|
|
|
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,...
ver más
|
|
|
|
|
|
|
Antoine Falconnet, Constantinos K. Coursaris, Joerg Beringer, Wietske Van Osch, Sylvain Sénécal and Pierre-Majorique Léger
Advice-giving systems such as decision support systems and recommender systems (RS) utilize algorithms to provide users with decision support by generating ?advice? ranging from tailored alerts for situational exception events to product recommendations ...
ver más
|
|
|
|
|
|
|
Brent Pethers and Abubakar Bello
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat...
ver más
|
|
|
|
|
|
|
Bochuan Hou, Yang Xin, Hongliang Zhu, Yixian Yang and Jianhua Yang
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from mu...
ver más
|
|
|
|
|
|
|
Jianping Song, Hong Ni and Xiaoyong Zhu
Many applications suitable for multicast transmission, such as video conferencing and live e-commerce, demand high Quality of Service (QoS) and require data delivery to be completed within specified delay constraints. Some methods have been proposed for ...
ver más
|
|
|
|
|
|
|
Hongyu Liu, Hong Ni and Rui Han
The control of transmission rates is currently a major topic in network research, as it plays a significant role in determining network performance. Traditional network design principles suggest that network nodes should only be responsible for forwardin...
ver más
|
|
|
|
|
|
|
Isha Kharub, Michael Lwin, Aila Khan, Omar Mubin and Suleman Shahid
This exploratory study examines the effectiveness of social robots? ability to deliver advertising messages using different ?appeals? in a business environment. Specifically, it explores the use of three types of message appeals in a human-robot interact...
ver más
|
|
|
|
|
|
|
Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori and Kalamullah Ramli
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for re...
ver más
|
|
|
|
|
|
|
Chenfang Zhang, Yong Gan and Ruisen Yang
The main steps in a graph neural network are message propagation and aggregation between nodes. Message propagation allows messages from distant nodes in the graph to be transmitted to the central node, while feature aggregation allows the central node t...
ver más
|
|
|
|
|
|
|
Nan Zhao, Nianmin Yao, Zhenguo Gao and Zhimao Lu
Message conflicts caused by large propagation delays severely affect the performance of Underwater Acoustic Networks (UWANs). It is necessary to design an efficient transmission scheduling algorithm to improve the network performance. Therefore, we propo...
ver más
|
|
|
|