Even if an explosive number of proposals and prototype systems of blockchain based certificates and verification have been suggested and implemented since 2015, still in the public service areas paper certificates are...
详细信息
Chili is a plant that originates from America and is included in the Solonaceae and Capsicum genera. One type of chili that is included in the large chili category is Katokkon chili, commonly referred to as Toraja chi...
详细信息
Virtual memory systems rely on the page table, a crucial component that maps virtual addresses to physical addresses (i.e., address translation). While the Radix Page Table (RPT) has traditionally been used for this t...
详细信息
Infectious waste management is a major environmental and public health challenge *** infectious wastes are often mixed with other waste,collected,and disposed of without taking measures to reduce *** the emergence of ...
详细信息
Infectious waste management is a major environmental and public health challenge *** infectious wastes are often mixed with other waste,collected,and disposed of without taking measures to reduce *** the emergence of the COVID-19 virus in early December 2019,there have been concerns about the dangers of infectious waste generated in healthcare facilities and ***,this review was conducted with the aim of investigating the methods of household infectious waste management in different countries/regions and evaluating the factors affecting the management of household infectious *** this study,we conducted a systematic literature search in four electronic databases(PubMed,Web of Science,Scopus,and ProQuest)to answer the research *** process was based on the new version of PRISMA *** total,52 documents out of 6742 were selected and *** review of studies based on content analysis led to the emergence of 12 main themes,36 sub-themes,and 112 *** main topics included education and culture,management measures,legal social support,economic support,technology,control and evaluation,waste generation,classification and collection,temporary storage,transportation,processing and recycling,and safe *** factors affecting household infectious waste management identified in this research can serve as a basis for future *** is also suitable for providing a comprehensive guide to the management of household infectious waste.
Delegated Proof of Stake (DPoS) is indeed a fascinating consensus algorithm used on various blockchain platforms. It was designed to address some of the scalability and energy consumption issues associated with Proof ...
详细信息
Digital transformation and predictive maintenance are still some of the key challenges faced by the industrial sector as it moves towards Industry 4.0. However, the lack of resources, experienced personnel, and the ab...
详细信息
Sign Language Recognition (SLR) tries to convert sign language into written or spoken form to enable communication between a deaf-mute person and a normal person. The task of communicating with disabled and impaired p...
详细信息
As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of *** safeguard these,a perimeter defence likeNIDS...
详细信息
As more business transactions and information services have been implemented via communication networks,both personal and organization assets encounter a higher risk of *** safeguard these,a perimeter defence likeNIDS(network-based intrusion detection system)can be effective for known *** has been a great deal of attention within the joint community of security and data science to improve machine-learning based NIDS such that it becomes more accurate for adversarial attacks,where obfuscation techniques are applied to disguise patterns of intrusive *** current research focuses on non-payload connections at the TCP(transmission control protocol)stack level that is applicable to different network *** contrary to the wrapper method introduced with the benchmark dataset,three new filter models are proposed to transform the feature space without knowledge of class *** ECT(ensemble clustering based transformation)techniques,i.e.,ECT-Subspace,ECT-Noise and ECT-Combined,are developed using the concept of ensemble clustering and three different ensemble generation strategies,i.e.,random feature subspace,feature noise injection and their *** on the empirical study with published dataset and four classification algorithms,new models usually outperform that original wrapper and other filter alternatives found in the *** is similarly summarized from the first experiment with basic classification of legitimate and direct attacks,and the second that focuses on recognizing obfuscated *** addition,analysis of algorithmic parameters,i.e.,ensemble size and level of noise,is provided as a guideline for a practical use.
In the massive Machine-Type Communication (mMTC), the exponential growth of Internet of Things (IoT) devices over Low Power Wide Area Networks (LPWANs) presents substantial issues regarding energy efficiency and stabi...
详细信息
Financial fraud detection is a major challenge faced by financial institutions. For transaction fraud detection, Deep learning and machine learning algorithms are frequently used;however, their efficacy is severely li...
详细信息
暂无评论