The adoption of charging vehicles in Rajshahi has emerged as a significant step towards reducing air pollution and promoting a healthy, green city. However, the current centralized licensing system poses challenges su...
详细信息
Ensuring the privacy and accuracy of interconnected network devices is crucial in the Internet of Things (IoT) landscape, especially when deploying Intrusion Detection Systems (IDS) on devices with constrained resourc...
详细信息
With the widespread use of digital media, amount of visual content on the internet and the incidence of image plagiarism has also increased. In various domains including academia, journalism and creative industries, u...
详细信息
This paper proposes SroX, a novel approach for accelerating Hidden Weight creation in neural networks, which is a critical component of neural network training that can significantly impact the overall efficiency of t...
详细信息
Discovering emerging entities (EEs) is the problem of finding entities before their establishment. These entities can be critical for individuals, companies, and governments. Many of these entities can be discovered o...
详细信息
Stability of power electronic converters is one of the most important problems related to their dynamics. The problems related to global asymptotic stability is discussed here. The design example used is DC-DC buck co...
详细信息
Eye diseases are an important public health concern that affects millions of people around the world. The detection and diagnosis of these disorders at an early stage is crucial for timely intervention and treatment. ...
详细信息
With the recent development of information technology, the importance of protecting personal information has increased. Because of the vulnerability in passwords, biometric authentication is now being used as a method...
详细信息
Intrusion detection is a form of anomalous activity detection in communication network traffic. Continual learning (CL) approaches to the intrusion detection task accumulate old knowledge while adapting to the latest ...
详细信息
The Shor algorithm demonstrates the significant risk that quantum attacks pose to the security of widely used cryptographic primitives. However, code-based cryptography has been shown to be resistant to these attacks....
详细信息
暂无评论