Results 21 to 30 of about 234,249 (179)
Proactive Random-Forest Autoscaler for Microservice Resource Allocation
Cloud service providers have been shifting their workloads to microservices to take advantage of their modularity, flexibility, agility, and scalability. However, numerous obstacles remain to achieving the most out of microservice deployments, especially
Lamees M. Al Qassem +3 more
doaj +1 more source
Functional Near-Infrared Spectroscopy (fNIRS) is a hemodynamic modality in human cognitive workload assessment receiving popularity due to its easier implementation, non-invasiveness, low cost and other benefits from the signal-processing point of view ...
Masudur R. Siddiquee +5 more
doaj +1 more source
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research
This survey presents a comprehensive review of current literature on Explainable Artificial Intelligence (XAI) methods for cyber security applications. Due to the rapid development of Internet-connected systems and Artificial Intelligence in recent years,
Zhibo Zhang +4 more
doaj +1 more source
Potential-Driven Model for Influence Maximization in Social Networks
The adoption of a new technology, the spreading of ideologies, the transmission of contagions, are examples of spreading phenomena that can be modelled at two distinct levels of resolution, a macroscopic and a microscopic level.In the present work, we ...
Zineb Felfli +3 more
doaj +1 more source
Cyber-Physical Systems Security [PDF]
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and ...
openaire +3 more sources
Community detection and unveiling of hierarchy in networks: a density-based clustering approach
The unveiling of communities within a network or graph, and the hierarchization of its members that results is of utmost importance in areas ranging from social to biochemical networks, from electronic circuits to cybersecurity.
Zineb Felfli +3 more
doaj +1 more source
Path planning plays an important role in navigation and motion planning for robotics and automated driving applications. Most existing methods use iterative frameworks to calculate and plan the optimal path from the starting point to the endpoint ...
Tongfei Bian +2 more
doaj +1 more source
Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust
The semiconductor supply chain is vulnerable to multiple security attacks, such as hardware Trojan injection, intellectual property theft, and overproduction.
Ashfaq Ahmed +2 more
doaj +1 more source
Reinforcement and Curriculum Learning for Off-Road Navigation of an UGV with a 3D LiDAR
This paper presents the use of deep Reinforcement Learning (RL) for autonomous navigation of an Unmanned Ground Vehicle (UGV) with an onboard three-dimensional (3D) Light Detection and Ranging (LiDAR) sensor in off-road environments.
Manuel Sánchez +2 more
doaj +1 more source
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms.
Johannes Kölsch +3 more
doaj +1 more source

