We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Threshold ring signature: generic construction and logarithmic size instantiation

    A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...

    Huizhuo Wang, Yang Tao, Rui Zhang in Cybersecurity
    Article Open access 11 July 2024
  2. Automated Detection of Infection in Diabetic Foot Ulcer Using Pre-trained Fast Convolutional Neural Network with U++net

    A frequent consequence of diabetes and a significant contributor to morbidity and mortality is diabetic foot ulcer (DFU).Early detection and...

    S. V. N. Murthy, Kovvuri N. Bhargavi, ... E. N.Ganesh in SN Computer Science
    Article 10 July 2024
  3. Structure-based prediction of T cell receptor recognition of unseen epitopes using TCRen

    T cell receptor (TCR) recognition of foreign peptides presented by major histocompatibility complex protein is a major event in triggering the...

    Vadim K. Karnaukhov, Dmitrii S. Shcherbinin, ... Mikhail Shugay in Nature Computational Science
    Article 10 July 2024
  4. A review of digital twins and their application in cybersecurity based on artificial intelligence

    The potential of digital twin technology is yet to be fully realised due to its diversity and untapped potential. Digital twins enable systems’...

    Mohammadhossein Homaei, Óscar Mogollón-Gutiérrez, ... Andrés Caro in Artificial Intelligence Review
    Article Open access 10 July 2024
  5. Federated learning for digital healthcare: concepts, applications, frameworks, and challenges

    Various hospitals have adopted digital technologies in the healthcare sector for various healthcare-related applications. Due to the effect of the...

    D. N. Sachin, B. Annappa, Sateesh Ambesange in Computing
    Article 10 July 2024
  6. Towards multimodal graph neural networks for surgical instrument anticipation

    Purpose

    Decision support systems and context-aware assistance in the operating room have emerged as the key clinical applications supporting surgeons...

    Lars Wagner, Dennis N. Schneider, ... Dirk Wilhelm in International Journal of Computer Assisted Radiology and Surgery
    Article Open access 10 July 2024
  7. A deep learning based cognitive model to probe the relation between psychophysics and electrophysiology of flicker stimulus

    The flicker stimulus is a visual stimulus of intermittent illumination. A flicker stimulus can appear flickering or steady to a human subject,...

    Keerthi S. Chandran, Kuntal Ghosh in Brain Informatics
    Article Open access 10 July 2024
  8. Unlocking T-cell receptor–epitope insights with structural analysis

    Miaozhe Huo, Yuepeng Jiang, Shuai Cheng Li in Nature Computational Science
    Article 10 July 2024
  9. A new integrated steganography scheme for quantum color images

    In this paper, we propose a quantum steganography scheme with a color image as the cover image. In order to enhance the security of the embedded...

    Yumin Dong, Rui Yan in The Journal of Supercomputing
    Article 10 July 2024
  10. An Efficient Approach to Reduce Energy Consumption in a Fog Computing Environment Using a Moth Flame Optimization Algorithm

    After decades of growth in the computer computing field, cyber-physical systems (CPS), a combination of physical and tangible hardware and virtual...

    Razieh Asgarnezhad in SN Computer Science
    Article 10 July 2024
  11. Analyzing Data Streams from Cyber-Physical-Systems: A Case Study

    We show that conducting a process-mining-centric analysis concerning cyber-physical systems provides insights into usage behavior. To show that, we...

    Harry H. Beyel, Omar Makke, ... Wil M. P. van der Aalst in SN Computer Science
    Article Open access 10 July 2024
  12. Exploring recent advances in random grid visual cryptography algorithms

    Visual cryptography scheme is initiated to securely encode a secret image into multiple shares. The secret can be reconstructed by overlaying the...

    Neetha Francis, A. Lisha, Thomas Monoth in The Journal of Supercomputing
    Article 10 July 2024
  13. Improving Likert scale big data analysis in psychometric health economics: reliability of the new compositional data approach

    Bipolar psychometric scales data are widely used in psychologic healthcare. Adequate psychological profiling benefits patients and saves time and...

    René Lehmann, Bodo Vogt in Brain Informatics
    Article Open access 10 July 2024
  14. Mitigating implicit and explicit bias in structured data without sacrificing accuracy in pattern classification

    Using biased data to train Artificial Intelligence (AI) algorithms will lead to biased decisions, discriminating against certain groups or...

    Fabian Hoitsma, Gonzalo Nápoles, ... Yamisleydi Salgueiro in AI & SOCIETY
    Article Open access 10 July 2024
  15. Modified general splitting method for the split feasibility problem

    Based on the equivalent optimization problems of the splitting feasibility problem, we investigate this problem by using modified general splitting...

    Seakweng Vong, Zhongsheng Yao in Journal of Global Optimization
    Article 10 July 2024
  16. Intersecting realms: a cross-disciplinary examination of VR quality of experience research

    The advent of virtual reality (VR) technology has necessitated a reevaluation of quality of experience (QoE) models. While numerous recent efforts...

    Aleksandra Zheleva, Lieven De Marez, ... Klaas Bombeke in Virtual Reality
    Article Open access 10 July 2024
  17. Cost-aware workflow offloading in edge-cloud computing using a genetic algorithm

    The edge-cloud computing continuum effectively uses fog and cloud servers to meet the quality of service (QoS) requirements of tasks when edge...

    Somayeh Abdi, Mohammad Ashjaei, Saad Mubeen in The Journal of Supercomputing
    Article Open access 10 July 2024
  18. Classification and Feature Selection of Alzheimer’s Disease for MRI Data Utilizing Convolutional Neural Network and Support Vector Machine

    Alzheimer's disease (AD) is a neurological disease that affect numerous people. According to the literature, forecasting this type of disease can be...

    Archana Yashodhar, Shashidhar Kini in SN Computer Science
    Article 10 July 2024
  19. Designing an Intelligent Contract with Communications and Risk Data

    Contract automation is a challenging topic within Artificial Intelligence and LegalTech. From digitised contracts via smart contracts, we are heading...

    Georgios Stathis, Athanasios Trantas, ... Jaap van den Herik in SN Computer Science
    Article Open access 10 July 2024
  20. Signal processing implementation of low-cost target speed detection of CW radar using FPGA

    The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...

    Sameh G. Salem, Mohamed El Hosseny in International Journal of Information Technology
    Article Open access 10 July 2024
Did you find what you were looking for? Share feedback.