Early detection of all types of lung nodules with different characters in medical modality images using computer-aided detection is the best acceptable remedy to save the lives of lung cancer sufferers. But accuracy of different...
For the system with unknown statistical property noises, the property that the energies of the system noise and the observation noise are limited is utilized in this paper. On this basis, two novel fusion algorithms are proposed...
The backpropagation neural network (BPNN) algorithm of artificial intelligence (AI) is utilized to predict A+H shares price for helping investors reduce the risk of stock investment. First, the genetic algorithm (GA) is used to...
Hydrogen evolution reaction (HER) is directly relevant to green hydrogen production from water splitting. Recently, a low-cost Ni5P4 material has been demonstrated experimentally and theoretically to...
This paper presents novel results concerning engagement with ICT standards and their implementations in open source software (OSS). Specifically, findings draw from observations and analysis related to standards and...
This paper presents the design of 2*1 and 4*1 RFID reader microstrip array antenna at 2.4GHz for the Internet of things (IoT) networks which are Zigbee, Bluetooth and WIFI. The proposed antenna is composed of identical...
There is an unmet clinical need for imaging agents capable of detecting early evidence of tumor cell death, since the timing, extent, and distribution of cell death in tumors following treatment can give an indication of...
Singers both rejoice and suffer under the weight of their instrument. It becomes not only a major part of their identity but, in many cases, it becomes their central or "master status" (Hughes, 1945). This research examines the...
Face sketch recognition is considered as a sub-problem of face recognition. Matching composite sketches with its corresponding digital image is one of the challenging tasks. A new convolution neural network (CNN) framework for...
The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex...
In this paper, an intra-prediction mode (IPM)-based video steganography with secure strategy was proposed for H.264 video stream. First of all, according to the property of IPM conversion after calibration, a content-adaptive...
This paper aims to provide an overview of academic research within the field of digital transformation. The authors conduct a bibliometric analysis using VOSviewer, Harzing’s Publish or Perish, and SciMAT to evaluate and...
This paper proposes a design of a H_¥ filter for a functional of the system state that the authors call functional H_¥ filter in time domain for linear singular systems with additional unknown inputs and bounded disturbances....
Non-Factoid Question Answering (QA) is the next generation of textual QA systems, which gives passage level summaries for a natural language query, posted by the user. The main issue lies in the appropriateness of the generated...
In the research community, the estimation of the scholarly impact of an individual is based on either citation-based indicators or network centrality measures. The network-based centrality measures like degree, closeness...
The internet makes it easier for people to connect to each other and has become a platform to express ideas and share information with the world. The growth of the internet has indirectly led to the development of social...
The early Poisson distribution and Markov autoregressive models can no longer reflect the characteristics of smart grid business flow. The long correlation characteristics of burst flow are simulated by the heavy tail ON/OFF...
Behavioral change is essential to mitigate climate change. To advance current knowledge, we synthesize research on interventions aiming to promote climate change mitigation behaviors in field settings. In a preregistered...
This paper intends to develop an automatic behavior-based smart phone authentication model by three major phases: feature extraction, weighted logarithmic transformation, and classification. Initially, from the data related to...
Due to the increasing ageing population, how can caregivers effectively provide long-term care services to meet the older adults’ needs with finite resources is emerging. In addressing this issue, nursing homes are striving to...
We describe the Milky Way Survey (MWS) that will be undertaken with the Dark Energy Spectroscopic Instrument (DESI) on the Mayall 4 m telescope at the Kitt Peak National Observatory. Over the next 5 yr DESI MWS will observe...
Human activity recognition (HAR) plays a vital role in the field of ambient assisted living (AAL) for the welfare of the elders who live alone in the home. AAL provides service through ambient sensors, vision systems, smartphone...
The global nature of e-commerce is complicating privacy issues because perceptions of privacy, trust, risk, and fair information practices vary across cultures, and differences in national regulation create challenges for global...
Transitive verbs in Totonac-Tepehua languages show apparent irregularities in agreement in verb forms where both subject and object are speech act participants (that is, 1 H 2 combinations) and one or both are plural. Data from...