Search

Results: 9
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Published by: IGI Global
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications
Security and privacy issues in wireless medical sensor networks (WMSNs) have attracted lots of attention in both academia and industry due to the sensitiveness of medical system. In the past decade, extensive research has been...
Published by: IGI Global
A Predictive and Trajectory-Aware Edge Service Allocation Approach in a Mobile Computing Environment
Ling Huang, Bin Shuai
Jan 01, 2022
The mobile edge computing (MEC) model is featured by the ability to provision elastic computing resources close to user requests at the edge of the internet. This paradigm moves traditional digital infrastructure close to mobile...
Published by: IGI Global
A Spatio-Temporal Resource Description Framework Schema Model for Aeronautical Dynamic Information Based on Semantic Analysis
Aeronautical information service (AIS) involves manifold correlations among aeronautical events. The data mining technology has been used to extract the characteristics of aeronautical information. With the aeronautical dynamic...
Published by: IGI Global
Audio Tampering Forensics Based on Representation Learning of ENF Phase Sequence
This paper proposes an audio tampering detection method based on the ENF phase and BI-LSTM network from the perspective of temporal feature representation learning. First, the ENF phase is obtained by discrete Fourier transform...
Published by: IGI Global
CVaR Prediction Model of the Investment Portfolio Based on the Convolutional Neural Network Facilitates the Risk Management of the Financial Market
In summary, firstly, a method for establishing a portfolio model is proposed based on the risk management theory of the financial market. Then, a prediction model for CVaR is established based on the convolutional neural...
Published by: IGI Global
A Two-Stage Registration Method for Dental Volumetric Data and Mesh Data
Dental computed tomography (CT) images and optical surface scan data are widely used in dental computer-aided design systems. Registration is essential if they are used in software systems. Existing automatic registration...
Published by: IGI Global
The Transfer Strategy of Digital Information Technology for Heterogeneous Manufacturers
The application of digital information and computing technology can significantly improve cooperation between different enterprises and the efficiency of knowledge and resources management, while facilitating the participation...
Published by: IGI Global