Results 71 to 80 of about 2,054,840 (293)
Manet: motion-aware network for video action recognition
Video action recognition is a fundamental task in video understanding. Actions in videos may vary at different speeds or scales, and it is difficult to cope with a wide variety of actions by relying on a single spatio-temporal scale to extract features ...
Xiaoyang Li +4 more
doaj +1 more source
Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin +4 more
doaj +1 more source
Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core
ABSTRACT This article presents the development of a five‐phase Indigenous Data Governance (IDGov) Framework in Australia, focusing on partnerships between the Aboriginal Community Controlled Health Organisation (ACCHO) sector and non‐Indigenous health entities.
Jacob Prehn +4 more
wiley +1 more source
Temporal action proposal generation in an untrimmed video is very challenging, and comprehensive context exploration is critically important to generate accurate candidates of action instances. This paper proposes a Temporal-aware Attention Network (TAN)
Yanyan Jiao +4 more
doaj +1 more source
The gamification of cybersecurity training [PDF]
Due to the rapidly and continued evolving nature of technology, there is a constant need to update police officers’ training in cyber security to ensure that the UK continues to be a secure place to live and do business.
Coull, Natalie +7 more
core +2 more sources
Abstract The current study aimed to investigate whether negative student–teacher relationships and within‐class perceptions of the class climate at the individual level, and positive class climates at the classroom level in fifth grade, were associated with traditional bullying and cyberbullying perpetration 1 year later, in sixth grade, in a sample of
Robert Thornberg +3 more
wiley +1 more source
Symmetric Encryption Algorithms in a Polynomial Residue Number System
In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on the polynomial residue number system for the first time. The main feature of the proposed approach is that when reconstructing the polynomial based on the
I. Yakymenko +3 more
doaj +1 more source
N-Trans: Parallel Detection Algorithm for DGA Domain Names
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals.
Cheng Yang +4 more
doaj +1 more source
Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey
Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as data,
Waqas Ahmad +4 more
semanticscholar +1 more source

