Steganography in multimedia aims to embed secret data into an innocent
l...
The advent of Bitcoin, and consequently Blockchain, has ushered in a new...
Dealing with imbalanced data is one the main challenges in machine/deep
...
Log messages are now widely used in software systems. They are important...
This paper considers the construction of isodual quasi-cyclic codes. Fir...
In this paper, we give conditions for the existence of Hermitian self-du...
In this paper, a linear ℓ-intersection pair of codes is introduced as a
...
Stack Overflow is the most popular Q&A website among software developers...
Determining the programming language of a source code file has been
cons...