ABSTRACT In order to ensure a company’s Internet security, SIEM (Security Information and Event Management) system is in place to simplify the various preventive technologies
ABSTRACT In order to ensure a company’s Internet security, SIEM (Security Information and Event Management) system is in place to simplify the various preventive technologies
ABSTRACT: Objective assessment of multimedia quality using machine learning (ML) has been gaining popularity especially in the context of both traditional (e.g., terrestrial and satellite
ABSTRACT: The appearance of malicious apps is a serious threat to the Android platform. Most types of network interfaces based on the integrated functions,
ABSTRACT: Internet of Things (IoT) in military settings generally consists of a diverse range of Internet-connected devices and nodes (e.g. medical devices and wearable combat
ABSTRACT: Through series-line-up improvements Generation approaches to configuration, short text dialog (STC) becomes attractive. Classical sequence-line-line approaches Short text conversations often suffer from poor
Image recolouring is a technique that can transfer image Color or theme and result in an imperceptible change in human eyes. Although image re-Colouring is
Abstract: The emerging edge computing paradigm promises to deliver superior user experience and enable a wide range of Internet of Things (IoT) applications. In this
ABSTRAT: Support vector regression (SVR) is one of the most powerful and widely used machine learning algorithms regarding prediction. The kernel type, penalty factor and
ABSTRACT: Traffic accidents are especially intense for a rainy day, Night, rainy season, rainy season, ice and day without street lighting Many low-level conditions. Current
ABSTRACT: Analysing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively