|
|
|
Baolong Liu and Xiaohao Su
In order to solve the problem of tag collision in Radio Frequency Identification (RFID) system, the paper proposes a Multi-Bit Identification Collision Tree (MICT) algorithm based on a collision tree. The algorithm uses an array scheme to mark the collis...
ver más
|
|
|
|
|
|
|
Min-Jen Tsai, Ya-Chu Lee and Te-Ming Chen
QR codes (short for Quick Response codes) were originally developed for use in the automotive industry to track factory inventories and logistics, but their popularity has expanded significantly in the past few years due to the widespread applications of...
ver más
|
|
|
|
|
|
|
Dario Carrea, Antonio Abellan, Marc-Henri Derron, Neal Gauvin and Michel Jaboyedoff
The use of 3D point clouds to improve the understanding of natural phenomena is currently applied in natural hazard investigations, including the quantification of rockfall activity. However, 3D point cloud treatment is typically accomplished using nonde...
ver más
|
|
|
|
|
|
|
Abir Rahali and Moulay A. Akhloufi
To proactively mitigate malware threats, cybersecurity tools, such as anti-virus and anti-malware software, as well as firewalls, require frequent updates and proactive implementation. However, processing the vast amounts of dataset examples can be overw...
ver más
|
|
|
|
|
|
|
Anna Kurtukova, Aleksandr Romanov, Alexander Shelupanov and Anastasia Fedotova
This paper is a continuation of our previous work on solving source code authorship identification problems. The analysis of heterogeneous source code is a relevant issue for copyright protection in commercial software development. This is related to the...
ver más
|
|
|
|
|
|
|
Kun Qi, Chengqi Cheng, Yi?na Hu, Huaqiang Fang, Yan Ji and Bo Chen
|
|
|
|
|
|
|
Zhihuan Wang, Mengyuan Yao, Chenguang Meng and Christophe Claramunt
Preventing and controlling the risk of importing the coronavirus disease (COVID-19) has rapidly become a major concern. In addition to air freight, ocean-going ships play a non-negligible role in spreading COVID-19 due to frequent visits to countries wit...
ver más
|
|
|
|
|
|
|
Aleksandr Romanov, Anna Kurtukova, Anastasia Fedotova and Alexander Shelupanov
This article is part of a series aimed at determining the authorship of source codes. Analyzing binary code is a crucial aspect of cybersecurity, software development, and computer forensics, particularly in identifying malware authors. Any program is ma...
ver más
|
|
|
|
|
|
|
Marcos D. Mateus and Guilherme Franz
Sensitivity analysis (SA) has long been recognized as part of best practices to assess if any particular model can be suitable to inform decisions, despite its uncertainties. SA is a commonly used approach for identifying important parameters that domina...
ver más
|
|
|
|
|
|
|
Iurii Medvedev, Farhad Shadmand, Leandro Cruz and Nuno Gonçalves
Various modern security systems follow a tendency to simplify the usage of the existing biometric recognition solutions and embed them into ubiquitous portable devices. In this work, we continue the investigation and development of our method for securin...
ver más
|
|
|
|
|
|
|
Zhen Ren, Jianhua Wang and Decheng Wan
Planar motion mechanism (PMM) tests provide a means of obtaining the hydrodynamic derivatives needed to assess ship maneuverability properties. In this paper, the self-developed computational fluid dynamic (CFD) solver based on the open source code platf...
ver más
|
|
|
|
|
|
|
Nikolaos Bakas
Function approximation is a fundamental process in a variety of problems in computational mechanics, structural engineering, as well as other domains that require the precise approximation of a phenomenon with an analytic function. This work demonstrates...
ver más
|
|
|
|
|
|
|
Chen Deng, Chengqi Cheng, Tengteng Qu, Shuang Li and Bo Chen
With the exponential increase in the volume of automatic dependent surveillance-broadcast (ADS-B), and other types of air traffic control (ATC) data containing spatiotemporal attributes, it remains uncertain how to respond to immediate ATC data access wi...
ver más
|
|
|
|
|
|
|
Olivier Pantalé
Numerical methods based on finite element (FE) have proven their efficiency for many years in the thermomechanical simulation of forming processes. Nevertheless, the application of these methods to new materials requires the identification and implementa...
ver más
|
|
|
|
|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
|
Olivier Pantalé
Finite element (FE) simulations have been effective in simulating thermomechanical forming processes, yet challenges arise when applying them to new materials due to nonlinear behaviors. To address this, machine learning techniques and artificial neural ...
ver más
|
|
|
|
|
|
|
Jiyuan Tan, Limin Zhang and Zhaogen Zhong
Aiming to solve the problem of the distinction of scrambled linear block codes, a method for identifying the scrambling types of linear block codes by combining correlation features and convolution long short-term memory neural networks is proposed in th...
ver más
|
|
|
|
|
|
|
Nicola Altini, Giuseppe De Giosa, Nicola Fragasso, Claudia Coscia, Elena Sibilano, Berardino Prencipe, Sardar Mehboob Hussain, Antonio Brunetti, Domenico Buongiorno, Andrea Guerriero, Ilaria Sabina Tatò, Gioacchino Brunetti, Vito Triggiani and Vitoantonio Bevilacqua
The accurate segmentation and identification of vertebrae presents the foundations for spine analysis including fractures, malfunctions and other visual insights. The large-scale vertebrae segmentation challenge (VerSe), organized as a competition at the...
ver más
|
|
|
|
|
|
|
Abdulmajeed Aldabesh, Jassmen Soufi, Siddig Omer and Abdullah Haredy
The Kingdom of Saudi Arabia (KSA), as one of the largest polluters worldwide, has released its Vision 2030 that seeks sustainable development via economic diversification to transition towards lower CO2 energy systems. Due to fast population and economic...
ver más
|
|
|
|
|
|
|
Naseer Ali Hussien,Saif abd alradha alsaidi,Iman Kadhim Ajlan,Mohamed Fazil Mohamed Firdhous,Haider TH. Salim Alrikabi
Pág. pp. 17 - 29
The Internet of Things (IoT) incorporates most extensive number of innovations and imagines a mixture of things or questions around us that, through one of a kind tending to plans and standard correspondence conventions, consume the ability to connect th...
ver más
|
|
|
|