|
|
|
Ancilon Leuch Alencar, Marcelo Dornbusch Lopes, Anita Maria da Rocha Fernandes, Julio Cesar Santos dos Anjos, Juan Francisco De Paz Santana and Valderi Reis Quietinho Leithardt
In the current era of social media, the proliferation of images sourced from unreliable origins underscores the pressing need for robust methods to detect forged content, particularly amidst the rapid evolution of image manipulation technologies. Existin...
ver más
|
|
|
|
|
|
|
Paniti Netinant, Thitipong Utsanok, Meennapa Rukhiran and Suttipong Klongdee
With the rapid rise of digitalization in the global economy, home security systems have become increasingly important for personal comfort and property protection. The collaboration between humans, the Internet of Things (IoT), and smart homes can be hig...
ver más
|
|
|
|
|
|
|
Charalampos S. Kouzinopoulos, Eleftheria Maria Pechlivani, Nikolaos Giakoumoglou, Alexios Papaioannou, Sotirios Pemas, Panagiotis Christakakis, Dimosthenis Ioannidis and Dimitrios Tzovaras
Citizen science reinforces the development of emergent tools for the surveillance, monitoring, and early detection of biological invasions, enhancing biosecurity resilience. The contribution of farmers and farm citizens is vital, as volunteers can streng...
ver más
|
|
|
|
|
|
|
Vicky Garcia Rodriguez, Layton Vandestroet, Vinura C. Abeysekara, Kim Ominski, Emmanuel W. Bumunang, Tim McAllister, Stephanie Terry, Luis Alberto Miranda-Romero and Kim Stanford
In Canada, approximately 11.2 million metric tons of avoidable food waste (FW) is produced per year. Preservation of a greater proportion of this FW for use as livestock feed would have significant environmental and socioeconomic benefits. Therefore, thi...
ver más
|
|
|
|
|
|
|
Fan Yin, Chao Li, Haibin Wang, Shihong Zhou, Leixin Nie, Yonglin Zhang and Hao Yin
Digital beamforming techniques find wide applications in the field of underwater acoustic array signal processing. However, their azimuthal resolution has long been constrained by the Rayleigh limit, consequently limiting their detection performance. In ...
ver más
|
|
|
|
|
|
|
Qiankun Yu, Min Zhu, Wen Zhang, Jian Shi and Yan Liu
Sound source recognition is a very important application of passive sonar. How to distinguish between surface and underwater acoustic sources has always been a challenge. Due to the mixing of underwater target radiated noise and marine environmental nois...
ver más
|
|
|
|
|
|
|
Won Shin, Da-Sol Kim and Hyunsuk Ko
In submarine warfare systems, passive SONAR is commonly used to detect enemy targets while concealing one?s own submarine. The bearing information of a target obtained from passive SONAR can be accumulated over time and visually represented as a two-dime...
ver más
|
|
|
|
|
|
|
Ganjar Alfian, Muhammad Syafrudin, Norma Latif Fitriyani, Sahirul Alam, Dinar Nugroho Pratomo, Lukman Subekti, Muhammad Qois Huzyan Octava, Ninis Dyah Yulianingsih, Fransiskus Tatas Dwi Atmaji and Filip Benes
In recent years, radio frequency identification (RFID) technology has been utilized to monitor product movements within a supply chain in real time. By utilizing RFID technology, the products can be tracked automatically in real-time. However, the RFID c...
ver más
|
|
|
|
|
|
|
Riccardo Vettraino, Valeria Valentini, Paola Pogliani, Marco Ricci, Stefano Laureti, Serena Calvelli, Rocco Zito, Luca Lanteri and Claudia Pelosi
This paper summarizes the main results of the study, diagnostics, and restorations conducted and applied to a 16th century wall painting (a portion of the frieze and the Riario coat of arm) in Palazzo Gallo (Bagnaia, Viterbo district?central Italy) recen...
ver más
|
|
|
|
|
|
|
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me...
ver más
|
|
|
|