must be concealed. By considering the potential of blockchain technology, which produces...
详细信息
暂无评论