In this paper, we present a novel dual broadband antenna tailored for vehicular applications. The antenna design incorporates circular and square patches, metal cylinders, and conductive vias. Our simulated results de...
详细信息
With the rising competition among pharmaceutical companies, the current drug supply chain market has become more competitive with high-quality product segments. The rapid growth of internet pharmacies has made it more...
详细信息
Internet of Things (IoT) devices are the weak link in organizing a Wireless Sensor Network. Various Attacks on IoT devices can lead to different complex consequences. Real applications of the IoT generate a large amou...
详细信息
Access to clean and safe drinking water is critical to human well-being while ensuring water quality remains an ongoing challenge. Despite the water board's best attempts at filtration, the potential for contamina...
详细信息
Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive *** study introduces a phishing email detection framework that combines Bidirectional Encode...
详细信息
Phishing attacks present a serious threat to enterprise systems,requiring advanced detection techniques to protect sensitive *** study introduces a phishing email detection framework that combines Bidirectional Encoder Representations from Transformers(BERT)for feature extraction and CNN for classification,specifically designed for enterprise information ***’s linguistic capabilities are used to extract key features from email content,which are then processed by a convolutional neural network(CNN)model optimized for phishing *** an accuracy of 97.5%,our proposed model demonstrates strong proficiency in identifying phishing *** approach represents a significant advancement in applying deep learning to cybersecurity,setting a new benchmark for email security by effectively addressing the increasing complexity of phishing attacks.
In this work, the pre-trained model of the self-attention framework is proposed for single-channel speech separation. Firstly, all layers in the pre-trained self-attention framework are frozen. The model is then retra...
详细信息
Humanity has suffered catastrophically due to the COVID-19 pandemic. One of the most reliable diagnoses of COVID-19 is RT-PCR (Reverse-Transcription Polymer Chain Reaction) testing. This method, however, has its limit...
详细信息
Recruitment in most organizations is normally a rather inefficient process where it takes quite a long time to match the right candidate to a given job. In this research, AI-based hiring system is recommended to impro...
详细信息
Blockchain technology is widely used to develop software systems in different industries such as finance, healthcare, supply chain management, data management, Internet of Things (IoT). To adopt blockchain, some criti...
详细信息
Concept drift is a common phenomenon appearing in evolving data streams of a wide range of applications including credit card fraud protection, weather forecast, network monitoring, etc. For online data streams it is ...
详细信息
暂无评论