Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip...
详细信息
TCP provides suboptimal performance when it comes to wireless or mobile networks. End-to-end connectivity with reliability is a big challenge in IoTs that have restricted memory and processor resources. Mainly, TCP wa...
详细信息
Early and accurate detection of anomalous events on the freeway, such as accidents, can improve emergency response and clearance. However, existing delays and mistakes from manual crash reporting records make it a dif...
Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and *** a market worth millions of dollars,Echo is used for diverse tasks such as accessing onlin...
详细信息
Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and *** a market worth millions of dollars,Echo is used for diverse tasks such as accessing online information,making phone calls,purchasing items,and controlling the smart *** offers user-friendly voice interaction to automate everyday tasks making it a massive *** many people view Amazon Echo as a helpful assistant at home or office,few know its underlying security and privacy *** this paper,we present the findings of our research on Amazon Echo’s security and privacy *** findings are divided into different categories by vulnerability or *** proposed mitigation(s)to the vulnerabilities are also presented in the *** conclude that though numerous privacy concerns and security vulnerabilities associated with the device are mitigated,many vulnerabilities still need to be addressed.
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ...
详细信息
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple *** different programming paradigms,such as Message Passing Interface(MPI),Open Multiple Processing(OpenMP),and Open Accelerators(OpenACC),can increase computation speed and improve *** the integration of multiple models,the probability of runtime errors increases,making their detection difficult,especially in the absence of testing techniques that can detect these *** studies have been conducted to identify these errors,but no technique exists for detecting errors in three-level programming *** the increasing research that integrates the three programming models,MPI,OpenMP,and OpenACC,a testing technology to detect runtime errors,such as deadlocks and race conditions,which can arise from this integration has not been ***,this paper begins with a definition and explanation of runtime errors that result fromintegrating the three programming models that compilers cannot *** the first time,this paper presents a classification of operational errors that can result from the integration of the three *** paper also proposes a parallel hybrid testing technique for detecting runtime errors in systems built in the C++programming language that uses the triple programming models MPI,OpenMP,and *** hybrid technology combines static technology and dynamic technology,given that some errors can be detected using static techniques,whereas others can be detected using dynamic *** hybrid technique can detect more errors because it combines two distinct *** proposed static technology detects a wide range of error types in less time,whereas a portion of the potential errors that may or may not occur depending on the 4502 CMC,2023,vol.74,no.2 operating environme
Generalized-linear dynamical models (GLDMs) remain a widely-used framework within neuroscience for modeling time-series data, such as neural spiking activity or categorical decision outcomes. Whereas the standard usag...
In this paper, we present a novel deep learning model medical network (MedNetV3) developed for brain tumor detection. It incorporates advanced data augmentation techniques based on the MobileNetV3 architecture. MedNet...
详细信息
In Ad customization, several approaches are employed to improve the relevance level of the message for monitoring the user performance according to the prior search history (e.g., retargeting) or by gathering particul...
详细信息
Broadcasting is an information dissemination primitive where a message is passed from one node (called originator) to all other nodes in the network. With the increasing interest in interconnection networks, an extens...
详细信息
In IoT systems managing multiple devices simultaneously, errors in system controllers often undermine intended operations. Formal verification offers a method to assess system reliability. Colored Generalized Stochast...
详细信息
暂无评论