The task of identifying key skills from job vacancies descriptions is considered in the article. The source data consists of vacancy texts from the 'Jobs in Russia' portal, in which skill-related entities were...
详细信息
Handwriting typically consists of a wide range of writing forms with substantial differences in the placements and size of those writing shapes. The arrangement, organization, and spatial association of individual let...
详细信息
A cutting-edge online marketplace that uses blockchain technology to transform how we purchase and sell goods and services is known as a blockchain- powered e-commerce platform. This platform uses a decentralized netw...
详细信息
Distributed Denial-of-Service (DDoS) attacks disrupt networks by flooding systems with traffic from multiple sources, making real-time detection essential. Integrating Machine Learning (ML) with Software-Defined Netwo...
详细信息
Stock market forecasting is important for financial decision-making and risk management. Among the various time series models, the Autoregressive (p) Integrated (d) Moving Average (q) (ARIMA) model has been widely ado...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first prop...
详细信息
Due to the fact that a memristor with memory properties is an ideal electronic component for implementation of the artificial neural synaptic function,a brand-new tristable locally active memristor model is first proposed in this ***,a novel four-dimensional fractional-order memristive cellular neural network(FO-MCNN)model with hidden attractors is constructed to enhance the engineering feasibility of the original CNN model and its ***,its hardware circuit implementation and complicated dynamic properties are investigated on multi-simulation ***,it is used toward secure communication application *** it as the pseudo-random number generator(PRNG),a new privacy image security scheme is designed based on the adaptive sampling rate compressive sensing(ASR-CS)***,the simulation analysis and comparative experiments manifest that the proposed data encryption scheme possesses strong immunity against various security attack models and satisfactory compression performance.
In this paper, the current, voltages, as well as active and reactive power of the 400 kV transmission line are calculated using three different methods. The objective of the paper is to demonstrate and compare th...
详细信息
This article is devoted to the determination of the fractal size of the damaged part of the human brain on the basis of images obtained from MRI (magnetic resonance imaging). There are various mathematical methods for...
详细信息
This research aims to find the best deep learning model to do Chinese sentimental analysis. BERT's model may work well in the English language but not work in the Chinese language. English is easier to encode in e...
详细信息
The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s criti...
详细信息
The current cyber-attack environment has put even the most protected systems at risk as the hackers are nowmodifying technologies to exploit even the tiniest of weaknesses and infiltrate *** this situation,it’s critical to design and construct software that is both secure and *** security is the most well-defined aspect of health information software systems,it is equally significant to prioritise sustainability because any health information software system will be more effective if it provides both security and sustainability to the customers at the same *** this league,it is crucial to determine those characteristics in the systems that can help in the accurate assessment of the sustainable-security of the health information software during the development *** research work employed the Fuzzy Analytic Network Process(Fuzzy ANP)to estimate the impact of the overall sustainable-security of health information software systems and their characteristics in order to achieve a high level of ***,the study validates the efficacy of the Fuzzy ANP procedure by testing it on five different versions of a health information software system through Fuzzy Technique for Order of Preference by Similarity to Ideal Solutions(Fuzzy TOPSIS).Despite the sensitivity of the health information software systems,this study employedmultiple versions of health information software *** compared with the existing procedures for testing the sustainable-security of health information software systems,the outcomes were conclusive and significantly more *** saving time and resources,the mechanism suggested in this research work aims to establish an outline that software practitioners can follow to enhance the sustainablesecurity of health information software systems.
暂无评论