Adversarial attacks and defenses in physiological computing: a systematic review
Physiological computing uses human physiological data as system inputs in real time. It includes, or significantly overlaps with, brain-computer interfaces, affective computing, adaptive automation, health informatics, and physiological signal based ...
Wu Dongrui +7 more
doaj +1 more source
INTEGRATED ESTIMATION OF SEISMIC PHYSICAL VULNERABILITY OF TEHRAN USING RULE BASED GRANULAR COMPUTING [PDF]
Tehran, the capital of Iran, is surrounded by the North Tehran fault, the Mosha fault and the Rey fault. This exposes the city to possibly huge earthquakes followed by dramatic human loss and physical damage, in particular as it contains a large number ...
H. Sheikhian, M. R. Delavar, A. Stein
doaj +1 more source
UNCERTAINTY MANAGEMENT IN SEISMIC VULNERABILITY ASSESSMENT USING GRANULAR COMPUTING BASED ON COVERING OF UNIVERSE [PDF]
Earthquake is an abrupt displacement of the earth's crust caused by the discharge of strain collected along faults or by volcanic eruptions. Earthquake as a recurring natural cataclysm has always been a matter of concern in Tehran, capital of Iran, as a ...
F. Khamespanah, M. R. Delavar, M. Zare
doaj +1 more source
PHYSICAL SEISMIC VULNERABILITY ASSESSMENT OF TEHRAN USING THE INTEGRATION OF GRANULAR COMPUTING AND INTERVAL DEMPSTER- SHAFER [PDF]
Several faults exist in the vicinity of Tehran, the capital of Iran such as North Tehran, Ray, Mosha and Kahrizak. One way to assist reducing the damage caused by the earthquake is the production of a seismic vulnerability map.
M. R. Delavar +3 more
doaj +1 more source
Vulnerabilities of Live-Streaming Services in Korea
Recently, the number of users and the demand for live-streaming services have increased. This has exponentially increased the traffic to such services, and live-streaming service platforms in Korea use a grid computing system that distributes traffic to ...
Sun-Hong Hwang +6 more
doaj +1 more source
iHVI: AN OPEN-SOURCE TOOLKIT FOR CONSTRUCTING INTEGRATED HEAT VULNERABILITY INDEX IN AUSTRALIA [PDF]
To tackle the increasing issue of heat risk in Australia and pressure of population growth, this project aimed to establish a first nationwide dynamic and interactive heat vulnerability assessment toolkit.
Q. (C. ). Sun +7 more
doaj +1 more source
A new method of software vulnerability detection based on a quantum neural network
In the field of network security, although there has been related work on software vulnerability detection based on classic machine learning, detection ability is directly proportional to the scale of training data.
Xin Zhou +9 more
doaj +1 more source
Comparative Analysis of 5G Mobile Communication Network Architectures
Mobile communication technology is evolving from 4G to 5G. Compared to previous generations, 5G has the capability to implement latency-critical services, such as autonomous driving, real-time AI on handheld devices and remote drone control. Multi-access
Woosik Lee +3 more
doaj +1 more source
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method [PDF]
With the rapid development of high-speed and large-scale complex network, network vulnerability data presents the characteristics of massive, multi-source and heterogeneous, which makes data fusion become more complex.
Xiaoling Tao +4 more
doaj +3 more sources
A survey of fault tolerance in cloud computing
Cloud computing has brought about a transformation in the delivery model of information technology from a product to a service. It has enabled the availability of various software, platforms and infrastructural resources as scalable services on demand ...
Priti Kumari, Parmeet Kaur
doaj +1 more source

