Search
Search Results
-
Loss Function with Memory for Trustworthiness Threshold Learning: Case of Face and Facial Expression Recognition
We compare accuracy metrics of the supervisor meta-learning artificial neural networks (ANN) that learn the trustworthiness of the Inception v.3... -
Optimal path planning of multi-robot in dynamic environment using hybridization of meta-heuristic algorithm
This paper investigates an innovative strategy for generating a collision and deadlock-free optimal position for the individual robots by satisfying...
-
A Block Chain Dynamic Key Sharing and Updating Scheme Based on the (t, n) Threshold
Key sharing and updating is the core problem in key management. In order to solve the centralization, security and secret share loss in the process... -
SybilSort algorithm - a friend request decision tracking recommender system in online social networks
Sybils are detected and prevented from making friends on Online Social Networks (OSN) by the proposed SybilSort algorithm. SybilSort operates in the...
-
Storing and Retrieving Secrets on a Blockchain
A secret sharing scheme enables one party to distribute shares of a secret to n parties and ensures that an adversary in control of t out of n... -
Efficient detection and partitioning of overlapped red blood cells using image processing approach
Detecting the abnormality of Red Blood Cells automatically aids hematologists in diagnosing sickness and minimizes time, money. The complicated...
-
Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain
The application of blockchain technology to the field of e-commerce has solved many dilemmas, such as low transparency of transactions, hidden risks...
-
Enabling personalized VR experiences: a framework for real-time adaptation and recommendations in VR environments
The personalization of user experiences through recommendation systems has been extensively explored in Internet applications, but this has yet to be...
-
On-chain repairing for multi-party data migration
Blockchain can be used to solve the problem of mutual trust between different institutions. However, when migrating data from a traditional system to...
-
Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain
The security and transparency provided to the data in blockchain are unmatchable, with the least instances of system hack or failure reported. With a... -
Hybrid energy efficient deep learning and redactable consortium blockchain-based secure framework for smart parking in smart cities
Management of vehicular parking in the crowded environment is the indispensable requirement for the smart city scenario. The advent and potential...
-
Interactive visualization-based surveillance video synopsis
Video synopsis is an effective technique for the efficient analysis of long videos in a short time. To generate a compact video, multiple tracks of...
-
Prediction of pedestrian crossing behaviour at unsignalized intersections using machine learning algorithms: analysis and comparison
The primary safety hazard at unsignalized intersections, particularly in urban areas, is pedestrian-vehicle collisions. Due to its complexity and...
-
Cryptographic Primitives
Blockchain is a promising and growing technology for providing reliable and secure decentralized solutions. Nevertheless, it encounters many research... -
Synews: a synergy-based rumor verification system
Online social networks (OSNs) are now implied as an important source of news and information besides establishing social connections. However, such...
-
B-Human 2022 – More Team Play with Less Communication
The B-Human team won all of its seven games at the RoboCup 2022 competition in the Standard Platform League (SPL), scoring a total of 48 goals and... -
FRIH: A face recognition framework using image hashing
Face recognition is one of the most important research topics in computer vision. Indeed, the face is an important means of communication with humans...
-
State Machine Replication Under Changing Network Conditions
Protocols for state machine replication (SMR) are typically designed for synchronous or asynchronous networks, with a lower corruption threshold in... -
A practical byzantine fault tolerance improvement algorithm based on credit grou**-classification
Blockchain is a distributed system that maintains a public ledger using consensus protocols. The practical byzantine fault tolerance (PBFT) protocol...
-
IoMT-BADT: A blockchain-envisioned secure architecture with a lightweight authentication scheme for the Digital Twin environment in the Internet of Medical Things
A healthcare-focused version of the Internet of Things (IoT), the Internet of Medical Things (IoMT) enables real-time monitoring and remote medical...