pleadings or documents (e.g., motions for ex- tension of time, scheduling matters, continuances, etc.) that do not contain information that is or may be clas- sified. The classified information security officer must promptly coordinate with the appropriate classifica- tion authority todetermine...
the healthcare industry has a wealth of data that must be mined for hidden patterns. Data mining techniques in this field are required for optimal judgement. The features saved in the proposed method can be used with the Random Forest
However, this also has implications in terms of the privacy of the vehicle occupant, and questions arise how ethical and privacy concerns must be tackled if eHMIs are to handle this aspect of interaction. We have also noted that the description of existing eHMI-concepts is mainly focused on ...
In this process, the features change, and at the same time, the information that needs to be saved will continue to be passed on. Each block in ResNet consists of a series of layers and a shortcut. The shortcut connects the input and output of the module together and adds at the ...
In Greece, data on the age of buildings can be extracted from the Greek Statistical Authority [13], but without information concerning the typology of buildings. From the Archaeological Land Register [14], data concerning the monuments listed by the Ministry of Culture can be derived; however, ...
Therefore, the best and most practical characteristics must be chosen to train the network. The best features are selected using the ACO approach, and the neural network is trained using these features. On the right side of the flowchart is the ACO method scenario....
However, to solve these problems, the interference source must be detected, classified, its purpose determined, and localized to eliminate it. Several interference monitoring solutions exist, but these are expensive, resulting in fewer nodes that may miss spatially sparse interference signals. This ...
Third, it must be a portable device such that there is no impact on the subject's daily life. Before the prototype is brought up, we choose the smart phone to serve as Gateway rather than developing a brand new evaluation board. A few factors are concerned during the decision. First, ...
These methods detect and block a malicious code that matches patterns when the characteristics of known malicious codes are defined as specific patterns. They can be classified into signature-based detection, misuse detection, and malicious URL and IP detection according to the defined pattern. The ...
Third, it must be a portable device such that there is no impact on the subject's daily life. Before the prototype is brought up, we choose the smart phone to serve as Gateway rather than developing a brand new evaluation board. A few factors are concerned during the decision. First, ...