Versatile Video Coding (H.266/VVC) is the newest video coding standard jointly developed by the Joint Video Experts Team (JVET), which is organized by the ITU-T Video Coding Experts Group (VCEG) and the ISO/IEC Moving...
详细信息
In the current landscape, security challenges extend to various domains, such as IoT networking, UAV communication, and VANETs, rendering underlying infrastructures increasingly susceptible to cyber-attacks. The taxon...
详细信息
COVID-19 is generated by the SARS-CoV2 virus, which has caused an outbreak around the world. Since 2020, it has been labeled a pandemic. Due to the daily growth in the number of cases, this takes time for demonstratin...
详细信息
Rice, a crucial global food source, faces numerous challenges impacting its quality and quantity. Pakistan is a significant rice producer and needs more agricultural technological advancements. Conventional disease de...
详细信息
This study utilizes the game rules of a falling-puzzle game, developed as a consumer-oriented digital game, in programming education for young people. When digital games are used in programming education, they are oft...
详细信息
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be ri...
详细信息
The advanced integrated circuits have been widely used in various situations including the Internet of Things,wireless communication,*** its manufacturing process exists unreliability,so cryptographic chips must be rigorously *** to scan testing provides high test coverage,it is applied to the testing of cryptographic integrated ***,while providing good controllability and observability,it also provides attackers with a backdoor to steal *** the text,a novel protection scheme is put forward to resist scan-based attacks,in which we first use the responses generated by a strong physical unclonable function circuit to solidify fuseantifuse structures in a non-linear shift register(NLSR),then determine the scan input code according to the configuration of the fuse-antifuse structures and the styles of connection between the NLSR cells and the scan *** the key is right,the chip can be tested normally;otherwise,the data in the scan chain cannot be propagated normally,it is also impossible for illegal users to derive the desired scan *** proposed technique not only enhances the security of cryptographic chips,but also incurs acceptable overhead.
software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estima...
详细信息
software cost estimation is a crucial aspect of software project management,significantly impacting productivity and *** research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset,which comprises data from 93 unique software projects with 24 *** applying multiple machine learning algorithms alongside three feature selection methods,this study aims to reduce data redundancy and enhance model *** findings reveal that the principal component analysis(PCA)-based feature selection technique achieved the highest performance,underscoring the importance of optimal feature selection in improving software cost estimation *** is demonstrated that our proposed method outperforms the existing method while achieving the highest precision,accuracy,and recall rates.
A storage structure C-L Matrix based on linked lists and matrices is proposed to address the issue of spatiotemporal data not fully utilizing its temporal and spatial attributes in blockchain, and efficient queries ar...
详细信息
Performing an object detection task after the restoration of a hazy image, or rather detecting with the network backbone directly, will result in the inclusion of information mixed with dehazing, which tends to interf...
详细信息
Child safety and well-being in daycare settings are important, thus it is vital that the persons in charge be attentive to them. This research tries to solve the problem by introducing a smart and detailed monitoring ...
详细信息
暂无评论