Results 131 to 140 of about 3,112 (196)

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Ultranarrow-linewidth wavelength-vortex metasurface holography. [PDF]

open access: yesSci Adv
Meng W   +9 more
europepmc   +1 more source

TNCOA: Efficient Exploration via Observation‐Action Constraint on Trajectory‐Based Intrinsic Reward

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Efficient exploration is critical in handling sparse rewards and partial observability in deep reinforcement learning. However, most existing intrinsic reward methods based on novelty rely on single‐step observations or Euclidean distances.
Jingxiang Ma, Hongbin Ma, Youzhi Zhang
wiley   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Correlated Transient Response of Buried Cables and Lightning Channel Radiation of Return Strokes of Five Rocket‐Triggered Lightning Strikes

open access: yesHigh Voltage, EarlyView.
ABSTRACT Data from five rocket‐triggered lightning flashes are adopted to analyse the correlated transient response of buried cables and lightning channel radiations. These five flashes have the same termination point that is right above the buried cables and involve a total of 32 return strokes.
Mi Zhou   +9 more
wiley   +1 more source

Metasurface-enabled optical encryption and steganography with enhanced information security. [PDF]

open access: yesNanophotonics
Xing W   +9 more
europepmc   +1 more source

A Blockchain-Based Framework With Zero-Knowledge Proof Incorporated for Safeguarded Sharing of Genomic Data Through Health Record Systems. [PDF]

open access: yesBlockchain Healthc Today
Krishappa N   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy