We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Toward fair graph neural networks via real counterfactual samples

    Graph neural networks (GNNs) have become pivotal in various critical decision-making scenarios due to their exceptional performance. However,...

    Zichong Wang, Meikang Qiu, ... Wenbin Zhang in Knowledge and Information Systems
    Article 15 July 2024
  2. Towards optimal score level fusion for adaptive multi-biometric authentication system

    Multi-biometric authentication systems have been extensively investigated due to their merit over unimodal systems. Multi-biometric systems not only...

    Kavita, Rajesh Rohilla, Gurjit Singh Walia in Multimedia Tools and Applications
    Article 15 July 2024
  3. Advancing automotive high-performance computing: integrating direction API with LORA technology in unified machine vision for future smart cars

    This manuscript addresses the challenges in develo** Automotive High-Performance Computing (HPC) systems for Future Smart Cars and Unmanned Mobile...

    Article 15 July 2024
  4. Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach

    Efficient virtual machine (VM) placement is vital for optimizing the performance of cloud data centers. While recent studies have addressed this...

    Arezoo Ghasemi, Amin Keshavarzi in Cluster Computing
    Article 15 July 2024
  5. Cooperative coati optimization algorithm with transfer functions for feature selection and knapsack problems

    Coatis optimization algorithm (COA) has recently emerged as an innovative meta-heuristic algorithm (MA) for global optimization, garnering...

    Rui Zhong, Chao Zhang, Jun Yu in Knowledge and Information Systems
    Article 15 July 2024
  6. Privacy-preserving cross-domain recommendation using hybrid federated transfer learning

    Cross-domain recommender systems, which serve as a panacea to data sparsity and cold-start problems, are increasingly vital for providing...

    Samta Jain Goyal, Rajeev Goyal, ... Kuldeep Narayan Tripathi in Multimedia Tools and Applications
    Article 15 July 2024
  7. A semantic-based model with a hybrid feature engineering process for accurate spam detection

    Detecting spam emails is essential to maintaining the security and integrity of email communication. Existing research has made significant progress...

    Chira N. Mohammed, Ayah M. Ahmed in Journal of Electrical Systems and Information Technology
    Article Open access 15 July 2024
  8. A Critical Review of Distributed Generations Planning in Distribution Networks for Improved System Performances

    With the help of a range of load models including static, dynamic, composite, and realistic load models, the planning of distributed generations...

    Ravindra Kumar, B. K. Singh, Bindeshwar Singh in Journal of The Institution of Engineers (India): Series B
    Article 14 July 2024
  9. Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach

    Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...

    Panagiotis Kouris, Georgios Alexandridis, Andreas Stafylopatis in Journal of Big Data
    Article Open access 14 July 2024
  10. Review of Deep Learning Techniques for Neurological Disorders Detection

    Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its...

    Akhilesh Kumar Tripathi, Rafeeq Ahmed, Arvind Kumar Tiwari in Wireless Personal Communications
    Article 14 July 2024
  11. Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach

    The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of...

    N. P. Ponnuviji, G. Nirmala, ... S. Indra Priyadharshini in Journal of The Institution of Engineers (India): Series B
    Article 14 July 2024
  12. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  13. A quantitative analysis of the security of PoW-based blockchains

    This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...

    Maher Alharby, Ali Alssaiari, ... Aad van Moorsel in Cluster Computing
    Article Open access 14 July 2024
  14. Energy Efficient Routing in Cluster Based Heterogeneous Wireless Sensor Network Using Hybrid GWO and Firefly Algorithm

    Object tracking application is one of the important as well as challenging application of energy constrained Wireless Sensor Network (WSN).Timely and...

    Jayashree Dev, Jibitesh Mishra in Wireless Personal Communications
    Article 14 July 2024
  15. Cyber intrusion detection using dual interactive Wasserstein generative adversarial network with war strategy optimization in wireless sensor networks

    Wireless sensor network (WSN) is one of the essential components of a multi-hop cyber-physical system comprising many fixed or moving sensors. There...

    N. Anusha, B R Tapas Bapu, ... Raji P in Multimedia Tools and Applications
    Article 13 July 2024
  16. Dual strategy for single image denoising and generation using deep neural network

    Removing noise in the real-world scenario has been a daunting task in the field of natural language processing. Research has shown that Deep Neural...

    Ranjith J, Vergin Raja Sarobin, Renta Chintala Bhargavi in Multimedia Tools and Applications
    Article 13 July 2024
  17. A method for recognizing facial expression intensity based on facial muscle variations

    Expression intensity recognition is a research problem in the field of computer vision and pattern recognition, which can be understood as the...

    Yukun Zhang, Zixiang Fei, ... Minrui Fei in Multimedia Tools and Applications
    Article 13 July 2024
  18. Distributed neuro-fuzzy routing for energy-efficient IoT smart city applications in WSN

    Wireless sensor networks (WSNs) enable seamless data gathering and communication, facilitating efficient and real-time decision-making in IoT...

    S. Jeevanantham, C. Venkatesan, B. Rebekka in Telecommunication Systems
    Article 13 July 2024
  19. Multitask EfficientNet affective computing for student engagement detection

    In the realm of education, feedback emerges as a pivotal component, serving to foster engagement and interaction while also facilitating the...

    Michael Moses Thiruthuvanathan, Balachandran Krishnan in Multimedia Tools and Applications
    Article 13 July 2024
  20. Intelligent and efficient task caching for mobile edge computing

    Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it...

    Amir Moradi, Fatemeh Rezaei in Cluster Computing
    Article 13 July 2024
Did you find what you were looking for? Share feedback.