Computers Materials&Continua
- A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services
- A Hybrid Model for Anomalies Detection in AMI System Combining K-means Clustering and Deep Neural Network
- Topological Characterization of Book Graph and Stacked Book Graph
- Efficient Analysis of Vertical Projection Histogram to Segment Arabic Handwritten Characters
- An Auto-Calibration Approach to Robust and Secure Usage of Accelerometers for Human Motion Analysis in FES Therapies
- Balanced Deep Supervised Hashing
- A Novel Reversible Data Hiding Scheme Based on Lesion Extraction and with Contrast Enhancement for Medical Images
- A Scalable Method of Maintaining Order Statistics for Big Data Stream
- A High Gain, Noise Cancelling 3.1-10.6 GHz CMOS LNA for UWB Application
- Traffic Sign Recognition Method Integrating Multi-Layer Features and Kernel Extreme Learning Machine Classifier
- Super-Resolution Reconstruction of Images Based on Microarray Camera
- A Scalable Approach for Fraud Detection in Online E-Commerce Transactions with Big Data Analytics
- Online Burst Events Detection Oriented Real-Time Microblog Message Stream
- An Improved MDS-MAP Localization Algorithm Based on Weighted Clustering and Heuristic Merging for Anisotropic Wireless Networks with Energy Holes
- Stream-Based Data Sampling Mechanism for Process Object
- New Generation Model of Word Vector Representation Based on CBOW or Skip-Gram
- Relation Extraction for Massive News Texts
- Improved Fully Convolutional Network for Digital Image Region Forgery Detection
- A New NTRU-Type Public-Key Cryptosystem over the Binary Field
- Network Embedding-Based Anomalous Density Searching for Multi-Group Collaborative Fraudsters Detection in Social Media
- A Novel Broadband Microstrip Antenna Based on Operation of Multi-Resonant Modes
- Fuzzy Search for Multiple Chinese Keywords in Cloud Environment
- Knowledge Composition and Its Influence on New Product Development Performance in the Big Data Environment
- Outage Capacity Analysis for Cognitive Non-Orthogonal Multiple Access Downlink Transmissions Systems in the Presence of Channel Estimation Error
- A Cross-Tenant RBAC Model for Collaborative Cloud Services
- Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model