Cloud computing offers solutions for various scientific and business applications. Large-scale scientific applications, which are organized as scientific workflows, are carried out using cloud computing. However, the ...
详细信息
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods ...
详细信息
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information ***,distributed methods also exist,such as peer-to-peer networks and distributed hash *** technology,which is decentralized,anonymous,non-tamperable and anti-attack,can be applied to covert communication to solve the problems of traditional methods and improve the quality of communication.
Brain tumors are regarded as one of the most lethal, devastating, and aggressive diseases, significantly reducing the life expectancy of affected individuals. For this reason, in pursuit of advancing brain tumor diagn...
详细信息
This paper introduces a novel convolutional neural network model with an attention mechanism to advance Alzheimer disease (AD) classification using Magnetic Resonance Imaging (MRI). The model architecture is meticulou...
详细信息
The purpose of this study is increasing the usability of the user interfaces (UI) by ensuring their compliance with Gestalt principles. The developed method of evaluating the compliance of the UI with Gestalt principl...
详细信息
The development of multi-agent technology for assessing the availability of information at the software development initial stages is an actual task, the solution of which is the purpose of this study. The paper prese...
详细信息
One of the key factors in successful information security management is the effective compliance of security policies and proper integration of "people", "process" and "technology". When ...
详细信息
The main methods of analysis the accuracy of the geolocation system were studied. The aspects of technology for obtaining geographical coordinates using Google geolocation system (GPS) were considered. The best method...
详细信息
Deep learning (DL) is deployed in Deep Neural Networks (DNNs), Recurrent Neural Networks (RNNs), Convolutional Neural Networks (CNNs), Deep Stacked Networks (DSNs), Deep Belief Networks (DBNs), and Deep Boltzmann Mach...
详细信息
The aim of this study is the development of the method of generating and filling the template of ontology for the quality of the concrete software and method of forming the logical conclusion about the sufficiency of ...
详细信息
暂无评论