Results 1 to 10 of about 117,558 (58)
Blockchain data secure sharing protocol based on threshold Paillier algorithm
With the development of Internet technology, secure storage and secure sharing of data have become increasingly important. Traditional data sharing schemes exist a series of problems including lack of security and low efficiency.
Likai Jia +5 more
doaj +1 more source
An efficient identity-based signature protocol over lattices for the smart grid
As the promising next-generation power grid, the smart grid has developed rapidly in recent years. The smart grid enables energy to be stored and delivered more efficiently and safely, but user data’s integrity protection has been an important security ...
Longzhu Zhu +3 more
doaj +1 more source
Knowledge-based recommendation with contrastive learning
Knowledge Graphs (KGs) have been incorporated as external information into recommendation systems to ensure the high-confidence system. Recently, Contrastive Learning (CL) framework has been widely used in knowledge-based recommendation, owing to the ...
Yang He, Xu Zheng, Rui Xu, Ling Tian
doaj +1 more source
The COVID-19 pandemic instigated a paradigm shift in healthcare delivery with a rapid adoption of technology-enabled models of care, particularly within the general practice primary care setting.
Donovan Jones +9 more
doaj +1 more source
Railway Safety Assessment Model Solving by Decision Tree and PSO Algorithm
Safety assessment and safety warning in intelligent railway play an important role in safety management. This paper utilizes the PSO algorithm with bounds and time-varying attractor to obtain some parameters in the safety assessment model.
Liu Jun +5 more
doaj +1 more source
Immersive Virtual Reality (IVR) is a promising tool for improving the teaching and learning of nursing and midwifery students. However, the preexisting literature does not comprehensively examine scenario development, theoretical underpinnings, duration,
Maram A. Alammary +2 more
doaj +1 more source
Protection architecture of endogenous safety and security for industrial control systems
According to the essential characteristic of industrial control system (ICS), endogenous safety and security (ESS) can be achieved by merging cyber security (CS) into functional safety (FS).
Xin Yaozhong
doaj +1 more source
The COVID-19 pandemic is already considered one of the biggest global health crises. In Rio Grande do Norte, a Brazilian state, the RegulaRN platform was the health information system used to regulate beds for patients with COVID-19.
Tiago de Oliveira Barreto +21 more
doaj +1 more source
Voice spoofing detection using a neural networks assembly considering spectrograms and mel frequency cepstral coefficients [PDF]
Nowadays, biometric authentication has gained relevance due to the technological advances that have allowed its inclusion in many daily-use devices. However, this same advantage has also brought dangers, as spoofing attacks are now more common. This work
Carlos Alberto Hernández-Nava +5 more
doaj +2 more sources
IntroductionArtificial intelligence (AI) technology has made rapid progress for disease diagnosis and triage. In the field of ophthalmic diseases, image-based diagnosis has achieved high accuracy but still encounters limitations due to the lack of ...
Zhiyu Peng +37 more
doaj +1 more source

