Skip to main content

previous disabled Page of 41
and
Your search also matched 8,477 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

MDUNet: deep-prior unrolling network with multi-parameter data integration for low-dose computed tomography reconstruction

Include preview-only content
  1. Article

    Open Access

    Smart carbon monitoring platform under IoT-Cloud architecture for small cities in B5G

    With the rapid development of the Internet of Things (IoT) in the 5G age, the construction of smart cities around the world consequents on the exploration of carbon reduction path based on IoT technology is an...

    He Zhang, Jianxun Zhang, Rui Wang, Yazhe Huang, Mengxiao Zhang in Wireless Networks (2024)

  2. Article

    Open Access

    On data efficiency of univariate time series anomaly detection models

    In machine learning (ML) problems, it is widely believed that more training samples lead to improved predictive accuracy but incur higher computational costs. Consequently, achieving better data efficiency, that ...

    Wu Sun, Hui Li, Qingqing Liang, **aofeng Zou, Mei Chen, Yanhao Wang in Journal of Big Data (2024)

  3. Article

    Open Access

    Hypoxia within tumor microenvironment characterizes distinct genomic patterns and aids molecular subty** for guiding individualized immunotherapy

    Assessing the hypoxic status within the tumor microenvironment (TME) is crucial for its significant clinical relevance in evaluating drug resistance and tailoring individualized strategies. In this study, we p...

    Run Shi, **g Sun, Hanyu Zhou, Tong Hu, Zhaojia Gao, **n Wang in Journal of Big Data (2024)

  4. Article

    Open Access

    Inference serving with end-to-end latency SLOs over dynamic edge networks

    While high accuracy is of paramount importance for deep learning (DL) inference, serving inference requests on time is equally critical but has not been carefully studied especially when the request has to be ...

    Vinod Nigade, Pablo Bauszat, Henri Bal, Lin Wang in Real-Time Systems (2024)

  5. Article

    Open Access

    A fuel consumption-based method for develo** local-specific CO2 emission rate database using open-source big data

    Emission data collection has always been a significant burden and challenge for Chinese counties to develop a CO2 emission inventory. This paper proposed a fuel consumption-based method to develop a local-specifi...

    Linheng Li, Can Wang, **g Gan, Dapeng Zhang in Journal of Big Data (2024)

  6. Article

    Open Access

    Retraction Note: Support attack detection algorithm for recommendation system based on deep learning

    **n Li, Zhixiao Wang in EURASIP Journal on Wireless Communications and Networking (2024)

  7. Article

    Open Access

    Retraction Note to: An abnormal traffic detection method using GCN-BiLSTM-attention in the internet of vehicles environment

    Xueli Wang, Qin Wang in EURASIP Journal on Wireless Communications and Networking (2024)

  8. Article

    Open Access

    Retraction Note: Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks

    This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00144-1.

    Dan Wang, Qing Wu, Ming Hu in EURASIP Journal on Information Security (2024)

  9. Article

    Open Access

    Retraction Note: Features optimization selection in hidden layers of deep learning based on graph clustering

    Hefei Gao, Yifei Yuan in EURASIP Journal on Wireless Communications and Networking (2024)

  10. Article

    Open Access

    Optimal station placement based on grey wolf optimizer for regional target localization

    The accuracy of target passive localization is influenced by the placement of signal receiving stations; therefore, many studies have been performed to optimize station placement. However, most of the present ...

    Zewen Wang, Dexiu Hu, Jie Huang, Min **e in EURASIP Journal on Wireless Communications… (2024)

  11. Article

    Open Access

    DEMFFA: a multi-strategy modified Fennec Fox algorithm with mixed improved differential evolutionary variation strategies

    The Fennec Fox algorithm (FFA) is a new meta-heuristic algorithm that is primarily inspired by the Fennec fox's ability to dig and escape from wild predators. Compared with other classical algorithms, FFA show...

    Gang Hu, Keke Song, **uxiu Li, Yi Wang in Journal of Big Data (2024)

  12. Article

    Open Access

    Establishment of an automatic diagnosis system for corneal endothelium diseases using artificial intelligence

    To use artificial intelligence to establish an automatic diagnosis system for corneal endothelium diseases (CEDs).

    **g-hao Qu, **ao-ran Qin, Zi-jun **e, Jia-he Qian, Yang Zhang in Journal of Big Data (2024)

  13. Article

    Open Access

    High-performance computing in healthcare: An automatic literature analysis perspective

    The adoption of high-performance computing (HPC) in healthcare has gained significant attention in recent years, driving advancements in medical research and clinical practice. Exploring the literature on HPC ...

    Jieyi Li, Shuai Wang, Stevan Rudinac, Anwar Osseyran in Journal of Big Data (2024)

  14. Article

    Coordination of networking and computing: toward new information infrastructure and new services mode

    **aoyun Wang 王晓云, Tao Sun 孙滔, Yong Cui 崔勇 in Frontiers of Information Technology & Elec… (2024)

  15. Article

    Open Access

    Revisiting the potential value of vital signs in the real-time prediction of mortality risk in intensive care unit patients

    Predicting patient mortality risk facilitates early intervention in intensive care unit (ICU) patients at greater risk of disease progression. This study applies machine learning methods to multidimensional cl...

    Pan Pan, Yue Wang, Chang Liu, Yanhui Tu, Haibo Cheng, Qingyun Yang in Journal of Big Data (2024)

  16. Article

    Open Access

    The differences in gastric cancer epidemiological data between SEER and GBD: a joinpoint and age-period-cohort analysis

    The burden of gastric cancer (GC) should be further clarified worldwide, and helped us to understand the current situation of GC.

    Zenghong Wu, Kun Zhang, Weijun Wang, Mengke Fan, Rong Lin in Journal of Big Data (2024)

  17. Article

    Open Access

    Intelligent multi-agent model for energy-efficient communication in wireless sensor networks

    The research addresses energy consumption, latency, and network reliability challenges in wireless sensor network communication, especially in military security applications. A multi-agent context-aware model ...

    Kiran Saleem, Lei Wang, Salil Bharany in EURASIP Journal on Information Security (2024)

  18. Article

    Open Access

    Feature selection strategies: a comparative analysis of SHAP-value and importance-based methods

    In the context of high-dimensional credit card fraud data, researchers and practitioners commonly utilize feature selection techniques to enhance the performance of fraud detection models. This study presents ...

    Huan**g Wang, Qianxin Liang, John T. Hancock, Taghi M. Khoshgoftaar in Journal of Big Data (2024)

  19. Article

    Open Access

    Integration of transcriptomic analysis and multiple machine learning approaches identifies NAFLD progression-specific hub genes to reveal distinct genomic patterns and actionable targets

    Nonalcoholic fatty liver disease (NAFLD) is a leading public health problem worldwide. Approximately one fourth of patients with nonalcoholic fatty liver (NAFL) progress to nonalcoholic steatohepatitis (NASH),...

    **g Sun, Run Shi, Yang Wu, Yan Lou, Lijuan Nie, Chun Zhang in Journal of Big Data (2024)

  20. Article

    Open Access

    Amplitude-modulated EM side-channel attack on provably secure masked AES

    Recently a new type of side channels was discovered, called amplitude-modulated electromagnetic (EM) emanations from mixed-signal circuits. Unlike power analysis or near field EM analysis, attacks based on amp...

    Huanyu Wang in Journal of Cryptographic Engineering (2024)

previous disabled Page of 41