Results 1 to 10 of about 112,448 (58)
Covert communication in relay and RIS networks
Covert communication aims to prevent the warden from detecting the presence of communications, i.e. with a negligible detection probability. When the distance between the transmitter and the legitimate receiver is large, large transmission power is ...
Hu Jinsong+4 more
doaj +1 more source
This paper develops an event-triggered resilient consensus control method for the nonlinear multiple unmanned systems with a data-based autoregressive integrated moving average (ARIMA) agent state prediction mechanism against periodic denial-of-service ...
Yang Haichuan, Yu Ziquan, Zhang Youmin
doaj +1 more source
Multi-path exploration guided by taint and probability against evasive malware
Static analysis is often impeded by malware obfuscation techniques, such as encryption and packing, whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information. Unfortunately, malware can employ evasive
Xu Fangzhou+3 more
doaj +1 more source
A novel heterogenous ensemble theory for symmetric 5G cells segmentation: Intelligent RAN analytics
MNOs are investing more in 5G, rolling out sites in urban and specific rural areas. Meanwhile, it remains imperative to consistently maintain the network performance above a certain threshold for optimal user experience.
Jean Nestor M. Dahj+2 more
doaj +1 more source
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing restrictions on app behavior ...
Sunil Gautam+4 more
doaj +1 more source
In cloud environments, optimization of resource utilizations is one among the predominant challenges. The two sub-research topics are cloud resource prediction and allocation.
P. Karthikeyan
doaj +1 more source
A systematic review of decentralized finance protocols
Decentralized finance (DeFi) has revolutionized the financial industry in recent years. Industries such as banking, insurance, and investment are experiencing a significant shift due to the growth of DeFi.
Kaushal Shah+4 more
doaj +1 more source
Conversational chat system using attention mechanism for COVID-19 inquiries
Conversational artificial intelligence (AI) is a type of artificial intelligence that uses machine learning techniques to understand and respond to user inputs.
Wang Xin Hui+3 more
doaj +1 more source
Customer churning analysis using machine learning algorithms
Businesses must compete fiercely to win over new consumers from suppliers. Since it directly affects a company's revenue, client retention is a hot topic for analysis, and early detection of client churn enables businesses to take proactive measures to ...
B. Prabadevi, R. Shalini, B.R. Kavitha
doaj +1 more source
A comparative study of feature selection and feature extraction methods for financial distress identification [PDF]
Financial distress identification remains an essential topic in the scientific literature due to its importance for society and the economy. The advancements in information technology and the escalating volume of stored data have led to the emergence of ...
Dovilė Kuizinienė+6 more
doaj +2 more sources