Results 101 to 110 of about 77,066 (262)

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

An Ad Hoc Adaptive Hashing Technique forNon-Uniformly Distributed IP Address Lookup in Computer Networks [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2007
Hashing algorithms long have been widely adopted to design a fast address look-up process which involves a search through a large database to find a record associated with a given key. Hashing algorithms involve transforming a key inside each target data
Christopher Martinez, Wei-Ming Lin
doaj  

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

A Bridge Transformer Network With Deep Graph Convolution for Hyperspectral Image Classification

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Transformers have been widely applied to hyperspectral image classification, leveraging their self‐attention mechanism for powerful global modelling. However, two key challenges remain as follows: excessive memory and computational costs from calculating correlations between all tokens (especially as image size or spectral bands increase) and ...
Yuquan Gan   +5 more
wiley   +1 more source

TNCOA: Efficient Exploration via Observation‐Action Constraint on Trajectory‐Based Intrinsic Reward

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Efficient exploration is critical in handling sparse rewards and partial observability in deep reinforcement learning. However, most existing intrinsic reward methods based on novelty rely on single‐step observations or Euclidean distances.
Jingxiang Ma, Hongbin Ma, Youzhi Zhang
wiley   +1 more source

Hashing to detect identical ordering of species in a shared sublattice

open access: yesScience and Technology of Advanced Materials: Methods
Finding very low energy configurations of species on a shared sublattice is unavoidable in some problems governed by ground states of the sublattice, such as voltage curve estimation of battery cathode materials. Calculations of partial occupancy systems,
Yoyo Hinuma
doaj   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Heisenberg Group-Based Digital Signatures for Secure Communications

open access: yesIEEE Access
This paper proposes a new digital signature algorithm that employs the Heisenberg group over a prime field and exploits its structure to provide strong cryptographic properties. The developed scheme involves the Heisenberg group within a commutator-based
Najla Althuniyan   +4 more
doaj   +1 more source

Retirement Savings Incentives for Low‐ and Middle‐Income Individuals: Does Government Funded Matching Change Behaviour?*

open access: yesEconomic Record, EarlyView.
We evaluate a government‐funded matching policy for retirement savings contributions targeted at low‐ and middle‐income individuals. Using a difference‐in‐difference approach, we exploit administrative changes to the Australian Government's retirement contribution matching (co‐contribution) policy to identify the impact of the programme on savings ...
Kristen Sobeck, Robert Breunig
wiley   +1 more source

Home - About - Disclaimer - Privacy