Results 21 to 30 of about 7,204 (101)

Chest X-ray and CT Scan Classification using Ensemble Learning through Transfer Learning

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
COVID-19 has posed an extraordinary challenge to the entire world. As the number of COVID-19 cases continues to climb around the world, medical experts are facing an unprecedented challenge in correctly diagnosing and predicting the disease. The present
Salman Ahmad Siddiqui   +2 more
doaj   +1 more source

An efficient access control scheme for smart campus

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
With the great concern of our country and the continuous development of the epidemic, the development of smart campus is getting faster and faster, the safety of teachers and students becomes more and more important.
Yiru Niu   +6 more
doaj   +1 more source

Enhanced Bitcoin Protocol with Effective Block Creation and Verification by Trusted Miners [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2020
The Distributed nature of Bitcoin introduces security issues that necessitate security-specific enhancements in Bitcoin protocol. Therefore, proposing a method of incorporating criteria check and verification process for miners to participate in the ...
R. Bala, R. Manoharan
doaj   +1 more source

Speech emotion recognition method in educational scene based on machine learning

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
In order to effectively improve the accuracy and anti noise performance of speech emotion recognition in educational scenes, a new method based on machine learning is studied. Based on the fundamental frequency and resonance degree, the speech emotional
Yanning Zhang, Gautam Srivastava
doaj   +1 more source

Performance analysis of compression algorithms for information security: A Review [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2020
Data compression is a vital part of information security, since compressed data is much more secure and convenient tohandle. Effective data compression technique creates an effective, secure, easy communicable & redundant data.
Neha Sharma, Usha Batra
doaj   +1 more source

Advanced Data Analytics Academic Program Review [PDF]

open access: yes, 2023
This report summarizes an evaluation of the UNT Libraries' Advanced Data Analytics-related resources and materials to determine if the collection is adequately serving patron needs.
Harker, Karen
core  

[Identifying Usability Level and Factors Affecting Electronic Nursing Record Systems: A Multi-institutional Time-motion Approach].

open access: yesJournal of Korean Academy of Nursing, 2015
PURPOSE The usability, user satisfaction, and impact of electronic nursing record (ENR) systems were investigated. METHODS This mixed-method research was performed as a time-motion (TM) study and a survey which were carried out at six hospitals between
Insook Cho   +7 more
semanticscholar   +1 more source

Trust Model for Effective Consensus in Blockchain

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
Blockchain technology is a revolution started as a new economy with an alternative currency namely Bitcoin. Besides the economical aspect, the technological capabilities of Blockchain such as distributed computing, record keeping, irrecoverability of ...
R. Shalini, R. Manoharan
doaj   +1 more source

Evaluation method for network multimedia teaching quality of English based on information entropy

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2022
INTRODUCTION: Evaluation method of network multimedia English teaching quality is studied based on information entropy. OBJECTIVES: A effective method is proposed to monitor and manage network multimedia teaching of English, which can improve the level
Zhi-yu Zhou, Mengye Lu
doaj   +1 more source

Three dimensional bounded transportation problem [PDF]

open access: yesYugoslav Journal of Operations Research, 2021
This article presents a methodology to solve a three dimensional bounded transportation problem. Bounded transportation problem is expounded by defining a parallel bounded transportation problem. Equivalence between the two problems is established.
Gupta Kavita, Arora Ritu
doaj   +1 more source

Home - About - Disclaimer - Privacy