Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Aeronautical information service (AIS) involves manifold correlations among aeronautical events. The data mining technology has been used to extract the characteristics of aeronautical information. With the aeronautical dynamic...
This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform...
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
Dental computed tomography (CT) images and optical surface scan data are widely used in dental computer-aided design systems. Registration is essential if they are used in software systems. Existing automatic registration...
The application of digital information and computing technology can significantly improve cooperation between different enterprises and the efficiency of knowledge and resources management, while facilitating the participation...