Abstract In this survey, the currently available ultrawideband-based non-line-of-sight (NLOS) identification and error mitigation methods are presented. They are classified into se...
Jasurbek Khodjaev, Yongwan Park, Aamir Saeed Malik
Language identification is the task of identifying the language a given document is written in. This paper describes a detailed examination of what models perform best under diffe...
Automation of power system fault identification using information conveyed by the wavelet analysis of power system transients is proposed. Probabilistic Neural Network (PNN) for d...
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They sho...
Abstract. Online recommender systems are a common target of attack. Existing research has focused on automated manipulation of recommender systems through the creation of shill acc...