Search
Search Results
-
Information flow control for comparative privacy analyses
The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...
-
Trust attack prevention based on Spark-blockchain in social IoT: a survey
Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...
-
Sublinear Algorithms in T-Interval Dynamic Networks
We consider standard T - interval dynamic networks , under the synchronous timing model and the broadcast CONGEST model. In a T - interval dynamic network ,...
-
Explicit constructions of NMDS self-dual codes
Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction
Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....
-
Global adaptive histogram feature network for automatic segmentation of infection regions in CT images
Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....
-
-
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...
-
Impact of linkage level on inferences from big data analyses in health and medical research: an empirical study
BackgroundLinkage errors that occur according to linkage levels can adversely affect the accuracy and reliability of analysis results. This study...
-
Improve the efficiency and accuracy of ophthalmologists’ clinical decision-making based on AI technology
BackgroundAs global aging intensifies, the prevalence of ocular fundus diseases continues to rise. In China, the tense doctor-patient ratio poses...
-
Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation
Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...
-
Adaptive context-aware access control for IoT environments leveraging fog computing
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...
-
Using the ACE framework to enforce access and usage control with notifications of revoked access rights
The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...
-
Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model
In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted...
-
A three-stage quality evaluation method for experience products: taking animation as an example
The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...
-
Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse
There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into...