Results 11 to 20 of about 1,230,418 (352)
Semiāsupervised classification of fundus images combined with CNN and GCN
Abstract Purpose Diabetic retinopathy (DR) is one of the most serious complications of diabetes, which is a kind of fundus lesion with specific changes. Early diagnosis of DR can effectively reduce the visual damage caused by DR. Due to the variety and different morphology of DR lesions, automatic classification of fundus images in mass screening can ...
Sixu Duan+8 more
wiley +1 more source
Blockchain Secured Dynamic Machine Learning Pipeline for Manufacturing
ML-based applications already play an important role in factories in areas such as visual quality inspection, process optimization, and maintenance prediction and will become even more important in the future.
Fatemeh Stodt+2 more
doaj +1 more source
Cryptography in Cloud Computing
Cryptography is a key element in establishing trust and enabling services in the digital world. It is represented in a ways that are not accessible to human users. Hence, humans are left out the trust and security in the digital world. Cryptography is necessary in modern communication protocols and to many digital services.
Harjinder Kaur, Amandeep Kaur
openaire +2 more sources
A large number of researchers, academia, government sectors, and business enterprises are adopting the cloud environment due to the least upfront capital investment, maximum scalability, and several other features of it.
Ishu Gupta+3 more
doaj +1 more source
Issues and challenges: cloud computing e-Government in developing countries [PDF]
Cloud computing has become essential for IT resources that can be delivered as a service over the Internet. Many e-government services that are used worldwide provide communities with relatively complex applications and services.
Al Mudawi, Naif+2 more
core +1 more source
Virtualization in Cloud Computing [PDF]
Virtualization and virtual situations are major basics for files input in cloud adding. It is assistances for together the visitor user and the worker while it provides the first with the features needed to execute his demand, it gives the second the capacity to be cover different guests with no extra cost.
Arun Prasath. M, Mrs. T. Sathiyabama
openaire +2 more sources
An effective optimization method based on a self-adaptive differential evolution (DE) algorithm is proposed to design high-channel-count fiber Bragg grating (FBG) filters.
Jing Chen+5 more
doaj +1 more source
Graph database-based network security situation awareness data storage method
With the rapid development of the Internet, network security situation awareness has attracted tremendous attention. In large-scale complex networks, network security situation awareness data presents the characteristics of large-scale, multi-source, and
Xiaoling Tao+4 more
doaj +1 more source
Greening emerging IT technologies: techniques and practices
The tremendous increase in global industrial activity has resulted in high utilization of natural energy resources and increase in global warming over the last few decades. Meanwhile, computing has become a popular utility of modern human lifestyle. With
Junaid Shuja+7 more
doaj +1 more source
A Taxonomy of Blockchain Consensus Methods
For a blockchain, consensus is the foundation protocol that enables cryptocurrencies such as Bitcoin to maintain state. Additionally, to ensure safety and liveness for a publicly accessible and verifiable ledger, fault tolerance must be robust.
Jeff Nijsse, Alan Litchfield
doaj +1 more source