We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. A hybrid neural network for urban rail transit short-term flow prediction

    Accurate and rapid short-term passenger flow prediction is the foundation for safe and efficient operation of urban rail transit systems. The urban...

    Caihua Zhu, **aoli Sun, ... Yan Li in The Journal of Supercomputing
    Article 03 July 2024
  2. Multi-scale modeling to investigate the effects of transcranial magnetic stimulation on morphologically-realistic neuron with depression

    Transcranial magnetic stimulation (TMS) is a non-invasive neuromodulation technique to activate or inhibit the activity of neurons, and thereby...

    Licong Li, Shuaiyang Zhang, ... **uling Liu in Cognitive Neurodynamics
    Article 03 July 2024
  3. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud

    With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud...

    Miao Tian, Yushu Zhang, ... Wenying Wen in Cybersecurity
    Article Open access 03 July 2024
  4. Effective multi-scale enhancement fusion method for low-light images based on interest-area perception OCTM and “pixel healthiness” evaluation

    Low-light images suffer from low contrast and low dynamic range. However, most existing single-frame low-light image enhancement algorithms are not...

    Yi-lun Wang, Yi-zheng Lang, Yun-sheng Qian in The Visual Computer
    Article 02 July 2024
  5. Delineation of ECG waveform components using encoder-decoder architecture with Postprocess algorithm

    With the exponential increase in heart disease cases, it is essential to construct models (algorithms) that can be used to delineate...

    Deepti Sharma, Narendra Kohli in International Journal of Information Technology
    Article 02 July 2024
  6. Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics

    Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...

    Yevhenii Shudrenko, Andreas Timm-Giel in Computing
    Article Open access 02 July 2024
  7. The maximum number of homogeneous weights of linear codes over chain rings

    The problem of determining the largest possible number of distinct Hamming weights in several classes of codes over finite fields was studied...

    Minjia Shi, Tingting Tong, ... Patrick Solé in Journal of Algebraic Combinatorics
    Article 02 July 2024
  8. Hardware architecture and memristor-crossbar implementation of type-2 fuzzy system with type reduction and in-situ training

    The Type-2 fuzzy set is a fuzzy set with fuzzy membership degrees. This set is used when accurately determining the membership degree of a fuzzy set...

    Sajad Haghzad Klidbary, Mohammad Javadian in The Journal of Supercomputing
    Article 02 July 2024
  9. Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies

    Deploying virtual machines poses a significant challenge for cloud data centers, requiring careful consideration of various objectives such as...

    Arezoo Ghasemi, Abolfazl Toroghi Haghighat, Amin Keshavarzi in Computing
    Article 02 July 2024
  10. Heterogeneous wireless network selection using feed forward double hierarchy linguistic neural network

    Network selection in heterogeneous wireless networks (HWNs) is a complex issue that requires a thorough understanding of service features and user...

    Saleem Abdullah, Ihsan Ullah, Fazal Ghani in Artificial Intelligence Review
    Article Open access 02 July 2024
  11. Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to...

    Jiangang Hou, **n Li, ... Changzhen Hu in Computing
    Article 02 July 2024
  12. IoV security and privacy survey: issues, countermeasures, and challenges

    As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...

    Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati in The Journal of Supercomputing
    Article 02 July 2024
  13. Predicting the Acceptance of Metaverse for Educational Purposes in Universities: A Structural Equation Model and Mediation Analysis of the Extended Technology Acceptance Model

    This study investigated factors that predict the acceptance of metaverse applications for educational usage among university students from the facet...

    Mohd Shafie Rosli, Nor Shela Saleh in SN Computer Science
    Article 02 July 2024
  14. Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm

    In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...

    Voore Subba Rao, G. Ravindra Babu in International Journal of Information Technology
    Article 02 July 2024
  15. Varieties of Cubes of Opposition

    The objects called cubes of opposition have been presented in the literature in discordant ways. The aim of the paper is to offer a survey of such...

    Claudio E. A. Pizzi in Logica Universalis
    Article Open access 02 July 2024
  16. Potential of ChatGPT as a digital language learning assistant: EFL teachers’ and students’ perceptions

    ChatGPT is one example of an artificial intelligence (AI) tool that is gaining attention in the field of language education due to its potential as a...

    Article Open access 02 July 2024
  17. Vergleich der Umsetzungsoptionen für Steuersysteme im Verbund im Energiesektor: Sicherheitsanforderungen, Effizienz und Wirksamkeit auf zentraler und dezentraler Ebene

    The constant change from an energy supply based on fossil fuels to a supply based on renewable energies serves, among other things, the goal of...

    Sven Müller, Kevin Müller, ... Christian Weindl in HMD Praxis der Wirtschaftsinformatik
    Article Open access 02 July 2024
  18. The Najdi Arabic Corpus: a new corpus for an underrepresented Arabic dialect

    This paper presents a new corpus for a dialect of Arabic spoken in the central region of Saudi Arabia: the Najdi Arabic Corpus. This is the first...

    Rukayah Alhedayani in Language Resources and Evaluation
    Article 02 July 2024
Did you find what you were looking for? Share feedback.