Showing the design and layout of the building using a model, making this model requires time and accuracy because the model is built on a scale that has been adjusted to the building to be made later, a problem that o...
详细信息
Showing the design and layout of the building using a model, making this model requires time and accuracy because the model is built on a scale that has been adjusted to the building to be made later, a problem that o...
Showing the design and layout of the building using a model, making this model requires time and accuracy because the model is built on a scale that has been adjusted to the building to be made later, a problem that often occurs in modeling is the suitability of the scale and detail of the model. Augmented Reality as a variation of the virtual environment. Users of AR technology can see the real world, with virtual objects added to the real world. So, users see virtual objects and real objects in the same place. Submission of information by utilizing the three-dimensional visualization technique is very interesting because it can display the 3D model of an object before it is built in real terms. The faculty of computerscience and informationtechnology Mulawarman University Samarinda has an exterior building design of a new building, but there are no interactive media that can display the exterior of the building as a whole and in detail. This application is able to be used to apply the 3D model of the building as a whole and can be seen from various viewpoints.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce ***,this trend introduces security challenges,such as unauthorized *** access control systems,such as Attribute-Base...
详细信息
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce ***,this trend introduces security challenges,such as unauthorized *** access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and *** paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN *** technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access *** proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy ***,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern ***,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.
The coronavirus disease 2019 (COVID-19) has posed significant challenges globally, with image classification becoming a critical tool for detecting COVID-19 from chest X-ray and CT images. Convolutional neural network...
详细信息
With the rise of Arabic digital content, effective summarization methods are essential. Current Arabic text summarization systems face challenges such as language complexity and vocabulary limitations. We introduce an...
详细信息
Classifying textual data is crucial in the expanding digital landscape, especially for underrepresented cursive languages like Urdu, which pose unique challenges due to their intricate linguistic features and vast dig...
详细信息
This project develops an AI-based anomaly detection system. In the field of autonomous driving, abnormal data will directly affect the safety of autonomous driving systems, especially in terms of abnormal camera senso...
详细信息
The Systematic Literature Review(SLR)presented in the document focuses on the acceptance of social media(SM)platforms,particularly through the lens of the Unified Theory of Acceptance and Use of technology(UTAUT),Tech...
详细信息
The Systematic Literature Review(SLR)presented in the document focuses on the acceptance of social media(SM)platforms,particularly through the lens of the Unified Theory of Acceptance and Use of technology(UTAUT),technology Acceptance Model(TAM),Theory of Planned Behavior(TPB)and other relevant *** review involves a comprehensive analysis of the most used theories of acceptance models,the methods for selecting studies,and the results and findings from the reviewed *** study also discusses the accomplishment of research goals and creates a research framework to guide future *** geographic scope of the studies is also examined,providing insights into the distribution of studies across different *** review adheres to the PRISMA(Preferred Reporting Items for Systematic Reviews and meta-Analyses)guidelines for reporting systematic reviews and employs a theory-based approach,categorizing selected articles based on their theoretical *** review’s methodology involves the use of empirical evidence that meets predetermined inclusion criteria and addresses specific research *** document provides a detailed account of the steps involved in the systematic review,including the identification,screening,eligibility determination,and selection of *** review also offers implications for theory and practice,addresses limitations,and suggests areas for future research.
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus alg...
详细信息
暂无评论