Search
Search Results
-
Nominal Marker “de” in Modern Chinese and Its Role of Marking Presupposition
Based on the studies on the nominalization marker “de” in modern Chinese, the notion of the presupposition, and the theory of systematic functional... -
Separators in Continuous Petri Nets
Leroux has proved that unreachability in Petri nets can be witnessed by a Presburger separator, i.e. if a marking... -
Packet Filtering Mechanism to Defend Against DDoS Attack in Blockchain Network
With the tremendous increase in the Blockchain network scale, and Cryptocurrency network, the Distributed Denial of Service (DDoS) attacks create... -
Blocksequences of k-local Words
The locality of words is a relatively young structural complexity measure, introduced by Day et al. in 2017 in order to define classes of patterns... -
Automated Reporting of Code Quality Issues in Student Submissions
Despite its importance in industry, code quality is often overlooked in academia. A number of automated tools to report code quality have been... -
The Use of Binary Scales in Rubrics to Evaluate Computer Science Assessments
Creating a rubric for project based assessment in ICT modules is a complex process and can be quite subjective if the wrong scales are used for... -
Two-step learning for crowdsourcing data classification
Crowdsourcing learning (Bonald and Combes
2016 ; Dawid and Skene, J R Stat Soc: Series C (Appl Stat), 28(1):20–281979 ; Karger et al.2011 ; Li et al,... -
Application of Formative Assessment Model in College English Course Assisted by Digital Platforms---Taking HFUT as an Example
With the help of internet and digital technology, online and blended teaching in institutions of higher learning in China are becoming a reality and... -
Enhancing Indian sign language recognition through data augmentation and visual transformer
This paper introduces a novel approach to Indian Sign Language Recognition (ISLR) by integrating Keras, Visual Transformers (ViT), and sophisticated...
-
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development
The rise in frequency and volume of Distributed Denial of Service (DDoS) attacks has made it a destructive weapon of attackers which can disrupt the...
-
Multimedia datasets for anomaly detection: a review
Multimedia anomaly datasets play a crucial role in automated surveillance. They have a wide range of applications expanding from outlier objects/...
-
Localization-based waiter robot for dynamic environment using Internet of Things
In response to the growing demand for robotic service providers in the hospitality industry, this work presents a cost-effective IoT-based waiter...
-
OLive-M: A SecANet Use Case for Model-Based Obstruction Solving
The OLive-M approach in this chapter and the OLive-L approach in Chapter 5 will illustrate how the SecANet approach presented in Chapter 3 can be... -
Summarizing Key Insights
In the unfolding narrative of technological evolution, Generative AI emerges as a pivotal chapter, marking the confluence of computational precision... -
An End-to-End Practical System for Road Marking Detection
Road marking is a special kind of symbol on the road surface, used to regulate the behavior of traffic participants. According to our survey, it... -
AIoT-CitySense: AI and IoT-Driven City-Scale Sensing for Roadside Infrastructure Maintenance
The transformation of cities into smarter and more efficient environments relies on proactive and timely detection and maintenance of city-wide...
-
Enhancing ASD classification through hybrid attention-based learning of facial features
Autism spectrum disorder (ASD) is a multifaceted neurological developmental condition that manifests in diverse ways. It addresses the need for early...
-
Nonlinear Instabilities in TCP-RED
With the growing size and popularity of the Internet, congestion control has emerged as an important problem. Poor management of congestion can... -
Label-free retraining for improved ground plane segmentation
Due to increased potential applications of unmanned aerial vehicles over urban areas, algorithms for the safe landing of these devices have become...
-
Watermarkable Public Key Encryption with Efficient Extraction Under Standard Assumptions
The current state of the art in watermarked public-key encryption schemes under standard cryptographic assumptions suggests that extracting the...