On-chip network designed for modular System-on-Chip(SoC) has recent became a research hotspot, especially when methodology is employed rather than programmer experience. Most of the existing research relies on a speci...
详细信息
To solve the problem that current edge detectors cannot accurately detect the edges of artifacts under low-light conditions, we propose an edge detection network-EDD that adapts to scale changes and low-light environm...
详细信息
A novel approach has been considered for energy consumption and how it can be optimized for industries utilizing microgrids powered by renewable energy sources (RES). The targeted industry includes a microgrid, an int...
详细信息
Switched Reluctance Motors (SRMs) are known for their durable design, rendering them well-suited for demanding environments and high-speed operations. They offer advantages such as high torque density and fault tolera...
详细信息
Anaerobic fermentation is the most important link to gas production, this paper solves the current problem with the help of the current complete machine learning technology, combining perception and intelligent proces...
详细信息
The growing popularity and ease of access have turned Android applications into prime targets for malicious attackers. Within the security research community, machine learning has become an essential instrument for co...
详细信息
ISBN:
(数字)9798350371628
ISBN:
(纸本)9798350371635
The growing popularity and ease of access have turned Android applications into prime targets for malicious attackers. Within the security research community, machine learning has become an essential instrument for conducting Android malware detection and analysis. However, there are potential threats to validity of existing studies, mainly resulting from their used datasets. One of the primary issues is temporal inconsistency (also called temporal bias) that is caused by incorrect time splits of training and testing sets or using imprecise indicators for release time of apps. This paper investigates the use of Google Play Store upload year of an app as a precise indicator of its release time to address temporal bias in machine learning-based Android malware detection. Using this approach is made possible by AndroZoo’s December 2023 data release. Through a three-layer filtering process, we demonstrate the unreliability of the commonly used dex_date as the release time of an app and propose a more accurate approach for creating temporally-consistent datasets based on an app’s upload year. Additionally, we have open-sourced our data and feature extraction process for Android malware analysis, supporting both server-side and on-device extraction, to enhance research reproducibility and facilitate community access.
In today’ s fast-paced and highly competitive landscape, there is an ever-growing need to enhance the precision, agility, and overall performance of athletes, especially in sports that demand high levels of accuracy ...
详细信息
ISBN:
(数字)9798331507077
ISBN:
(纸本)9798331507084
In today’ s fast-paced and highly competitive landscape, there is an ever-growing need to enhance the precision, agility, and overall performance of athletes, especially in sports that demand high levels of accuracy and coordination, such as shooting. With the rapid advancement of technology, the role of data analytics in athletic training has gained substantial attention, serving as a powerful tool to elevate athlete performance. This study aims to develop an integrated data platform to support a more precise and holistic approach to training for shooting athletes. By seamlessly combining various types of response and performance data - such as manual reaction times, shooting response times, eye-tracking data, video analyses, and biomechanical data-with a distributed Elasticsearch (ES) data synchronization system, the platform enables comprehensive data collection and analysis. This integration provides invaluable insights into the training status and individual differences of athletes, offering scientific, data-driven guidance for coaches. Furthermore, a robust distributed disaster recovery system is implemented by synchronizing two Elasticsearch clusters with a MySQL database. Although the primary and backup switch mechanisms are still under development, an automated script continuously monitors system health, allowing for rapid failover to backup clusters when necessary. This research opens new avenues in the application of data-driven platforms for athletic performance enhancement, providing a resilient infrastructure for continuous, uninterrupted data analytics, and setting a foundation for future enhancements in sports training methodologies.
Recent advancements in computer vision and machine learning have enabled personalized hair care, advancing beyond traditional methods by catering to individual hair types and health. This paper presents Glowllp, a mob...
详细信息
ISBN:
(数字)9798331517878
ISBN:
(纸本)9798331517885
Recent advancements in computer vision and machine learning have enabled personalized hair care, advancing beyond traditional methods by catering to individual hair types and health. This paper presents Glowllp, a mobile application that provides personalized hair care recommendations through three primary modules: image quality assessment, hair type detection, and health prediction. The image quality assessment module employs edge detection and SVM classifiers to filter blurry images, achieving over 95% accuracy. For hair type classification, a hybrid model of Mask R-CNN and Vision Transformers (ViTs) identifies hair types with 92% accuracy. The health assessment module predicts hair loss and other conditions using Random Forest and XGBoost models with an F1 score of 0.91, while K-means clustering further tailor's recommendations. By integrating these modules, Glow Up delivers a comprehensive, user-friendly solution that enhances hair care personalization.
Probabilistic computing (using p-bits), based on stochastic computing, can operate in an invertible mode, enabling bidirectional operations. This functionality addresses significant challenges, improves neural network...
详细信息
ISBN:
(数字)9798331522445
ISBN:
(纸本)9798331522452
Probabilistic computing (using p-bits), based on stochastic computing, can operate in an invertible mode, enabling bidirectional operations. This functionality addresses significant challenges, improves neural network training, and opens new possibilities in neural networks. This article presents a framework and robust approach for designing p-circuits of logic circuits using p-bits to enhance probabilistic computing. This paper presents the design of a 2 × 1 multiplexer, a two-input non-imply logic gate (AB), and a ReLU activation function using the Hamiltonian method. Further, this paper presents two designs of ReLU, one using AND gate while the second design uses a non-imply logic gate. The non-imply gate based ReLU requires fewer number of p-bits. In particular, a 10-bit ReLU takes 20 p-bits, with ten inputs and ten outputs. Further, the proposed approach results the design with a lower graph density of 0.26 for the 5-bit proposed ReLU, whereas the best existing design has a graph density of 0.45. The proposed p-circuits were simulated, and results demonstrate the invertible nature of the p-circuits,
Quantum computers pose a significant threat to widely used public-key cryptosystems, endangering current authentication and authorization systems. This paper presents a post-quantum Single Sign-On (SSO) solution that ...
详细信息
ISBN:
(数字)9798350367560
ISBN:
(纸本)9798350367577
Quantum computers pose a significant threat to widely used public-key cryptosystems, endangering current authentication and authorization systems. This paper presents a post-quantum Single Sign-On (SSO) solution that integrates Post-Quantum Cryptography (PQC) algorithms, specifically ML-DSA and ML-KEM, for authentication and authorization. The proposed system demonstrates a 90% improvement in token generation speed post-migration from traditional cryptosystems and a 331% increase in key-storage speed when storing PQC keys using a novel vector database mechanism. Additionally, an enhanced risk-based authentication model is developed, achieving a 98% accuracy in detecting risky logins, surpassing existing models. These contributions offer a comprehensive, efficient, and secure SSO system resistant to quantum attacks, addressing the limitations of current systems that do not fully integrate PQC algorithms or optimized key storage solutions.
暂无评论