919 Result(s)
-
Article
Open AccessA powerful adversary model and corresponding OTP time slot allocation scheme in RIS-assisted physical layer key generation
Physical layer key generation (PLKG) is a technique of information-theoretic security to tackle the problem of key distribution between resource-constrained legitimate users and is a promising candidate for th...
-
Article
Effects of a self-regulated-based gamified interactive e-books on primary students' learning performance and affection in a flipped mathematics classroom
Gamified interactive e-books can make the learning process more interactive, enjoyable, and personalized by incorporating game elements into the educational content, thus increasing student engagement and rete...
-
Article
Open AccessCross-chain asset trading scheme for notaries based on edge cloud storage
Blockchain has penetrated in various fields, such as finance, healthcare, supply chain, and intelligent transportation, but the value exchange between different blockchains limits their expansion. Cross-chain ...
-
Article
Effects of non-digital games integrated with digital games for advancing fifth graders’ spatial reasoning abilities
Game-based learning, which includes non-digital and digital games, highlights the benefits of games in terms of players’ learning and engagement. Whereas contemporary research focuses more on digital than non-...
-
Article
A SMOTified extreme learning machine for identifying mineralization anomalies from geochemical exploration data: a case study from the Yeniugou area, **njiang, China
Extreme learning Machine (ELM) is a novel supervised machine learning algorithm, which has the advantages of fast-learning speed, good generalization, high classification performance, and can avoid problems su...
-
Article
Graph Accelerators—A Case for Sparse Data Processing
-
Article
WavEnhancer: Unifying Wavelet and Transformer for Image Enhancement
Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However, traditional methods of enhancement based on pixel-level or global-lev...
-
Article
Modeling dynamic spatiotemporal user preference for location prediction: a mutually enhanced method
As the cornerstone of location-based services, location prediction aims to predict user’s next location through modeling user’s personal preference or travel sequential pattern. However, most existing methods ...
-
Article
Open AccessGenetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics
Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...
-
Article
Open AccessSmart and efficient EV charging navigation scheme in vehicular edge computing networks
With the increasing number of electric fast charging stations (FCSs) deployed along roadsides of both urban roads and highways, the long-distance travel of electric vehicles (EVs) becomes possible. The EV char...
-
Article
Open AccessFeature-enhanced fusion of U-NET-based improved brain tumor images segmentation
The field of medical image segmentation, particularly in the context of brain tumor delineation, plays an instrumental role in aiding healthcare professionals with diagnosis and accurate lesion quantification....
-
Article
Roughness Estimation of Multi-Scale Rock Joints based on SfM & MVS Photogrammetry with A DSLR Camera in Animation Mode
To recreate high-quality three-dimensional (3D) models of rock joints for quantitative roughness characterization more economically, portably, and quickly, it is necessary to assess the feasibility and accurac...
-
Article
Distributional constraint discovery for intelligent auditing
Constraint discovery in relational databases aims to find constraints that express dependency relationships among a set of attributes and has witnessed remarkable success in the applications of data cleaning, ...
-
Article
Wildfire susceptibility prediction using a multisource and spatiotemporal cooperative approach
Wildfire is one of the natural hazards that poses threats to the safety of forest ecological environment. It is very important to predict wildfire risk in the early stage. Most of the wildfire prediction resea...
-
Article
Exploring the interaction of cognition and emotion in small group collaborative discourse by Heuristic Mining Algorithm (HMA) and Inductive Miner Algorithm (IMA)
This study explored the interaction between cognition and emotion in blended collaborative learning. The participants (n = 30) of this study were undergraduate students enrolled in a 16-week course on information...
-
Article
A graph neural network incorporating spatio-temporal information for location recommendation
Location recommendation is at the core of location-based service, while recommendation based on graph neural networks (GNNs) has recently flourished, and for location recommendation tasks, GNN-based approaches...
-
Article
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power consumption. However, most wearable health data is distribute...
-
Article
Spatiotemporal contrastive modeling for video moment retrieval
With the rapid development of social networks, video data has been growing explosively. As one of the important social mediums, spatiotemporal characteristics of videos have attracted considerable attention in...
-
Article
Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
With its wider acceptability, cloud can host a diverse set of data and applications ranging from entertainment to personal to industry. The foundation of cloud computing is based on virtual machines where boun...
-
Article
Towards multi-dimensional knowledge-aware approach for effective community detection in LBSN
In this paper, we focus on the problem of detecting communities, where users have similar characteristics in both social relationship and check-in behavior in location based social network (LBSN). Contrast to ...