Suggested Topics within your search.
Suggested Topics within your search.
-
10981
SoK: Delegated Security in the Internet of Things
Published 2025-04-01“…The increased use of electronic devices in the Internet of Things (IoT) leads not only to an improved comfort of living but also to an increased risk of attacks. IoT security has thus become an important research field. …”
Get full text
Article -
10982
Dazzle: Oversampled Image Reconstruction and Difference-imaging Photometry for the Nancy Grace Roman Space Telescope
Published 2025-01-01“…We present algorithms and software for constructing high-precision difference images to detect and measure transients, such as microlensing events, in crowded stellar fields using the Nancy Grace Roman Space Telescope. …”
Get full text
Article -
10983
Absence and Blow-Up of Solutions to Singular Perturbation Problems in the Case of Exchange of Stabilities
Published 2016-10-01“…We consider some singular perturbation problems in the case where a degenerate equation has intersecting roots (this case is also referred to as ‘ the exchange of stabilities’). …”
Get full text
Article -
10984
Subtraction Method for Subpixel Stitching: Synthetic Aperture Holographic Imaging
Published 2025-05-01“…With optimization, the result shows that the SM achieves high accuracy and requires less computational time for image stitching when compared to contemporary image stitching algorithms.…”
Get full text
Article -
10985
Compressive Sensing of Multichannel Electroencephalogram Signals Based on Nonlocal Low-Rank and Cosparse Priors
Published 2024-12-01“…However, this is ignored by contemporary compressive sensing (CS) algorithms, resulting in less recovery quality than is ideal. …”
Get full text
Article -
10986
Harnessing Generative AI in Higher Education: Opportunities, Challenges, and Ethical Imperatives
Published 2025-04-01“…It explores how AI tools can enhance student engagement, support teacher empowerment, and enable inclusive learning, especially in under-resourced settings. The paper also interrogates key ethical concerns, such as academic integrity, data privacy, algorithmic bias, and equity, while analysing current government initiatives aimed at responsible AI adoption. …”
Get full text
Article -
10987
Point Cloud Deep Learning Methods for Particle Shower Reconstruction in the DHCAL
Published 2025-01-01“…Combined with Graph Attention Transformers (GATs) and DeepSets algorithms, this results in an improvement over existing baseline techniques for particle identification and energy resolution. …”
Get full text
Article -
10988
Estimating the influence of accounting variables change on earnings management detection
Published 2017-05-01“…Neither of these two detection algorithms attempts to quantify earnings management and connect it with the infractions committed by the companies, charged by the regulator (in this case – U.S. …”
Get full text
Article -
10989
Statistical Analysis of Reinforced Concrete Bridges in Estonia
Published 2017-12-01“…Principal components and weighing factors, which are calculated for bridges with different typology, also have differences in results and element groups where variation is retained.…”
Get full text
Article -
10990
Tafsir Digital: Antara Adaptasi dan Krisis Otoritas Keagamaan
Published 2025-06-01“…The study reveals the ambivalence of digital tafsir, while innovative, it is also vulnerable to epistemological fragmentation. …”
Get full text
Article -
10991
Television in and After the Archive: Catalogues, Databases, Interfaces and Other Ways to Organize Audiovisual Records
Published 2024-12-01“…Significant attention is given to the technocultural transformation of the archival work in light of digital and algorithmic practices, emphasizing how these innovations contribute to the making of cultural identities and collective memory while also raising questions on the circulation of television content after its initial broadcasting lifecycle. …”
Get full text
Article -
10992
TSQ: An Optimized Framework for Efficiently Answering Time Series Queries
Published 2025-02-01“…Firstly, dimensionality reduction algorithms can be employed to reduce the complexity of the data. …”
Get full text
Article -
10993
Improving Cost Contingency Estimation in Infrastructure Projects with Artificial Neural Networks and a Complexity Index
Published 2025-03-01“…These findings not only advance the theoretical framework of ML algorithms for cost contingency prediction by implementing interval predictions but also provide practitioners with improved ML-based tools for more accurate infrastructure project cost performance predictions.…”
Get full text
Article -
10994
Speech Enhancement using Greedy Dictionary Learning and Sparse Recovery
Published 2023-01-01“…With a bit-precision of Q7 fixed-point arithmetic, this approach is also used in resource-constrained embedded systems, and the performance is considerably better than other algorithms. …”
Get full text
Article -
10995
Enhancing Security of Error Correction in Quantum Key Distribution Using Tree Parity Machine Update Rule Randomization
Published 2025-07-01“…Two dynamic update algorithms—dynamic_rows and dynamic_matrix—are proposed and tested. …”
Get full text
Article -
10996
Design of machine learning-based controllers for speed control of PMSM drive
Published 2025-05-01“…A comparison of the simulation results between the PI controller and the suggested control algorithms validates the effectiveness of the proposed control algorithms for speed control applications. …”
Get full text
Article -
10997
A machine learning-based efficient anomaly detection system for enhanced security in compromised and maligned IoT Networks
Published 2025-06-01“…The proliferation of the Internet of Things (IoT) has brought about unprecedented connectivity and automation, yet it has also introduced significant security vulnerabilities. …”
Get full text
Article -
10998
Comparison of RRT and TRRT Object Arrangement Path Planning Robot for Retail Warehouse Using CoppeliaSim
Published 2023-10-01“…To address these issues, the Transition-based Rapidly-exploring Random Tree Star (TRRT) is proposed to achieve the shortest distance in shelving items at warehouse. The study also implements inverse kinematics algorithms for smooth arm manipulation. …”
Get full text
Article -
10999
Payload location for JPEG image steganography based on co-frequency sub-image filtering
Published 2020-01-01“…Finally, using these methods, payload location algorithms are designed for two common JPEG image steganography algorithms: JSteg and F5. …”
Get full text
Article -
11000
Wavelets, approximation, and comperssion
Published 2024-11-01“…In particular, approximation results are reviewed, and the implication on compression algorithms is discussed. New constructions and open problems are also addressed. …”
Get full text
Article