We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 164 results
  1. Loss Function with Memory for Trustworthiness Threshold Learning: Case of Face and Facial Expression Recognition

    We compare accuracy metrics of the supervisor meta-learning artificial neural networks (ANN) that learn the trustworthiness of the Inception v.3...
    Stanislav Selitskiy, Natalya Selitskaya in Machine Learning, Optimization, and Data Science
    Conference paper 2023
  2. Optimal path planning of multi-robot in dynamic environment using hybridization of meta-heuristic algorithm

    This paper investigates an innovative strategy for generating a collision and deadlock-free optimal position for the individual robots by satisfying...

    Hemanta Kumar Paikray, Pradipta Kumar Das, Sucheta Panda in International Journal of Intelligent Robotics and Applications
    Article 11 September 2022
  3. A Block Chain Dynamic Key Sharing and Updating Scheme Based on the (t, n) Threshold

    Key sharing and updating is the core problem in key management. In order to solve the centralization, security and secret share loss in the process...
    Wei Tang, Yu-Ling Chen, Yun Yang in Machine Learning for Cyber Security
    Conference paper 2020
  4. SybilSort algorithm - a friend request decision tracking recommender system in online social networks

    Sybils are detected and prevented from making friends on Online Social Networks (OSN) by the proposed SybilSort algorithm. SybilSort operates in the...

    Poornima Nedunchezhian, Murugan Mahalingam in Applied Intelligence
    Article 15 July 2021
  5. Storing and Retrieving Secrets on a Blockchain

    A secret sharing scheme enables one party to distribute shares of a secret to n parties and ensures that an adversary in control of t out of n...
    Vipul Goyal, Abhiram Kothapalli, ... Yifan Song in Public-Key Cryptography – PKC 2022
    Conference paper 2022
  6. Efficient detection and partitioning of overlapped red blood cells using image processing approach

    Detecting the abnormality of Red Blood Cells automatically aids hematologists in diagnosing sickness and minimizes time, money. The complicated...

    Prasenjit Dhar, K. Suganya Devi, ... P. Srinivasan in Innovations in Systems and Software Engineering
    Article 21 September 2022
  7. Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain

    The application of blockchain technology to the field of e-commerce has solved many dilemmas, such as low transparency of transactions, hidden risks...

    Guangshun Li, Haoyang Wu, ... Zhenqiang Li in Journal of Cloud Computing
    Article Open access 09 May 2024
  8. Enabling personalized VR experiences: a framework for real-time adaptation and recommendations in VR environments

    The personalization of user experiences through recommendation systems has been extensively explored in Internet applications, but this has yet to be...

    Sergio Valmorisco, Laura Raya, Alberto Sanchez in Virtual Reality
    Article Open access 26 June 2024
  9. On-chain repairing for multi-party data migration

    Blockchain can be used to solve the problem of mutual trust between different institutions. However, when migrating data from a traditional system to...

    Wenchao Jiang, Weiqi Dai, ... Sui Lin in World Wide Web
    Article 09 May 2023
  10. Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain

    The security and transparency provided to the data in blockchain are unmatchable, with the least instances of system hack or failure reported. With a...
    Vinamra Das, Aswani Kumar Cherukuri, ... Annapurna Jonnalagadda in Blockchain for Cybersecurity in Cyber-Physical Systems
    Chapter 2023
  11. Hybrid energy efficient deep learning and redactable consortium blockchain-based secure framework for smart parking in smart cities

    Management of vehicular parking in the crowded environment is the indispensable requirement for the smart city scenario. The advent and potential...

    Amu D., Santhi Baskaran in Multimedia Tools and Applications
    Article 14 June 2024
  12. Interactive visualization-based surveillance video synopsis

    Video synopsis is an effective technique for the efficient analysis of long videos in a short time. To generate a compact video, multiple tracks of...

    K. Namitha, Athi Narayanan, M. Geetha in Applied Intelligence
    Article 14 July 2021
  13. Prediction of pedestrian crossing behaviour at unsignalized intersections using machine learning algorithms: analysis and comparison

    The primary safety hazard at unsignalized intersections, particularly in urban areas, is pedestrian-vehicle collisions. Due to its complexity and...

    Dungar Singh, Pritikana Das, Indrajit Ghosh in Journal on Multimodal User Interfaces
    Article 28 May 2024
  14. Cryptographic Primitives

    Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research...
    Mayank Raikwar, Shuang Wu in Blockchains
    Chapter 2024
  15. Synews: a synergy-based rumor verification system

    Online social networks (OSNs) are now implied as an important source of news and information besides establishing social connections. However, such...

    Amber Sarfraz, Adnan Ahmad, ... Hamid Turab Mirza in Social Network Analysis and Mining
    Article 15 March 2024
  16. B-Human 2022 – More Team Play with Less Communication

    The B-Human team won all of its seven games at the RoboCup 2022 competition in the Standard Platform League (SPL), scoring a total of 48 goals and...
    Thomas Röfer, Tim Laue, ... Philip Reichenberg in RoboCup 2022: Robot World Cup XXV
    Conference paper 2023
  17. FRIH: A face recognition framework using image hashing

    Face recognition is one of the most important research topics in computer vision. Indeed, the face is an important means of communication with humans...

    Mahsa Ghasemi, Hamid Hassanpour in Multimedia Tools and Applications
    Article 03 January 2024
  18. State Machine Replication Under Changing Network Conditions

    Protocols for state machine replication (SMR) are typically designed for synchronous or asynchronous networks, with a lower corruption threshold in...
    Andreea B. Alexandru, Erica Blum, ... Julian Loss in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  19. A practical byzantine fault tolerance improvement algorithm based on credit grou**-classification

    Blockchain is a distributed system that maintains a public ledger using consensus protocols. The practical byzantine fault tolerance (PBFT) protocol...

    Yilin Li, Hui Huang, ... Zhenjie Huang in The Journal of Supercomputing
    Article 31 May 2024
  20. IoMT-BADT: A blockchain-envisioned secure architecture with a lightweight authentication scheme for the Digital Twin environment in the Internet of Medical Things

    A healthcare-focused version of the Internet of Things (IoT), the Internet of Medical Things (IoMT) enables real-time monitoring and remote medical...

    Ayushi Jain, Mehak Garg, ... Bhawna Narwal in The Journal of Supercomputing
    Article 09 April 2024
Did you find what you were looking for? Share feedback.