We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism

    Crop diseases are among the major natural disasters in agricultural production that seriously restrict the growth and development of crops,...

    Yifu Zhang, Qian Sun, ... Huini Zhou in Computing
    Article 08 July 2024
  2. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  3. A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...

    Qianqian Chen, Zhongjun Tang, ... **g Wang in Multimedia Systems
    Article 08 July 2024
  4. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  5. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  6. Detecting mistakes in a domain model: a comparison of three approaches

    Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...

    Prabhsimran Singh, Younes Boubekeur, Gunter Mussbacher in Innovations in Systems and Software Engineering
    Article 08 July 2024
  7. An efficient quantum oblivious transfer protocol

    Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of...

    Sushmita Sarkar, Vikas Srivastava, ... Sihem Mesnager in Cluster Computing
    Article 08 July 2024
  8. CSSLnO: Cat Swarm Sea Lion Optimization-based deep learning for fake news detection from social media

    Social media has effectively shortened the time for the distribution of information, which sometimes carry news when compared to traditional methods....

    Kanthi Kiran Sirra, Shashi Mogalla, Kandalam Basamma Madhuri in International Journal of Information Technology
    Article 07 July 2024
  9. Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems

    The Sparrow Search Algorithm (SSA) is recognized for its rapid convergence and precision in engineering optimization, yet it faces the challenge of...

    Gang Chen, Hu Sun in Cluster Computing
    Article 07 July 2024
  10. An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer

    Women are commonly diagnosed with breast cancer (BC), and early detection can significantly increase the cure rate. This study suggested a...

    Shuhui Hao, Changcheng Huang, ... Guoxi Liang in Cluster Computing
    Article 07 July 2024
  11. Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN

    Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...

    Dongjian Yang, **aopeng Fan, ... Debin Zhao in Multimedia Systems
    Article 07 July 2024
  12. A fast verifiable fully homomorphic encryption technique for secret computation on cloud data

    In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in International Journal of Information Technology
    Article 07 July 2024
  13. Hyper-relational knowledge graph neural network for next POI recommendation

    With the advancement of mobile technology, Point of Interest (POI) recommendation systems in Location-based Social Networks (LBSN) have brought...

    Jixiao Zhang, Yongkang Li, ... Xuan Song in World Wide Web
    Article 06 July 2024
  14. A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlap** community detection in social networks

    In recent years, extensive studies have been carried out in community detection for social network analysis because it plays a crucial role in social...

    Ahmad Heydariyan, Farhad Soleimanian Gharehchopogh, Mohammad Reza Ebrahimi Dishabi in Cluster Computing
    Article 06 July 2024
  15. TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs)

    Electric vehicles (EVs) have attracted significant attention in recent years primarily due to minimal adverse impact on the environment and...

    Kashif Mehboob Khan, Junaid Arshad, ... Marvi Jokhio in Cluster Computing
    Article 06 July 2024
  16. Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework

    In this paper, we introduce the large language model (LLM) ChatGPT-3.5 to automatically and intelligently generate a new metaheuristic algorithm (MA)...

    Rui Zhong, Yuefeng Xu, ... Jun Yu in Cluster Computing
    Article 06 July 2024
  17. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment

    The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized...

    Akhil Chaurasia, Alok Kumar, Udai Pratap Rao in Cluster Computing
    Article 06 July 2024
  18. A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks

    Crowdsourcing is a powerful technique for accomplishing tasks that are difficult for machines but easy for humans. However, ensuring the quality of...

    Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh in Computing
    Article 06 July 2024
  19. A multi-scale no-reference video quality assessment method based on transformer

    Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing,...

    Yingan Cui, Zonghua Yu, ... Junhuai Li in Multimedia Systems
    Article 06 July 2024
  20. Parallel continuous skyline query over high-dimensional data stream windows

    Real-time multi-criteria decision-making applications in fields like high-speed algorithmic trading, emergency response, and disaster management have...

    Walid Khames, Allel Hadjali, Mohand Lagha in Distributed and Parallel Databases
    Article 06 July 2024
Did you find what you were looking for? Share feedback.