12 Questions 45 Answers 0 Followers
Questions related from Anik Islam Abhi
So far we have seen a meta-learning example with an image dataset (e.g., Omniglot) that has only one attribute. However, they have multiple attributes if we want to use non-image datasets (e.g.,...
14 April 2023 3,761 4 View
If multiple deep learning (DL) algorithms are merged together to create models then the system will be complex. To analyze this, how to calculate complexity? Is there any formal way or...
08 June 2021 7,556 9 View
I was looking for a simulator to simulate a proof of concept in hyperledger fabric by changing the number of the orderer, endorser, organisation, and also wanted to apply consensus in the network....
07 April 2020 6,043 6 View
In ECDH, when two person wants to share private key, they first select a point G on elliptic curve and after that, each of them pick a random integer a and b, respectively, and multiply with G....
25 April 2019 2,364 10 View
As we know that, throughput is amount of transferred data for a specific time. I want to fix data size and make time variable. The definition will be "The amount of time required to transfer a...
11 December 2018 9,527 10 View
Hi, I have been through some discussion regarding survey paper writing tips and tricks. However, these are very generic. I want to know how to write a survey paper related to computer science...
01 January 1970 7,323 5 View
What can be tentative research areas in which deep learning can be merged with blockchain? Please share your thoughts. Thanks in advance.
01 January 1970 9,757 3 View
Recently, I have seen in many papers reviewers are asking to provide computation complexities for the proposed algorithms. I was wondering what would be the formal way to do that, especially for...
01 January 1970 7,474 11 View
I am trying to make a dataset based on MITRE ATT&CK (https://attack.mitre.org/) website to create AI-based threat intelligence. However, I didn't find any automated tools or readymade datasets...
01 January 1970 7,606 5 View
The SCPS Lab (https://www.scpslab.org/) is hiring for two Ph.D. positions in the following areas: Federated Defense Against Adversarial Attacks in IIoT. Threat and Anomaly Detection for Cloud...
01 January 1970 4,305 6 View
The extensive deployment of Internet of Things (IoT) devices enables data exchange of modern objects across our everyday lives, as a result, it introduces new use cases in smart cities, smart...
01 January 1970 6,898 0 View
I was going through mac protocols and wondering what will be a suitable MAC protocol for UAV swarm while conducting a mission. Any idea?
01 January 1970 5,738 3 View