We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 616 results
  1. Loss Function with Memory for Trustworthiness Threshold Learning: Case of Face and Facial Expression Recognition

    We compare accuracy metrics of the supervisor meta-learning artificial neural networks (ANN) that learn the trustworthiness of the Inception v.3...
    Stanislav Selitskiy, Natalya Selitskaya in Machine Learning, Optimization, and Data Science
    Conference paper 2023
  2. Optimal path planning of multi-robot in dynamic environment using hybridization of meta-heuristic algorithm

    This paper investigates an innovative strategy for generating a collision and deadlock-free optimal position for the individual robots by satisfying...

    Hemanta Kumar Paikray, Pradipta Kumar Das, Sucheta Panda in International Journal of Intelligent Robotics and Applications
    Article 11 September 2022
  3. Path Planning in UAV-Assisted Wireless Networks: A Comprehensive Survey and Open Research Issues

    UAV-assisted wireless networks are becoming more and more used and are invading many fields thanks to their performance and efficiency. However,...
    Henda Hnaien, Ahmed Aboud, ... Hichem Snoussi in Advanced Information Networking and Applications
    Conference paper 2024
  4. A Block Chain Dynamic Key Sharing and Updating Scheme Based on the (t, n) Threshold

    Key sharing and updating is the core problem in key management. In order to solve the centralization, security and secret share loss in the process...
    Wei Tang, Yu-Ling Chen, Yun Yang in Machine Learning for Cyber Security
    Conference paper 2020
  5. SybilSort algorithm - a friend request decision tracking recommender system in online social networks

    Sybils are detected and prevented from making friends on Online Social Networks (OSN) by the proposed SybilSort algorithm. SybilSort operates in the...

    Poornima Nedunchezhian, Murugan Mahalingam in Applied Intelligence
    Article 15 July 2021
  6. A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies

    This chapter presents a distributed e-voting system that solves the problems of vote-rigging, voter impersonation, and vote falsification, all of...
    O. M. Olaniyi, E. M. Dogo, ... Z. Folawiyo in Blockchain Applications in the Smart Era
    Chapter 2022
  7. Proactive approach for preamble detection in 5G-NR PRACH using supervised machine learning and ensemble model

    The physical random access channel (PRACH) is used in the uplink of cellular systems for initial access requests from the users. It is very hard to...

    Syeda Sundus Zehra, Maurizio Magarini, ... Faiza Farooq in Scientific Reports
    Article Open access 19 May 2022
  8. Storing and Retrieving Secrets on a Blockchain

    A secret sharing scheme enables one party to distribute shares of a secret to n parties and ensures that an adversary in control of t out of n...
    Vipul Goyal, Abhiram Kothapalli, ... Yifan Song in Public-Key Cryptography – PKC 2022
    Conference paper 2022
  9. Efficient detection and partitioning of overlapped red blood cells using image processing approach

    Detecting the abnormality of Red Blood Cells automatically aids hematologists in diagnosing sickness and minimizes time, money. The complicated...

    Prasenjit Dhar, K. Suganya Devi, ... P. Srinivasan in Innovations in Systems and Software Engineering
    Article 21 September 2022
  10. A Review on Design and Performance Evaluation of Privacy Preservation Techniques in Data Mining

    As the world is moving toward digitization in all sectors like education, banking, voting, education, transportation, etc. There are possible chances...
    Conference paper 2023
  11. Privacy-Preserving Cross-Domain Authentication in Internet of Things

    This chapter introduces a unified blockchain-assisted framework for secure cross-domain authorization and authentication in smart city IoT...
    Cheng Huang, Xuemin (Sherman) Shen in Decentralized Privacy Preservation in Smart Cities
    Chapter 2024
  12. Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain

    The application of blockchain technology to the field of e-commerce has solved many dilemmas, such as low transparency of transactions, hidden risks...

    Guangshun Li, Haoyang Wu, ... Zhenqiang Li in Journal of Cloud Computing
    Article Open access 09 May 2024
  13. Between Rebirth and Decline

    The vote on April 9 and 10, 2006 inaugurates the legislature, marking a further step in the long march toward a hard to achieve stability. The...
    Umberto Gentiloni Silveri in The History of Contemporary Italy 1943-2019
    Chapter 2022
  14. Optimal Multi-robot Path Planning Using Particle Swarm Optimization Algorithm Improved by Sine and Cosine Algorithms

    This paper highlights a new approach to generate an optimal collision-free trajectory path for each robot in a cluttered and unknown workspace using...

    H. K. Paikray, P. K. Das, S. Panda in Arabian Journal for Science and Engineering
    Article 03 January 2021
  15. Enabling personalized VR experiences: a framework for real-time adaptation and recommendations in VR environments

    The personalization of user experiences through recommendation systems has been extensively explored in Internet applications, but this has yet to be...

    Sergio Valmorisco, Laura Raya, Alberto Sanchez in Virtual Reality
    Article Open access 26 June 2024
  16. A survey on cognitive radio network attack mitigation using machine learning and blockchain

    Cognitive radio network is a promising technology to enhance the spectrum utilization and to resolve the spectrum scarcity issues. But the malicious...

    I. Evelyn Ezhilarasi, J. Christopher Clement, Joseph M. Arul in EURASIP Journal on Wireless Communications and Networking
    Article Open access 30 September 2023
  17. On-chain repairing for multi-party data migration

    Blockchain can be used to solve the problem of mutual trust between different institutions. However, when migrating data from a traditional system to...

    Wenchao Jiang, Weiqi Dai, ... Sui Lin in World Wide Web
    Article 09 May 2023
  18. Proactive AI Enhanced Consensus Algorithm with Fraud Detection in Blockchain

    The security and transparency provided to the data in blockchain are unmatchable, with the least instances of system hack or failure reported. With a...
    Vinamra Das, Aswani Kumar Cherukuri, ... Annapurna Jonnalagadda in Blockchain for Cybersecurity in Cyber-Physical Systems
    Chapter 2023
  19. Hybrid energy efficient deep learning and redactable consortium blockchain-based secure framework for smart parking in smart cities

    Management of vehicular parking in the crowded environment is the indispensable requirement for the smart city scenario. The advent and potential...

    Amu D., Santhi Baskaran in Multimedia Tools and Applications
    Article 14 June 2024
  20. Utilizing Blockchain for Safeguarding IoT-Based Robotic Networks from Spoofing Attacks

    In the dynamic realm of IoT-based robotic networks, autonomous robots, with their intricate integration of sensors and data-driven functionalities,...
    Chapter 2024
Did you find what you were looking for? Share feedback.