Skip to main content

previous disabled Page of 46
and
  1. Article

    Open Access

    A powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation

    Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between resource-constrained legitimate users and is a promising candidate for th...

    Liquan Chen, Yufan Song, Wanting Ma in EURASIP Journal on Wireless Communications… (2024)

  2. No Access

    Article

    Effects of a self-regulated-based gamified interactive e-books on primary students' learning performance and affection in a flipped mathematics classroom

    Gamified interactive e-books can make the learning process more interactive, enjoyable, and personalized by incorporating game elements into the educational content, thus increasing student engagement and rete...

    Chuang Chen, Nurullizam Jamiat in Education and Information Technologies (2024)

  3. Article

    Open Access

    Cross-chain asset trading scheme for notaries based on edge cloud storage

    Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain ...

    Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou in Journal of Cloud Computing (2024)

  4. No Access

    Article

    Effects of non-digital games integrated with digital games for advancing fifth graders’ spatial reasoning abilities

    Game-based learning, which includes non-digital and digital games, highlights the benefits of games in terms of players’ learning and engagement. Whereas contemporary research focuses more on digital than non-...

    Kai-Lin Yang, Chia-Yang Chen in Education and Information Technologies (2024)

  5. No Access

    Article

    A SMOTified extreme learning machine for identifying mineralization anomalies from geochemical exploration data: a case study from the Yeniugou area, **njiang, China

    Extreme learning Machine (ELM) is a novel supervised machine learning algorithm, which has the advantages of fast-learning speed, good generalization, high classification performance, and can avoid problems su...

    Alina Shayilan, Yongliang Chen in Earth Science Informatics (2024)

  6. No Access

    Article

    Graph Accelerators—A Case for Sparse Data Processing

    Wen-Guang Chen 陈文光 in Journal of Computer Science and Technology (2024)

  7. No Access

    Article

    WavEnhancer: Unifying Wavelet and Transformer for Image Enhancement

    Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However, traditional methods of enhancement based on pixel-level or global-lev...

    Zi-Nuo Li **梓诺, Xu-Hang Chen 陈绪行 in Journal of Computer Science and Technology (2024)

  8. No Access

    Article

    Modeling dynamic spatiotemporal user preference for location prediction: a mutually enhanced method

    As the cornerstone of location-based services, location prediction aims to predict user’s next location through modeling user’s personal preference or travel sequential pattern. However, most existing methods ...

    Jiawei Cai, Dong Wang, Hongyang Chen, Chenxi Liu, Zhu **ao in World Wide Web (2024)

  9. Article

    Open Access

    Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics

    Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...

    **n Wang, Dongsheng Yang, D Raveena Judie Dolly, Shuang Chen in Journal of Cloud Computing (2024)

  10. Article

    Open Access

    Smart and efficient EV charging navigation scheme in vehicular edge computing networks

    With the increasing number of electric fast charging stations (FCSs) deployed along roadsides of both urban roads and highways, the long-distance travel of electric vehicles (EVs) becomes possible. The EV char...

    Haoyu Li, Jihuang Chen, Chao Yang, **n Chen, Le Chang in Journal of Cloud Computing (2023)

  11. Article

    Open Access

    Feature-enhanced fusion of U-NET-based improved brain tumor images segmentation

    The field of medical image segmentation, particularly in the context of brain tumor delineation, plays an instrumental role in aiding healthcare professionals with diagnosis and accurate lesion quantification....

    Abdul Haseeb Nizamani, Zhigang Chen, Ahsan Ahmed Nizamani in Journal of Cloud Computing (2023)

  12. No Access

    Article

    Roughness Estimation of Multi-Scale Rock Joints based on SfM & MVS Photogrammetry with A DSLR Camera in Animation Mode

    To recreate high-quality three-dimensional (3D) models of rock joints for quantitative roughness characterization more economically, portably, and quickly, it is necessary to assess the feasibility and accurac...

    Yunfeng Ge, Kaili Chen, Geng Liu, Huiming Tang, Qian Chen in Earth Science Informatics (2023)

  13. No Access

    Article

    Distributional constraint discovery for intelligent auditing

    Constraint discovery in relational databases aims to find constraints that express dependency relationships among a set of attributes and has witnessed remarkable success in the applications of data cleaning, ...

    Wentao Hu, Dawei Jiang, Sai Wu, Ke Chen, Gang Chen in Knowledge and Information Systems (2023)

  14. No Access

    Article

    Wildfire susceptibility prediction using a multisource and spatiotemporal cooperative approach

    Wildfire is one of the natural hazards that poses threats to the safety of forest ecological environment. It is very important to predict wildfire risk in the early stage. Most of the wildfire prediction resea...

    Jiehang Deng, Weiming Wang, Guosheng Gu, Zhiqiang Chen in Earth Science Informatics (2023)

  15. Article

    Exploring the interaction of cognition and emotion in small group collaborative discourse by Heuristic Mining Algorithm (HMA) and Inductive Miner Algorithm (IMA)

    This study explored the interaction between cognition and emotion in blended collaborative learning. The participants (n = 30) of this study were undergraduate students enrolled in a 16-week course on information...

    Wei Xu, Ye-Feng Lou, Hang Chen, Zhi-Yi Shen in Education and Information Technologies (2023)

  16. No Access

    Article

    A graph neural network incorporating spatio-temporal information for location recommendation

    Location recommendation is at the core of location-based service, while recommendation based on graph neural networks (GNNs) has recently flourished, and for location recommendation tasks, GNN-based approaches...

    Yunliang Chen, Guoquan Huang, Yuewei Wang, **aohui Huang, Geyong Min in World Wide Web (2023)

  17. No Access

    Article

    FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring

    Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power consumption. However, most wearable health data is distribute...

    Chun-Yu Hu, Li-Sha Hu, Lin Yuan, Dian-Jie Lu in Journal of Computer Science and Technology (2023)

  18. No Access

    Article

    Spatiotemporal contrastive modeling for video moment retrieval

    With the rapid development of social networks, video data has been growing explosively. As one of the important social mediums, spatiotemporal characteristics of videos have attracted considerable attention in...

    Yi Wang, Kun Li, Guoliang Chen, Yan Zhang, Dan Guo, Meng Wang in World Wide Web (2023)

  19. No Access

    Article

    Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding

    With its wider acceptability, cloud can host a diverse set of data and applications ranging from entertainment to personal to industry. The foundation of cloud computing is based on virtual machines where boun...

    Chong Wang, Rong-Liang Chen, Liang Gu in Journal of Computer Science and Technology (2023)

  20. No Access

    Article

    Towards multi-dimensional knowledge-aware approach for effective community detection in LBSN

    In this paper, we focus on the problem of detecting communities, where users have similar characteristics in both social relationship and check-in behavior in location based social network (LBSN). Contrast to ...

    Dazhao Xu, Yunliang Chen, Ningning Cui, Jianxin Li in World Wide Web (2023)

previous disabled Page of 46