In addition to primary grey-colored marble, two distinct types of color alteration are visible: a narrow rim (< 2 cm) with intense white discoloration at the contact of the cave wall and the overlying calcite coating, and a dispersed pale grey discoloration in the inner part (Fig. ...
physical distancing practiced by the general public. Here, Brown et al.29provide a first attempt, but our approach differs in four fundamental dimensions. First, Brown et al. study different indicators: (1) household has access to internet, phone, TV, or radio; (2) no more than two ...
Regarding the evaluation of this tool, we carried out a preliminary evaluation of the system with the assistance of experts in the problem domain from the Association “Autism Development” to assess both the teaching capabilities of the tool and its usability. Two specialists from the Association,...
To investigate the best ensemble classifiers with respect to different feature types, we first examine the prediction performance of various features on multiple individual classifiers. Then, the ensemble classifier is determined by combining an individual classifier with a better sensitivity and another on...
Examine the performance of different types of ML algorithms (unsupervised and deep learning (DL)). Make a dataset with real-world IoT devices. Compare the impact of performance metrics with and without balancing the dataset. Focus on other DDoS attack types to protect IoT services. ...
As a result, organizations lost an average of $942,000 per attack [4]. Encrypting DNS traffic prevents malicious attackers from intercepting the communication between the end user and the DNS resolver. To improve DNS security, researchers have proposed two protocols: DNS over TLS and DNS over ...
The obtained results show that learning styles allow adaptive e-learning systems to improve the learning processes of students. Keywords: deep multi-target prediction; Felder–Silverman learning style; adaptive e-learning systems; artificial neural network; deep learning 1. Introduction According to ...
Two review investigators (H.-G.J. and D.L.) extracted the following information: (1) First author and year of publication; (2) type of underlying cause; (3) patient characteristics, including sample size, gender distribution, age range, and disease duration; (4) intervention group; (5) ...
The PISA test employs a two-stage sampling method. The first stage uses probability proportional to size (PPS) based on school size, while the second stage involves random sampling of students within the selected schools (OECD 2003). This process generates a multilevel dataset. Consequently, exis...
A VPN does not provide security itself; rather, the VPN uses different types of security protocols to hide the content. SSL VPN and IPsec VPN are two popular types of VPNs. This work has experimented with SSL VPN provided by OpenVPN [11]. The OpenVPN uses a Hash-based Message ...