Stroke is becoming one of the most common diseases in modern society. Stroke caught in the early phase has a higher potential for recovery as it can be treated before the worsening of the patient's condition. Dete...
详细信息
This research investigates the novel application of Dynamic Game Balancing (DGB) techniques in the context of a hybrid chess-survival roguelike game, a unique combination of genres not widely explored in previous stud...
详细信息
This exponential proliferation of IoT devices is creating an ever-growing demand for efficient cybersecurity solutions in resource-constrained environments. In this study, we propose Edge-IoTDistilBERT, a fine-tuned D...
详细信息
NoSQL database has gained popularity in Big Data and other various applications for its simplicity and flexibility. The non-relational nature of NoSQL database such as MongoDB proves to improve development lifecycles ...
详细信息
This study presents a comprehensive approach to IT asset security risk management in physical access control systems, integrating NIST SP 800-116, 800-53, 800-30, ISO 31000, and 27002:2022 standards. Using a mixed-met...
详细信息
The research was centered on adapting and assessing a new, unique game concept. The game onKeys presents a new approach and poses as an alternative method for improving typing skills. However, despite offering a promi...
详细信息
Time series data is data that is collected periodically and has certain time intervals. Time series data is widely available in the fields of finance, meteorology, signal processing, health, and economics. Weather dat...
详细信息
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at...
详细信息
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca...
详细信息
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal...
详细信息
暂无评论