In this paper, we investigate the relationship between the use of discourse relations and the CEFR-level of argumentative English learner essays. Using both the Rhetorical Structure Theory (RST) and the Penn Discourse...
Northern Bangladesh is home to the most lychee growing, which has a major economic impact. Lychee output and quality are reduced by various leaf and fruit diseases. Deep learning is used to construct a disease detecti...
详细信息
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and th...
详细信息
The trusted sharing of Electronic Health Records(EHRs)can realize the efficient use of medical data *** speaking,EHRs are widely used in blockchain-based medical data *** are valuable private assets of patients,and the ownership belongs to *** recent research has shown that patients can freely and effectively delete the EHRs stored in hospitals,it does not address the challenge of record sharing when patients revisit *** order to solve this problem,this paper proposes a deletion and recovery scheme of EHRs based on Medical Certificate *** paper uses cross-chain technology to connect the Medical Certificate Blockchain and the Hospital Blockchain to real-ize the recovery of deleted *** the same time,this paper uses the Medical Certificate Blockchain and the InterPlanetary File System(IPFS)to store Personal Health Records,which are generated by patients visiting different medical *** addition,this paper also combines digital watermarking technology to ensure the authenticity of the restored electronic medical *** the combined effect of blockchain technology and digital watermarking,our proposal will not be affected by any other rights throughout the *** analysis and security analysis illustrate the completeness and feasibility of the scheme.
The paper proposes a cryptographic protocol two-factor authentication with the zero-knowledge over the extended field GF(2m) on elliptic curves using biometric data and private key of the user. The implementation of a...
详细信息
Opioid abuse and dependence have emerged as a pressing global concern, posing significant challenges to public health and society. Early identification and prediction of opioid dependency represent crucial steps in mi...
详细信息
作者:
Vijay, MargretJayan, J.P.
Department of Computer Science Tamil Nadu India
Department of Software Engineering Tamil Nadu India
This study explores the evolving landscape of adaptive gamification-related research from 2014 to 2022. A comprehensive analysis of 1110 documents from journals and books was conducted to investigate publication trend...
详细信息
Aiming at the problem that the iForest algorithm is not sensitive enough to local anomalies and produces a large number of false alarms in the detection results on some low sea state datasets, this paper proposes the ...
详细信息
Sentiment Analysis is a deep text analysis to determine the expressions from the written text, The Urdu language holds significant importance due to the usage of these social media platforms and content generated at t...
详细信息
Online testing is critical to ensuring reliable operations of the next generation of supercomputers based on a kilo-core network-on-chip(NoC)interconnection *** present a parallel software-based self-testing(SBST)solu...
详细信息
Online testing is critical to ensuring reliable operations of the next generation of supercomputers based on a kilo-core network-on-chip(NoC)interconnection *** present a parallel software-based self-testing(SBST)solution that makes use of the bounded model checking(BMC)technique to generate test sequences and parallel *** this method,the parallel SBST with BMC derives the leading sequence for each router’s internal function and detects all functionally-testable faults related to the function.A Monte-Carlo simulation algorithm is then used to search for the approximately optimum configuration of the parallel packets,which guarantees the test quality and minimizes the test ***,a multi-threading technology is used to ensure that the Monte-Carlo simulation can reach the approximately optimum configuration in a large random space and reduce the generating time of the parallel *** results show that the proposed method achieves a high fault coverage with a reduced test ***,by performing online testing in the functional mode with SBST,it effectively avoids the over-testing problem caused by functionally untestable turns in kilo-core NoCs.
In April, 2021 a ransomware attack occurred on Colonial Pipeline. The details of this attack point to the hacking group DarkSide taking advantage of the design flaws in the Colonial Pipeline network. After extensive r...
详细信息
暂无评论