In this work, using Modular Differential Evolution (Modular DE), we investigate the impact of parameter memory size (MS) on the search performance of Success-history based parameter adaptation (L-SHADE) for Differenti...
详细信息
A common practice in software development is to include linters, static analysis tools that warn developers about potential issues in the code, in the software quality assurance process. Actionable warnings generated ...
详细信息
This paper assesses Distance-based Success History Differential Evolution for 100-Digit Challenge and Numerical Optimization Scenarios (DISHchain3e+12). DISHchain3e+12 algorithm is based on DISH algorithm, using a Dif...
详细信息
The increased quality and human-likeness of AI generated texts has resulted in a rising demand for neural text detectors, i.e. software that is able to detect whether a text was written by a human or generated by an A...
详细信息
The certification of safety properties and interpretation of neural networks is a topic of great concern. We recently devised an automata-based approach for addressing these tasks. It translates a neural network with ...
详细信息
In order to improve the operational strength and control precision of the DC motor, a double closed-loop control system based on TAIXIN TX8C1010 MCU is proposed. The single chip is based on a high-speed 8051 core, whi...
详细信息
作者:
Abu-Nassar, Ahmad M.Morsi, Walid G.
Electrical Computer and Software Engineering Department Faculty of Engineering and Applied Science OshawaONL1G 0C5 Canada
Transportation electrification plays an important role in the operation of the smart grid through the integration of the electric vehicle fast charging stations (EVFCSs), which allows the electric vehicles to provide ...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
Lung cancer is the leading cause of cancer-related fatalities in Indonesia, primarily due to late-stage diagnoses. This study aims to develop a model that employs image processing to classify lung cancer from CT scan ...
详细信息
Machine learning algorithms make decisions in various fields, thus influencing people’s lives. However, despite their good quality, they can be unfair to certain demographic groups, perpetuating socially induced bias...
详细信息
暂无评论