Zobrazeno 1 - 10
of 240
pro vyhledávání: '"Meng Chang Chen"'
Publikováno v:
Scientific Reports, Vol 13, Iss 1, Pp 1-9 (2023)
Abstract PM $$_{2.5}$$ 2.5 prediction plays an important role for governments in establishing policies to control the emission of excessive atmospheric pollutants to protect the health of citizens. However, traditional machine learning methods that u
Externí odkaz:
https://doaj.org/article/451d721ae0d148c8a86499b13d0a9765
Publikováno v:
PLoS ONE, Vol 18, Iss 3, p e0282471 (2023)
Accurate PM2.5 prediction is part of the fight against air pollution that helps governments to manage environmental policy. Satellite Remote sensing aerosol optical depth (AOD) processed by The Multi-Angle Implementation of Atmospheric Correlation (M
Externí odkaz:
https://doaj.org/article/908d9c7f11ec4438a10242f001332a5b
Publikováno v:
PLoS ONE, Vol 17, Iss 5, p e0263644 (2022)
In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still
Externí odkaz:
https://doaj.org/article/f84ed24da1264ed28430780cc8eee236
Publikováno v:
IEEE Intelligent Systems. 38:36-45
Autor:
Chiao-Cheng Huang, Pei-Yu Huang, Ying-Ren Kuo, Guo-Wei Wong, Yi-Ting Huang, Yeali S. Sun, Meng Chang Chen
Publikováno v:
2022 IEEE International Conference on Big Data (Big Data).
PM2.5 prediction plays an important role for governments in establishing policies to control the emission of excessive atmospheric pollutants to protect the health of citizens. However, traditional machine learning methods that use data collected fro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::90065836b6278613fc7877750db43b74
https://doi.org/10.21203/rs.3.rs-1993037/v1
https://doi.org/10.21203/rs.3.rs-1993037/v1
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:2402-2416
With the advance of hardware, network, and virtualization technologies, cloud computing has prevailed and become the target of security threats such as the cross virtual machine (VM) side channel attack, with which malicious users exploit vulnerabili
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
The Asia-Pacific Education Researcher. 28:495-508
Game-based learning is popular with learners because it includes various game elements. Among various game elements, background music may have great effects, which may be associated with the preferences of information processing. On the other hand, c
Publikováno v:
PloS one. 17(5)
In recent years, studies on malware analysis have noticeably increased in the cybersecurity community. Most recent studies concentrate on malware classification and detection or malicious patterns identification, but as to malware activity, it still