|
|
|
Manoj Pokharel, Chandramani Aryal
Pág. 217 - 233
Local people are the major stakeholders of biodiversity conservation. Human-wildlife conflict (HWC) could result in a negative attitude of the general public towards wildlife adding challenges for conservation. This is more applicable in the landscapes w...
ver más
|
|
|
|
|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Andreea Bianca Popescu, Ioana Antonia Taca, Anamaria Vizitiu, Cosmin Ioan Nita, Constantin Suciu, Lucian Mihai Itu and Alexandru Scafa-Udriste
Deep learning (DL)-based algorithms have demonstrated remarkable results in potentially improving the performance and the efficiency of healthcare applications. Since the data typically needs to leave the healthcare facility for performing model training...
ver más
|
|
|
|
|
|
|
Gerald Nestler, Christian Kloeckner, Stefanie Mueller
Pág. Finance an - 43
The work of the artist and writer Gerald Nestler explores finance and its social implications since the mid-1990s. Based on his professional experience as a trader as well as on post-disciplinary research, he has developed a unique approach that brings t...
ver más
|
|
|
|
|
|
|
Muhammad Ubale Kiru
Pág. 135 - 150
Humanoid and autonomous robots are well known globally not just for their intelligence, but also because they are highly automated and advanced. From the time of their first invention and usage till date, Man has been at the receiving end of their limita...
ver más
|
|
|
|
|
|
|
Chingiz Alimbayev,Zhadyra Alimbayeva,Kassymbek Ozhikenov,Oleg Bodin,Yerkat Mukazhanov
Pág. 12 - 22
Cardiovascular diseases continue to be the main cause of mortality. According to the official source, over the past three years in Kazakhstan, an average of 179,200 people dies from the coronary disease per year. 1,360,000 people suffer from th...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Songshen Han, Kaiyong Xu, Songhui Guo, Miao Yu and Bo Yang
Automatic Speech Recognition (ASR) provides a new way of human-computer interaction. However, it is vulnerable to adversarial examples, which are obtained by deliberately adding perturbations to the original audios. Thorough studies on the universal feat...
ver más
|
|
|
|
|
|
|
Magdalena Mazur-Milecka, Jacek Ruminski, Wojciech Glac and Natalia Glowacka
Automation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult t...
ver más
|
|
|
|
|
|
|
Jian Wang and Ying Li
Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at runt...
ver más
|
|
|
|
|
|
|
A. López,V.E. Parnás,J. Cataldo
Pág. Page 15 - 24
Over the last decades, renewable energy resources have gained an increasing interest for human development and, specifically, photovoltaic solar energy has shown a speedy and rising expansion. Several photovoltaic solar panel farms have been built in man...
ver más
|
|
|
|
|
|
|
Dr. Harsha S,Dr. Khalid Nazim S A,Dr. S Balaji,Vallabh V Rao
In the current world, all the devices are aiming to be or already are wireless and mobile. The trend is building smarter devices that offer the users all their required services with minimal human intervention. Due to this all manufacturers design their ...
ver más
|
|
|
|
|
|
|
Manish Kumar, Amandeep Brar, Monika Yadav, Aakash Chawade, V. Vivekanand and Nidhi Pareek
Crop cultivation is crucial for the existence of human beings, as it fulfills our nutritional requirements. Crops and other plants are always at a high risk of being attacked by phytopathogens, especially pathogenic fungi. Although plants have a well-dev...
ver más
|
|
|
|
|
|
|
Dragan Petrovic
Pág. 191 - 205
If we start from the presumption that the aim of the theoretical analysis of the complex socio-economic reality is to provide certain knowledge by applying of which there can be improvement and betterment of that reality, then economical and theoretical ...
ver más
|
|
|
|
|
|
|
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho...
ver más
|
|
|
|
|
|
|
Shunyi Liao, Feng Gao, Lei Feng, Jiemin Wu, Zexia Wang and Wangyang Chen
Out-of-hospital cardiac arrest (OHCA) causes a high mortality rate each year, which is a threat to human well-being and health. An automated external defibrillator (AED) is an effective device for heart attack-related diseases and is a panacea to save OH...
ver más
|
|
|
|
|
|
|
Feng Wang, Peng Huang, Rongxin Zhao, Huayong Wu, Mengjin Sun, Zijie Zhou and Yun Xing
Debris poses multifaceted risks and jeopardizes various aspects of the environment, human health, safety, and infrastructure. The debris trajectory in turbulent wind flow is more dispersed due to the inherent randomness of the turbulent winds. This paper...
ver más
|
|
|
|
|
|
|
Jiaqi Zhao, Ming Xu, Yunzhi Chen and Guoliang Xu
Nowdays, DNNs (Deep Neural Networks) are widely used in the field of DDoS attack detection. However, designing a good DNN architecture relies on the designer?s experience and requires considerable work. In this paper, a GA (genetic algorithm) is used to ...
ver más
|
|
|
|
|
|
|
Muqing He, Deqing Zou, Weizhong Qiang, Shouhuai Xu, Wenbo Wu and Hai Jin
In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data sharing....
ver más
|
|
|
|
|
|
|
Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang and Zhuming Bi
Speaker verification systems use human voices as an important biometric to identify legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart homes against illegal access. Recent studies have demonstrated that speaker ve...
ver más
|
|
|
|