We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Construction of Amharic information retrieval resources and corpora

    The development of information retrieval systems and natural language processing tools has been made possible for many natural languages because of...

    Tilahun Yeshambel, Josiane Mothe, Yaregal Assabie in Language Resources and Evaluation
    Article 02 July 2024
  2. Enhancing human mobility research with open and standardized datasets

    Takahiro Yabe, Massimiliano Luca, ... Esteban Moro in Nature Computational Science
    Article 02 July 2024
  3. Virtual Machine Provisioning Within Data Center Host Machines Using Ensemble Model in Cloud Computing Environment

    In the digital age of exponential data proliferation and growing computing demands, efficient resource management within data centers is crucial. A...

    Manik Chandra Pandey, Pradeep Singh Rawat in SN Computer Science
    Article 02 July 2024
  4. Generative adversarial networks for handwriting image generation: a review

    Handwriting synthesis, the task of automatically generating realistic images of handwritten text, has gained increasing attention in recent years,...

    Randa Elanwar, Margrit Betke in The Visual Computer
    Article Open access 02 July 2024
  5. Improved homomorphic evaluation for hash function based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...

    Benqiang Wei, **anhui Lu in Cybersecurity
    Article Open access 02 July 2024
  6. A Semiautomatic Image Processing-Based Method for Binary Segmentation of Lungs in Computed Tomography Images

    Precise biomedical image segmentation is pivotal in medical diagnosis and treatment. Among various methodologies, image processing-based techniques...

    Leo Ramos, Israel Pineda in SN Computer Science
    Article 02 July 2024
  7. The Oppositions of Categorical Propositions in Avicenna’s Frame

    The aim of this paper is to analyse categorical propositions and their oppositional relations in Avicenna’s frame. For Avicenna’s expression and...

    Saloua Chatti in Logica Universalis
    Article 02 July 2024
  8. Exploring high-quality image deraining Transformer via effective large kernel attention

    In recent years, Transformer has demonstrated significant performance in single image deraining tasks. However, the standard self-attention in the...

    Haobo Dong, Tianyu Song, ... Lei Fan in The Visual Computer
    Article 02 July 2024
  9. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

    Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...

    Rachana Y. Patil, Arijit Karati, Yogesh H. Patil in International Journal of Information Technology
    Article 02 July 2024
  10. Setting a double-capacitive neuron coupled with Josephson junction and piezoelectric source

    Perception of voice means acoustic electric conversion in the auditory system, and changes of external magnetic field can affect the neural...

    Yixuan Chen, Feifei Yang, ... Chunni Wang in Cognitive Neurodynamics
    Article 02 July 2024
  11. Convolutional neural network (CNN) and federated learning-based privacy preserving approach for skin disease classification

    This research displays inspect a study on the classification of human skin diseases using medical imaging, with a focus on data privacy preservation....

    Divya, Niharika Anand, Gaurav Sharma in The Journal of Supercomputing
    Article 02 July 2024
  12. SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption

    With the aim to enhance cloud security with higher data confidentiality rate and integrity, we propose a novel technique called Stochastic Deep...

    Sheeja Rani, P. V. Pravija Raj, Ahmed M. Khedr in The Journal of Supercomputing
    Article 02 July 2024
  13. Expecting politeness: perceptions of voice assistant politeness

    We examined how politeness perception can change when used by a human or voice assistant in different contexts. We conducted two norming studies and...

    Elise Duffau, Jean E. Fox Tree in Personal and Ubiquitous Computing
    Article Open access 02 July 2024
  14. Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis

    Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...

    Article 01 July 2024
  15. Artistic style decomposition for texture and shape editing

    While methods for generative image synthesis and example-based stylization produce impressive results, their black-box style representation...

    Max Reimann, Martin Büßemeyer, ... Matthias Trapp in The Visual Computer
    Article Open access 01 July 2024
  16. A novel solution for the development of a sentimental analysis chatbot integrating ChatGPT

    In today’s business landscape, Chatbots play a pivotal role in innovation and process optimization. In this paper, we introduced a novel advanced...

    Filippo Florindi, Pasquale Fedele, Giovanna Maria Dimitri in Personal and Ubiquitous Computing
    Article Open access 01 July 2024
  17. On modular (CRT-based) secret sharing

    Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way that only certain subsets of them can recover the secret. The...

    Article 01 July 2024
  18. Strategic view on the current role of AI in advancing environmental sustainability: a SWOT analysis

    Sustainability has become a critical global concern, focusing on key environmental goals such as achieving net-zero emissions by 2050, reducing...

    Lucas Greif, Andreas Kimmig, ... Jivka Ovtcharova in Discover Artificial Intelligence
    Article Open access 01 July 2024
  19. An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network

    Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...

    Rasmita Jena, Ram Chandra Barik, ... Saroj Pradhan in International Journal of Information Technology
    Article 01 July 2024
Did you find what you were looking for? Share feedback.