In this article, we have proposed Deep Learning techniques for cybersecurity in Unmanned Aerial Vehicles (UAVs). UAVs, also known as drones, have become versatile tools used in many applications. However, UA V cyberse...
详细信息
The process of a supply chain involves a series of activities that distribute, assemble, and manage products, transferring them from the supplier to the end consumer. It operates as a complex, interconnected network r...
详细信息
Integrating human-computer interaction with machine learning is an important development that contributes and opens the way for many experiences that serve the user. This research presents the scientific benefits and ...
详细信息
Image classification has grown increasingly popular due to the growing significance of machine learning and deep learning. Flower images may sometimes exhibit resemblances in terms of hue, form, and visual characteris...
详细信息
The rescaling method is presented to allow us establishing the interface functions and the nonnegative local solutions to the evolution of nonlinear degenerate parabolic p-Laplacian process with conservation laws that...
详细信息
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally...
详细信息
Vulnerable Road Users (VRUs) are at special risk in road traffic. The dissemination of information about VRUs in Intelligent Transportation Systems (ITS) can help to protect VRUs from various risks. The Vulnerable Roa...
详细信息
Answer set programming (ASP) is a declarative programming language suited to solve complex combinatorial search problems. Prioritized ASP is the subdiscipline of ASP which aims at prioritizing the models (answer sets)...
详细信息
Sorting networks are sorting algorithms that execute a sequence of operations independently of the input. Since they can be implemented directly as circuits, sorting networks are easy to implement in hardware – but t...
详细信息
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant ...
详细信息
暂无评论