Search
Search Results
-
Threshold ring signature: generic construction and logarithmic size instantiation
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...
-
Automated Detection of Infection in Diabetic Foot Ulcer Using Pre-trained Fast Convolutional Neural Network with U++net
A frequent consequence of diabetes and a significant contributor to morbidity and mortality is diabetic foot ulcer (DFU).Early detection and...
-
Structure-based prediction of T cell receptor recognition of unseen epitopes using TCRen
T cell receptor (TCR) recognition of foreign peptides presented by major histocompatibility complex protein is a major event in triggering the...
-
A review of digital twins and their application in cybersecurity based on artificial intelligence
The potential of digital twin technology is yet to be fully realised due to its diversity and untapped potential. Digital twins enable systems’...
-
Federated learning for digital healthcare: concepts, applications, frameworks, and challenges
Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...
-
A deep learning based cognitive model to probe the relation between psychophysics and electrophysiology of flicker stimulus
The flicker stimulus is a visual stimulus of intermittent illumination. A flicker stimulus can appear flickering or steady to a human subject,...
-
Understanding the GDPR from a requirements engineering perspective—a systematic map** study on regulatory data protection requirements
Data protection compliance is critical from a requirements engineering (RE) perspective, both from a software development lifecycle (SDLC)...
-
-
A new integrated steganography scheme for quantum color images
In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...
-
An Efficient Approach to Reduce Energy Consumption in a Fog Computing Environment Using a Moth Flame Optimization Algorithm
After decades of growth in the computer computing field, cyber-physical systems (CPS), a combination of physical and tangible hardware and virtual...
-
Analyzing Data Streams from Cyber-Physical-Systems: A Case Study
We show that conducting a process-mining-centric analysis concerning cyber-physical systems provides insights into usage behavior. To show that, we...
-
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...
-
Exploring recent advances in random grid visual cryptography algorithms
Visual cryptography scheme is initiated to securely encode a secret image into multiple shares. The secret can be reconstructed by overlaying the...
-
Improving Likert scale big data analysis in psychometric health economics: reliability of the new compositional data approach
Bipolar psychometric scales data are widely used in psychologic healthcare. Adequate psychological profiling benefits patients and saves time and...
-
Mitigating implicit and explicit bias in structured data without sacrificing accuracy in pattern classification
Using biased data to train Artificial Intelligence (AI) algorithms will lead to biased decisions, discriminating against certain groups or...
-
Classification and Feature Selection of Alzheimer’s Disease for MRI Data Utilizing Convolutional Neural Network and Support Vector Machine
Alzheimer's disease (AD) is a neurological disease that affect numerous people. According to the literature, forecasting this type of disease can be...
-
Cost-aware workflow offloading in edge-cloud computing using a genetic algorithm
The edge-cloud computing continuum effectively uses fog and cloud servers to meet the quality of service (QoS) requirements of tasks when edge...
-
Signal processing implementation of low-cost target speed detection of CW radar using FPGA
The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...
-
Designing an Intelligent Contract with Communications and Risk Data
Contract automation is a challenging topic within Artificial Intelligence and LegalTech. From digitised contracts via smart contracts, we are heading...
-
Intersecting realms: a cross-disciplinary examination of VR quality of experience research
The advent of virtual reality (VR) technology has necessitated a reevaluation of quality of experience (QoE) models. While numerous recent efforts...