Featured
-
-
Article
| Open AccessWideband low-RCS and gain-enhanced antenna using frequency selective absorber based on patterned graphene
- Fuwei Wang
- , Yi Wang
- & Yuhui Ren
-
Article
| Open AccessDual-branch feature encoding framework for infrared images super-resolution reconstruction
- Yuke Zhang
- , Peizi Zhou
- & Lizhu Chen
-
Article
| Open AccessTO-UGDA: target-oriented unsupervised graph domain adaptation
- Zhuo Zeng
- , Jianyu Xie
- & Duanbing Chen
-
Article
| Open AccessOptimizing support vector machine (SVM) by social spider optimization (SSO) for edge detection in colored images
- Jianfei Wang
-
Article
| Open AccessEvaluation of land resources carrying capacity based on entropy weight and cloud similarity
- Changlin Xu
- & Li Yang
-
Article
| Open AccessNonequal-length image encryption based on bitplane chaotic mapping
- Ruqing Zhang
- , Rigui Zhou
- & Jia Luo
-
Article
| Open AccessConstruction of power network security risk assessment model based on LSA-SVM algorithm in the background of smart grid
- Haojin Qi
- , Wan Zhu
- & Yong Wang
-
Article
| Open AccessCommunication spectrum prediction method based on convolutional gated recurrent unit network
- Lige Yuan
- , Lulu Nie
- & Yangzhou Hao
-
Article
| Open AccessMotif-based community detection in heterogeneous multilayer networks
- Yafang Liu
- , Aiwen Li
- & Zengru Di
-
Article
| Open AccessFirst public dataset to study 2023 Turkish general election
- Ali Najafi
- , Nihat Mugurtay
- & Onur Varol
-
Article
| Open AccessExploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing
- Heping Wen
- , Lincheng Yang
- & Daojing He
-
Article
| Open AccessGaining a better understanding of online polarization by approaching it as a dynamic process
- Célina Treuillier
- , Sylvain Castagnos
- & Armelle Brun
-
Article
| Open AccessA two-phase spatiotemporal chaos-based protocol for data integrity in IoT
- Mimouna Abdullah Alkhonaini
- , Farhan A. Alenizi
- & Sangkeum Lee
-
Article
| Open AccessDeterminants of multimodal fake review generation in China’s E-commerce platforms
- Chunnian Liu
- , Xutao He
- & Lan Yi
-
Article
| Open AccessAn efficient polynomial-based verifiable computation scheme on multi-source outsourced data
- Yiran Zhang
- , Huizheng Geng
- & Li Lu
-
Article
| Open AccessAn integrated design concept evaluation model based on interval valued picture fuzzy set and improved GRP method
- Qing Ma
- , Zhe Chen
- & Jianing Wei
-
Article
| Open AccessA secure and highly efficient blockchain PBFT consensus algorithm for microgrid power trading
- Zhongyuan Yao
- , Yonghao Fang
- & Xueming Si
-
Article
| Open AccessCPDC-MFNet: conditional point diffusion completion network with Muti-scale Feedback Refine for 3D Terracotta Warriors
- Xueli Xu
- , Da Song
- & Xin Cao
-
Article
| Open AccessJamming precoding in AF relay-aided PLC systems with multiple eavessdroppers
- Zhengmin Kong
- , Jiaxing Cui
- & Shihao Yan
-
Article
| Open AccessResponse accuracy of ChatGPT 3.5 Copilot and Gemini in interpreting biochemical laboratory data a pilot study
- Ahmed Naseer Kaftan
- , Majid Kadhum Hussain
- & Farah Hasson Naser
-
Article
| Open AccessAn efficient and accurate multi-level cascaded recurrent network for stereo matching
- Ziyu Zhong
- , Xiuze Yang
- & Shuo Wang
-
Article
| Open AccessBlockchain integration for in-vehicle CAN bus intrusion detection systems with ISO/SAE 21434 compliant reporting
- Tudor Andreica
- , Adrian Musuroi
- & Bogdan Groza
-
Article
| Open AccessA study on expression recognition based on improved mobilenetV2 network
- Qiming Zhu
- , Hongwei Zhuang
- & Rui Meng
-
Article
| Open AccessOriented feature pyramid network for small and dense wheat heads detection and counting
- Junwei Yu
- , Weiwei Chen
- & Chao Fan
-
Article
| Open AccessHandloomed fabrics recognition with deep learning
- Lipi B. Mahanta
- , Deva Raj Mahanta
- & Chandan Chakraborty
-
Article
| Open AccessANN: adversarial news net for robust fake news classification
- Shiza Maham
- , Abdullah Tariq
- & Tanzila Saba
-
Article
| Open AccessMosaic crack mapping of footings by convolutional neural networks
- Apichat Buatik
- , Phromphat Thansirichaisree
- & Nakhorn Poovarodom
-
Article
| Open AccessInvestigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy
- Juha Nurmi
- , Arttu Paju
- & David Arroyo
-
-
Article
| Open AccessEstablishing a reference focal plane using convolutional neural networks and beads for brightfield imaging
- Joe Chalfoun
- , Steven P. Lund
- & Sumona Sarkar
-
Article
| Open AccessInstance-level 6D pose estimation based on multi-task parameter sharing for robotic grasping
- Liming Zhang
- , Xin Zhou
- & Xinyu Wu
-
Article
| Open AccessSpectral band selection and ANIMR-GAN for high-performance multispectral coal gangue classification
- Qingya Wang
- , Huaitian Hua
- & Fen Yu
-
Article
| Open AccessEfficient DNA-based data storage using shortmer combinatorial encoding
- Inbal Preuss
- , Michael Rosenberg
- & Leon Anavy
-
Article
| Open AccessMultilevel thresholding with divergence measure and improved particle swarm optimization algorithm for crack image segmentation
- Fangyan Nie
- , Mengzhu Liu
- & Pingfeng Zhang
-
Article
| Open AccessBoxing behavior recognition based on artificial intelligence convolutional neural network with sports psychology assistant
- Yuanhui Kong
- & Zhiyuan Duan
-
Article
| Open AccessSpatial-temporal graph neural ODE networks for skeleton-based action recognition
- Longji Pan
- , Jianguang Lu
- & Xianghong Tang
-
Article
| Open AccessSurface defect detection of hot rolled steel based on multi-scale feature fusion and attention mechanism residual block
- Hongkai Zhang
- , Suqiang Li
- & Sixian Chan
-
Article
| Open AccessAn efficient and accurate 2D human pose estimation method using VTTransPose network
- Rui Li
- , Qi Li
- & An Yan
-
Article
| Open AccessTCN-attention-HAR: human activity recognition based on attention mechanism time convolutional network
- Xiong Wei
- & Zifan Wang
-
Article
| Open AccessResearch on predicting the driving forces of digital transformation in Chinese media companies based on machine learning
- Zhan Wang
- , Yao Li
- & Zihan Xiao
-
Article
| Open AccessOptical phase-truncation-based double-image encryption using equal modulus decomposition and random masks
- Guangyu Luan
- & Chenggen Quan
-
Article
| Open AccessResearch on collaborative edge network service migration strategy based on crowd clustering
- Junjie Cao
- , Zhiyong Yu
- & Bin Xue
-
Article
| Open AccessDimensionality reduction for images of IoT using machine learning
- Ibrahim Ali
- , Khaled Wassif
- & Hanaa Bayomi
-
Article
| Open AccessComparison of attribute-based encryption schemes in securing healthcare systems
- Redwan Walid
- , Karuna Pande Joshi
- & Seung Geol Choi
-
Article
| Open AccessEffects of non-landslide sampling strategies on machine learning models in landslide susceptibility mapping
- Tengfei Gu
- , Ping Duan
- & Yanke Zhang
-
Article
| Open AccessAn efficient intrusion detection model based on convolutional spiking neural network
- Zhen Wang
- , Fuad A. Ghaleb
- & Xing Lu
-
Article
| Open AccessAn IoT-based low-cost architecture for smart libraries using SDN
- Hui Xu
- , Wei-dong Liu
- & Qi Zhou
-
Article
| Open AccessImage rectangling network based on reparameterized transformer and assisted learning
- Lichun Yang
- , Bin Tian
- & Jianwu Dang
-
Article
| Open AccessAn evaluation of the replicability of analyses using synthetic health data
- Khaled El Emam
- , Lucy Mosquera
- & Alaa El-Hussuna