Search
Search Results
-
Deep learning-based classification and application test of multiple crop leaf diseases using transfer learning and the attention mechanism
Crop diseases are among the major natural disasters in agricultural production that seriously restrict the growth and development of crops,...
-
Using the ACE framework to enforce access and usage control with notifications of revoked access rights
The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...
-
A three-stage quality evaluation method for experience products: taking animation as an example
The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...
-
Adaptive context-aware access control for IoT environments leveraging fog computing
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...
-
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system
Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...
-
Detecting mistakes in a domain model: a comparison of three approaches
Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...
-
An efficient quantum oblivious transfer protocol
Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of...
-
CSSLnO: Cat Swarm Sea Lion Optimization-based deep learning for fake news detection from social media
Social media has effectively shortened the time for the distribution of information, which sometimes carry news when compared to traditional methods....
-
Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems
The Sparrow Search Algorithm (SSA) is recognized for its rapid convergence and precision in engineering optimization, yet it faces the challenge of...
-
An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer
Women are commonly diagnosed with breast cancer (BC), and early detection can significantly increase the cure rate. This study suggested a...
-
Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN
Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...
-
A fast verifiable fully homomorphic encryption technique for secret computation on cloud data
In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of...
-
Hyper-relational knowledge graph neural network for next POI recommendation
With the advancement of mobile technology, Point of Interest (POI) recommendation systems in Location-based Social Networks (LBSN) have brought...
-
A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlap** community detection in social networks
In recent years, extensive studies have been carried out in community detection for social network analysis because it plays a crucial role in social...
-
TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs)
Electric vehicles (EVs) have attracted significant attention in recent years primarily due to minimal adverse impact on the environment and...
-
Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework
In this paper, we introduce the large language model (LLM) ChatGPT-3.5 to automatically and intelligently generate a new metaheuristic algorithm (MA)...
-
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized...
-
A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks
Crowdsourcing is a powerful technique for accomplishing tasks that are difficult for machines but easy for humans. However, ensuring the quality of...
-
A multi-scale no-reference video quality assessment method based on transformer
Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing,...
-
Parallel continuous skyline query over high-dimensional data stream windows
Real-time multi-criteria decision-making applications in fields like high-speed algorithmic trading, emergency response, and disaster management have...