Open Access
01-12-2023 | Research
An approach to application-layer DoS detection
With the massive resources and strategies accessible to attackers, countering Denial of Service (DoS) attacks is getting increasingly difficult. One of these techniques is application-layer DoS. Due to these challenges, network security has become …
- Authors:
- Cliff Kemp, Chad Calvert, Taghi M. Khoshgoftaar, Joffrey L. Leevy
01-12-2023 | Original Article
Policy analysis and data mining tools for controlling COVID-19 policies
Much research has been done on the efficacy of vaccines against the COVID-19 pandemic, but the claims have not yet been realized in the real world. This paper proposes three COVID-19 policy outcome analysis tools such as jpscore for scoring and …
- Author:
- Yoshiyasu Takefuji
01-12-2023 | Original Article
Machine learning-based new approach to films review
The main purpose of Sentiment Analysis (SA) is to derive useful insights from large amounts of unstructured data compiled from various sources. This analysis helps to interpret and classify textual data using different techniques applied in …
- Authors:
- Mustafa Abdalrassual Jassim, Dhafar Hamed Abd, Mohamed Nazih Omri
Open Access
01-12-2023 | Regular article
Temporal network analysis using zigzag persistence
This work presents a framework for studying temporal networks using zigzag persistence, a tool from the field of Topological Data Analysis (TDA). The resulting approach is general and applicable to a wide variety of time-varying graphs. For …
- Authors:
- Audun Myers, David Muñoz, Firas A Khasawneh, Elizabeth Munch
Open Access
01-12-2023 | Research
Artifact-free fat-water separation in Dixon MRI using deep learning
Chemical-shift encoded MRI (CSE-MRI) is a widely used technique for the study of body composition and metabolic disorders, where derived fat and water signals enable the quantification of adipose tissue and muscle. The UK Biobank is acquiring …
- Authors:
- Nicolas Basty, Marjola Thanaj, Madeleine Cule, Elena P. Sorokin, Yi Liu, E. Louise Thomas, Jimmy D. Bell, Brandon Whitcher
01-12-2023 | Original Article
Machine learning-based telemedicine framework to prioritize remote patients with multi-chronic diseases for emergency healthcare services
The remarkable increase in the number of patients poses challenges to healthcare providers in telemedicine systems, and certain challenges are associated with the difficulties of identifying the most urgent emergencies to save lives. Remote …
- Authors:
- Sara Yahya Kadum, Omar Hussein Salman, Zahraa K. Taha, Amal Bati Said, Musab A. M. Ali, Qais Saif Qassim, Mohammed Imad Aal-Nouman, Duraid Y. Mohammed, Baraa M. Al baker, Zahraa A. Abdalkareem
Open Access
01-12-2023 | Research
A combined synchronization index for evaluating collective action social media
Social media has provided a citizen voice, giving rise to grassroots collective action, where users deploy a concerted effort to disseminate online narratives and even carry out offline protests. Sometimes these collective action are aided by …
- Authors:
- Lynnette Hui Xian Ng, Kathleen M. Carley
01-12-2023 | Original Article
A spectral method to detect community structure based on Coulomb’s matrix
Community detection based on spectral clustering has been proved effective. However, spectral clustering is more challenging due to two significant issues: the construction of a good similarity matrix and the automatic detection of the number of …
- Authors:
- Brahim Laassem, Ali Idarrou, Loubna Boujlaleb, M’bark Iggane
Open Access
01-12-2023 | Research
A methodology framework for bipartite network modeling
The graph-theoretic based studies employing bipartite network approach mostly focus on surveying the statistical properties of the structure and behavior of the network systems under the domain of complex network analysis. They aim to provide the …
- Authors:
- Chin Ying Liew, Jane Labadin, Woon Chee Kok, Monday Okpoto Eze
Open Access
01-12-2023 | Regular article
Sustainability of Stack Exchange Q&A communities: the role of trust
Knowledge-sharing communities are fundamental elements of a knowledge-based society. Understanding how different factors influence their sustainability is of crucial importance. We explore the role of the social network structure and social trust …
- Authors:
- Ana Vranić, Aleksandar Tomašević, Aleksandra Alorić, Marija Mitrović Dankulov
Open Access
01-12-2023 | Research
Podcasts’ effects on the EFL classroom: a socially relevant intervention
ICT tools have gained particular importance in the English as a foreign language classroom in order to promote students’ interaction, exchange of opinions, negotiation of meaning, or digital competence. Technological development and the impact of …
- Authors:
- Beatriz Chaves-Yuste, Cristina de-la Peña
Open Access
01-12-2023 | Research
Network intrusion detection using data dimensions reduction techniques
Due to the increasing growth of the Internet and its widespread application, the number of attacks on the network has also increased. Therefore, maintaining network security and using intrusion detection systems is of critical importance. The …
- Authors:
- Anita Shiravani, Mohammad Hadi Sadreddini, Hassan Nosrati Nahook
Open Access
01-12-2023 | Research
Enhancing correlated big data privacy using differential privacy and machine learning
Data are often correlated in real-world datasets. Existing data privacy algorithms did not consider data correlation an inherent property of datasets. This data correlation caused privacy leakages that most researchers left unnoticed. Such privacy …
- Authors:
- Sreemoyee Biswas, Anuja Fole, Nilay Khare, Pragati Agrawal
Open Access
01-12-2023 | Original Article
Investigation of the Laser Powder Bed Fusion Process of Ti-6.5Al-3.5Mo-1.5Zr-0.3Si Alloy
Laser powder bed fusion (LPBF) is an advanced manufacturing technology; however, inappropriate LPBF process parameters may cause printing defects in materials. In the present work, the LPBF process of Ti-6.5Al-3.5Mo-1.5Zr-0.3Si alloy was …
- Authors:
- Changchun Zhang, Tingting Liu, Wenhe Liao, Huiliang Wei, Ling Zhang
Open Access
01-12-2023 | Research
Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform
Service robot cloud platform is effective method to improve the intelligence of robots. An efficient cloud service scheduling algorithm is the basis of ensuring service quality and platform concurrency. In this paper, Hierarchy Genetic Algorithm …
- Authors:
- Lei Yin, Jin Liu, Fengyu Zhou, Ming Gao, Ming Li
Open Access
01-12-2023 | Research
RTiSR: a review-driven time interval-aware sequential recommendation method
The emerging topic of sequential recommender (SR) has attracted increasing attention in recent years, which focuses on understanding and learning the sequential dependencies of user behaviors hidden in the user-item interactions. Previous methods …
- Authors:
- Xiaoyu Shi, Quanliang Liu, Yanan Bai, Mingsheng Shang
Open Access
01-12-2023 | Regular article
Temporal patterns of reciprocity in communication networks
Human communication, the essence of collective social phenomena ranging from small-scale organizations to worldwide online platforms, features intense reciprocal interactions between members in order to achieve stability, cohesion, and cooperation …
- Authors:
- Sandeep Chowdhary, Elsa Andres, Adriana Manna, Luka Blagojević, Leonardo Di Gaetano, Gerardo Iñiguez
Open Access
01-12-2023 | Research
Securing medical image privacy in cloud using deep learning network
The worldwide usage of Internet of Things (IoT) applications enhanced the utilization of consumer devices, such as smartphones, computers, screening equipment used in hospitals that merely rely on imaging techniques. Numerous images got generated …
- Authors:
- Gayathri S, Gowri S
01-10-2023 | Research Article
Certificateless network coding proxy signatures from lattice
Network coding can improve the information transmission efficiency and reduces the network resource consumption, so it is a very good platform for information transmission. Certificateless proxy signatures are widely applied in information …
- Authors:
- Huifang Yu, Ning Wang
01-10-2023 | Research Article
SEOT: Secure dynamic searchable encryption with outsourced ownership transfer
When one enterprise acquires another, the electronic data of the acquired enterprise will be transferred to the acquiring enterprise. In particular, if the data system of acquired enterprise contains a searchable encryption mechanism, the …
- Authors:
- Jianwei Li, Xiaoming Wang, Qingqing Gan
01-10-2023 | Research Article
Three-dimensional quantum wavelet transforms
Wavelet transform is being widely used in the field of information processing. One-dimension and two-dimension quantum wavelet transforms have been investigated as important tool algorithms. However, three-dimensional quantum wavelet transforms …
- Authors:
- Haisheng Li, Guiqiong Li, Haiying Xia
01-08-2023 | Research Article
Differential privacy histogram publishing method based on dynamic sliding window
Differential privacy has recently become a widely recognized strict privacy protection model of data release. Differential privacy histogram publishing can directly show the statistical data distribution under the premise of ensuring user privacy …
- Authors:
- Qian Chen, Zhiwei Ni, Xuhui Zhu, Pingfan Xia
01-06-2023
Online Markov decision processes with non-oblivious strategic adversary
We study a novel setting in Online Markov Decision Processes (OMDPs) where the loss function is chosen by a non-oblivious strategic adversary who follows a no-external regret algorithm. In this setting, we first demonstrate that MDP-Expert, an …
- Authors:
- Le Cong Dinh, David Henry Mguni, Long Tran-Thanh, Jun Wang, Yaodong Yang
01-06-2023 | Research Article
Forecasting technical debt evolution in software systems: an empirical study
Technical debt is considered detrimental to the long-term success of software development, but despite the numerous studies in the literature, there are still many aspects that need to be investigated for a better understanding of it. In …
- Authors:
- Lerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Debora Montano
01-06-2023
Unavoidable deadends in deterministic partially observable contingent planning
Traditionally, a contingent plan, branching on the observations an agent obtains throughout plan execution, must reach a goal state from every possible initial state. However, in many real world problems, no such plan exists. Yet, there are plans …
- Authors:
- Lera Shtutland, Dorin Shmaryahu, Ronen I. Brafman, Guy Shani
01-06-2023 | Original Paper
(Some) algorithmic bias as institutional bias
In this paper I argue that some examples of what we label ‘algorithmic bias’ would be better understood as cases of institutional bias. Even when individual algorithms appear unobjectionable, they may produce biased outcomes given the way that …
- Author:
- Camila Hernandez Flowerman
Open Access
01-05-2023
Madusa: mobile application demo generation based on usage scenarios
Mobile applications have grown rapidly in size. This dramatic increases in size and complexity make mobile applications less accessible to a broader scope of users. The prevailing approach for better accessibility of mobile applications is to …
- Authors:
- Jaehyung Lee, Hangyeol Cho, Woosuk Lee
01-05-2023
Terahertz Plasmonic Sensor based on bulk Dirac Semimetals
A terahertz plasmonic sensor based on parallel bulk Dirac semimetals (BDSs) is proposed and numerically investigated in this paper. The physical origin of the sensor is induced by the electromagnetically induced reflectance (EIR)-like effect …
- Authors:
- Huawei Zhuang, Wei Ding, Honghao Tan, Changbin Tian, Fanmin Kong
Open Access
01-04-2023
Polarization independent silicon on calcium fluoride-based MIR optical modulator
Efficient mid-infrared (MIR) optical modulator is reported and numerically analyzed for both the transverse electric (TE) and transverse magnetic (TM) polarized modes. The proposed design is based on the silicon-on-calcium-fluoride platform with …
- Authors:
- Ahmed El-Sayed Abd-Elkader, B. M. Younis, Mohamed Farhat O. Hameed, Salah S. A. Obayya
01-04-2023 | Cover Story
PEM Fuel Cell Application - From Component to System
Hydrogen will play an essential role for the sustainable mobility of the future. Fuel cells complement pure battery-electric mobility in cases where heavy vehicles need to travel long distances. The attractiveness of this sustainable form of …
- Authors:
- Mathias Reum, Benjamin Daniel
Open Access
01-04-2023 | Original Article
A systemic framework of energy efficiency in schools: experiences from six European countries
Schools are complex physical and social institutions within national education systems. They account for significant energy consumption and like other buildings can demonstrate inefficient patterns of energy use. Poor energy performance of …
- Authors:
- Dmitry Brychkov, Gary Goggins, Edelle Doherty, Natalia Romero, Nadine Roudil, Antonella Di Trani, Abhigyan Singh, Sander Smit, Eilish McLoughlin, Raquel de Castro Rodrigues Lima, Suzan Marie Günbay, Branca Arthur Delmonte, Achim Hill, Christine Domegan, Eoghan Clifford
Open Access
01-04-2023 | Research Article
Vortex ring state of a shrouded rotor: an experimental survey
Shrouded rotors have been extensively used in the rotorcraft industry, for example, in compound helicopters for auxiliary propulsion, hovercraft, helicopter tail rotors (Mouille 1970 ; Vuillet and Morelli 1986 ), fan in wing aircraft and vertical …
- Authors:
- David J. Pickles, Daniele Zagaglia, Angela Busse, Richard B. Green
21-03-2023 | Special Section Paper
Synthesizing verified components for cyber assured systems engineering
Safety-critical systems such as avionics need to be engineered to be cyber resilient meaning that systems are able to detect and recover from attacks or safely shutdown. As there are few development tools for cyber resiliency, designers rely on …
- Authors:
- Eric Mercer, Konrad Slind, Isaac Amundson, Darren Cofer, Junaid Babar, David Hardin
Open Access
21-03-2023 | Regular Paper
BPF: a novel cluster boundary points detection method for static and streaming data
Data points situated near a cluster boundary are called boundary points and they can represent useful information about the process generating this data. The existing methods of boundary points detection cannot differentiate boundary points from …
- Authors:
- Vijdan Khalique, Hiroyuki Kitagawa, Toshiyuki Amagasa
Open Access
20-03-2023 | Originalarbeiten/Originals
Effect of generator torque ripple optimization on a geared wind turbine drivetrain
In this paper, the load effect of torque ripple reduction of a wind turbine generator is analyzed on the high-speed shaft gear stage and high-speed shaft bearings, which are the nearest components to the generator. Two generator designs with …
- Authors:
- Diederik van Binsbergen, Mostafa Valavi, Amir R. Nejad, Jan Helsen
20-03-2023
Ship detection with deep learning: a survey
Ship detection plays a pivotal role in efficient marine monitoring, port management, and safe navigation. However, the development of ship detection techniques is vastly behind other detection techniques, such as face detection, pedestrian …
- Authors:
- Meng Joo Er, Yani Zhang, Jie Chen, Wenxiao Gao
Open Access
20-03-2023 | Original Research
Auctions of failed banks: an analysis of losing bidders
Between 2007 and 2013, the Federal Deposit Insurance Corporation (FDIC) used purchase and assumption (P&A) as a resolution method to auction 492 failed institutions to healthy banks. While existing studies reveal positive value effects on winning …
- Author:
- Tim M. Zhou
18-03-2023 | Research Paper
Beyond Reconstruction: What Leads to Satisfaction in Post-Disaster Recovery?
Many studies have shown that economic and political freedom better predict overall satisfaction than income or material consumption. However, in the context of post-disaster reconstruction, whether freedom of choice in reconstruction is a better …
- Authors:
- Ratna K. Shrestha, Raunak Shrestha, Sara Shneiderman, Jeevan Baniya
18-03-2023 | ORIGINAL ARTICLE
Cloud-based 3D printing service allocation models for mass customization
Due to easy access, faster production, and on-demand printing, the applications of 3D printing are proliferating and reaching the mass customization level where individuals can print their self-design products. Many service providers emerge and …
- Authors:
- Kai Kang, Bing Qing Tan, Ray Y. Zhong
18-03-2023
Similarity-Based Hybrid Algorithms for Link Prediction Problem in Social Networks
In this study, we propose two hybrid algorithms for link prediction problem in static networks that combine the benefits of both local and global scoring methods, with the objective of compensating the weaknesses of each approach using two …
- Authors:
- Hassen Mohamed Kerkache, Lamia Sadeg-Belkacem, Fatima Benbouzid-Si Tayeb
Open Access
18-03-2023 | Regular Contribution
Cyber range design framework for cyber security education and training
The need for effective training of cyber security personnel working in critical infrastructures and in the corporate has brought attention to the evolution of Cyber Ranges (CRs) as learning and training tools. Although CRs have been organized for …
- Authors:
- M. N. Katsantonis, A. Manikas, I. Mavridis, D. Gritzalis
17-03-2023 | Regular contribution
TENET: a new hybrid network architecture for adversarial defense
Deep neural network (DNN) models are widely renowned for their resistance to random perturbations. However, researchers have found out that these models are indeed extremely vulnerable to deliberately crafted and seemingly imperceptible …
- Authors:
- Omer Faruk Tuna, Ferhat Ozgur Catak, M. Taner Eskil
17-03-2023 | Original Paper
Dwelling in borderlands: a conversation between two science teachers-researchers
Inspired by Freire’s principle of dialogue, in this article we present a series of dialogues and critical syntheses between a science teacher-researcher with 35 years of experience and an early-career science teacher-researcher. We explore being …
- Authors:
- Cristiano B. Moura, Andreia Guerra
16-03-2023
Reliability Based Workflow Scheduling on Cloud Computing with Deadline Constraint
Distributed computing workflow is an effective paradigm to express a range of applications with cloud computing platforms for scientific research explorations. One of the most difficult application areas of cloud computing technology is task …
- Authors:
- Savita Khurana, Gaurav Sharma, Manni Kumar, Nitin Goyal, Bhanu Sharma
16-03-2023 | Regular Paper
Towards intelligent database systems using clusters of SQL transactions
Transactions are the bread-and-butter of database management system (DBMS) industry. When you check your bank balance, pay bill, or move money from saving to chequing account, transactions are involved. That transactions are self-similar—whether …
- Author:
- Arunprasad P. Marathe
16-03-2023 | Research Article-Computer Engineering and Computer Science
Tetrolet Transform and Dual Dictionary Learning-Based Single Image Fog Removal
The removal of fog or haze from video frames and images has been a major focus in the area of computer vision since fog has a detrimental effect on monitoring and surveillance systems, as well as on the recognition of scene objects and other …
- Authors:
- Manas Sarkar, Priyanka Sarkar Rakshit, Ujjwal Mondal, Debashis Nandi
15-03-2023 | Original Paper
Using RGBD cameras for classifying learning and teacher interaction through postural attitude
Globally the improvement and evaluation of the academic performance of students has been a priority, however the way in which the quality of learning process is evaluated within the classroom is based on traditional methods such as grades or …
- Authors:
- Mauricio Hincapié, Christian Andrés Díaz, Alejandro Valencia-Arias, David Güemes-Castorena, Manuel Contero
15-03-2023 | Metals & corrosion
Microstructure evolution, deformation behavior and processing performance of TNM TiAl alloy
The hot compression test, with a true strain of 0.9, was carried out at a temperature of 1100–1250 °C and a strain rate of 0.001–1 s−1 by a Gleeble3800 thermal simulation testing machine for the as-cast TNM alloy. The stress–strain curves were …
- Authors:
- Gang Yang, Xiangjun Xu, Guojian Hao, Yuewen Zhai, Huizhen Wang, Yongfeng Liang, Junpin Lin
Open Access
15-03-2023 | Regular Contribution
From zero-shot machine learning to zero-day attack detection
Machine learning (ML) models have proved efficient in classifying data samples into their respective categories. The standard ML evaluation methodology assumes that test data samples are derived from pre-observed classes used in the training …
- Authors:
- Mohanad Sarhan, Siamak Layeghy, Marcus Gallagher, Marius Portmann
Open Access
15-03-2023 | Editorial
Reflecting on Freire: a praxis of radical love and critical hope for science education
In this introductory manuscript, we present our vision for this special issue as a space for cultivating collective becomings in/with love, critical hope, and solidarity. We also contemplate our intentions and goals for putting together a special …
- Authors:
- Betzabé Torres Olave, Sara Tolbert, Alejandra Frausto Aceves
Open Access
14-03-2023
Kahoot! and its effect on financial accounting marks at the university
New technologies have led to digital educational tools to improve learning. Game-Based Learning makes it possible to test whether there is a positive impact on official grades. We have collected the scores of the Kahoot! games, the marks of the …
- Authors:
- Esther Ortiz-Martínez, Jose Manuel Santos-Jaén, Salvador Marín-Hernández
Open Access
14-03-2023
Enhancing adolescent reasoning skills through a video game program
Much research has been done on the benefits of video games in a physical education context (Camunas-Vega & Alcaide-Risoto, 2020; Fang et al., 2020). However, little attention has so far been paid to the effectiveness of commercial video games …
- Authors:
- Carlos Merino-Campos, Héctor del-Castillo, Isabel Pascual-Gómez
14-03-2023
Value Implications of REITing and De-REITing*
We explore the determinants and value implications of publicly traded real estate companies converting to real estate investment trusts (REITs), which we term REITing, and publicly-traded REITs giving up their REIT status, termed de-REITing.
- Authors:
- David Ling, Sugata Ray, Alan Tidwell, Luqi Xu
14-03-2023
A Novel Human Activity Recognition Model for Smartphone Authentication
The use of cell phones has dramatically expanded and developed into a daily habit in the current day. Additionally, consumers have started using a variety of smartphone applications, including social media apps, invoicing apps, and sensitive apps …
- Authors:
- P. R. Vinod, A. Anitha
14-03-2023 | RESEARCH
An intelligent optimized cyclone intensity prediction framework using satellite images
Weather prediction is the hottest topic in remote sensing to understand natural disasters and their intensity in an early stage. But in many cases, the typical imaging models have resulted in less forecasting rate. Hence, to overcome this problem …
- Authors:
- C. Kishor Kumar Reddy, P. R. Anisha, Marlia Mohd Hanafiah, Y. V. S. S. Pragathi, B. V. Ramana Murthy, R. Madana Mohana
13-03-2023 | Research Article
Rapid CO2-laser scribing fabrication of an electrochemical sensor for the direct detection of Pb2+ and Cd2+
Laser-induced graphene (LIG) is a highly promising preparation material for electrochemical sensors; however, its preparation speed and nanomaterial modification steps significantly limit its mass production. Herein, this study proposed a new …
- Authors:
- Guanglei Chu, Yanyan Zhang, Zhongrui Zhou, Weixuan Zeng, Dongfei Chen, Siping Yu, Jiemin Wang, Yemin Guo, Xia Sun, Ming Li
13-03-2023
Spider wasp optimizer: a novel meta-heuristic optimization algorithm
This work presents a new nature-inspired meta-heuristic algorithm named spider wasp optimization (SWO) algorithm, which is based on replicating the hunting, nesting, and mating behaviors of the female spider wasps in nature. This proposed …
- Authors:
- Mohamed Abdel-Basset, Reda Mohamed, Mohammed Jameel, Mohamed Abouhawwash
13-03-2023
An Adaptive Optimized Schizophrenia Electroencephalogram Disease Prediction Framework
Electroencephalogram (EEG) signal analysis has become an interesting and required area in the medical industry to analyze brain function for different diseases. But, the EEG signal’s noise features might degrade the signal prediction's exactness …
- Authors:
- Varun Gupta, Abhas Kanungo, Nitin Kumar Saxena, Pankaj Kumar, Parvin Kumar
13-03-2023 | Original Research Article
Fabrication and Description of Amorphous Ge33Se47Sn20 Films for Optical Applications
We report the fabrication of a semiconductor thin layer of ternary chalcogenide, Ge33Se47Sn20, utilizing a thermal evaporation technique for optical applications. The chemical composition and crystal structure studies on Ge33Se47Sn20 thin films …
- Authors:
- A. M. Hassanien, A. A. A. Darwish, Saleem I. Qashou, A. A. Atta, Tariq A. Altalhi
13-03-2023
A domain name management system based on account-based consortium blockchain
Due to the functionality for mapping domain names to IP addresses, the Domain Name System (DNS) is a critical component of the running of the Internet. However, the current DNS receives many criticisms. For instance, its centralized architecture …
- Authors:
- Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao, Guiyi Wei
12-03-2023 | Original Article
Indoor thermal management of a public transport with phase change material (PCM)
In many developing countries in the tropical region, 3-wheeler vehicles are one of the most common means of transportation for low- and middle-income people. As the 3-wheeler vehicle is small in size, open on both sides, and the engine is placed …
- Authors:
- Hasibuzzaman Mahmud, Mufrad Islam, Muhammad Ershad Jaman Khan, Dewan Hasan Ahmed
11-03-2023
Going digital: implications for firm value and performance
We examine firm value and performance implications of the growing trend of nontechnology companies engaging in activities relating to digital technologies. We measure digital activities in firms based on the disclosure of digital words in the …
- Authors:
- Wilbur Chen, Suraj Srinivasan
Open Access
11-03-2023 | Original Paper
Analysis of the Scale of Global Human Needs and Opportunities for Sustainable Catalytic Technologies
We analyzed the enormous scale of global human needs, their carbon footprint, and how they are connected to energy availability. We established that most challenges related to resource security and sustainability can be solved by providing …
- Authors:
- Teona Taseska, Wanqing Yu, Madeleine K. Wilsey, Connor P. Cox, Ziyi Meng, Soraya S. Ngarnim, Astrid M. Müller
Open Access
10-03-2023 | Topical Collection: Processing and Applications of Superalloys
Effect of Alloying on the Microstructure, Phase Stability, Hardness, and Partitioning Behavior of a New Dual-Superlattice Nickel-Based Superalloy
A novel γ–γ′–γ″ dual-superlattice superalloy, with promising mechanical properties up to elevated temperatures was recently reported by Mignanelli et al. (in: Proceedings of the 9th International Symposium on Superalloy 718 & Derivatives: Energy …
- Authors:
- C. Rodenkirchen, A. K. Ackerman, P. M. Mignanelli, A. Cliff, G. J. Wise, P. Breul, J. O. Douglas, P. A. J. Bagot, M. P. Moody, M. Appleton, M. P. Ryan, M. C. Hardy, S. Pedrazzini, H. J. Stone
10-03-2023
Secure Multi-Party Computation for Personalized Human Activity Recognition
Calibrating Human Activity Recognition (HAR) models to end-users with Transfer Learning (TL) often yields significant accuracy improvements. Such TL is by design done based on very personal data collected by sensors worn close to the human body.
- Authors:
- David Melanson, Ricardo Maia, Hee-Seok Kim, Anderson Nascimento, Martine De Cock
10-03-2023 | Original Article
Multi-scale discriminant representation for generic palmprint recognition
Palmprint shows great potential in biometric-based security due to its advantages of great stability, easy collection, and high accuracy. However, with insufficient training samples, how to extract discriminative features applicable in various …
- Authors:
- Lingli Yu, Qian Yi, Kaijun Zhou
09-03-2023 | Special Issue
Cloud-based solution approach for a large size logistics network planning
During the last two decades, due to environmental laws and the competitive environment, the formulation of effective closed-loop supply chain networks has attracted researchers’ attention. On the other hand, although there are many metaheuristics …
- Authors:
- Ehsan Yadegari, Elham Jelodari Mamaghani, Maryam Afghah, Mohsen Abdoli, Amir Daneshvar
09-03-2023
Using property rights to fight crime: the Khaya Lam project
Despite it being legal in South Africa to acquire a title deed to a government-issued home, roughly 20 million South Africans do not hold title to their property. Millions of homes are eligible to have ownership transferred from the government to …
- Author:
- Kerianne Lawson
09-03-2023
Double Graph Attention Networks for Visual Semantic Navigation
Artificial Intelligence (AI) based on knowledge graphs has been invested in realizing human intelligence like thinking, learning, and logical reasoning. It is a great promise to make AI-based systems not only intelligent but also knowledgeable. In …
- Authors:
- Yunlian Lyu, Mohammad Sadegh Talebi
09-03-2023 | S.I.: Applications and Techniques in Cyber Intelligence (ATCI2022)
The evaluation of an active soft waist exoskeleton for repetitive lifting task
This study is to determine how a lightweight active soft waist exoskeleton (ASWE) reduces the oxygen consumption and activity of lower back muscles of the wearer performing the repetitive lifting tasks. The heavy and frequent manual lifting …
- Authors:
- Liang Yang, Chenxi Qu, Peng Yin, Jiliang Lv, Shengguan Qu
09-03-2023 | Regular Paper
Sliding window-based approximate triangle counting with bounded memory usage
Streaming graph analysis is gaining importance in various fields due to the natural dynamicity in many real graph applications. However, approximately counting triangles in real-world streaming graphs with duplicate edges and sliding window model …
- Authors:
- Xiangyang Gou, Lei Zou
08-03-2023 | Data analytics and machine learning
Class-biased sarcasm detection using BiLSTM variational autoencoder-based synthetic oversampling
Recent research works have established the importance of sarcasm detection in the domain of sentiment analysis. Automatic sarcasm detection using social media data is a challenging task in the presence of imbalanced classes. Real-life social media …
- Authors:
- Sankhadeep Chatterjee, Saranya Bhattacharjee, Kushankur Ghosh, Asit Kumar Das, Soumen Banerjee
08-03-2023 | Topical Collection: 19th Conference on Defects (DRIP XIX)
Trench-Filling Epitaxy of Germanium on (001) Silicon Enhanced Using [100]-Oriented Patterns
This paper reports trench-filling epitaxy of Ge on (001) Si using [100]-oriented patterns, which is effective to fill the micron-deep trench in a short growth time. As a starting substrate, a trench with a width of about 0.6 µm and a depth of …
- Authors:
- Kota Kato, Kazuki Motomura, Jose A. Piedra-Lorenzana, Mohd Faiz Bin Amin, Takeshi Hizawa, Tetsuya Nakai, Yasuhiko Ishikawa