15,600+ open-access research outputs.
nan…
With the rapid increase of software scale and complexity, the cost of traditional software testing methods will increase faster than the scale of software. In order to improve test efficiency, it is p…
Lattice-based cryptography continues to dominate in the second-round finalists of the National Institute of Standards and Technology post-quantum cryptography standardization process. Computational ef…
Network Intrusion Detection Systems (NIDSs) using pattern matching have a fatal weakness in that they cannot detect new attacks because they only learn existing patterns and use them to detect those a…
Change propagation is a process in which a change to one part or element of a developed mechanical product tends to induce additional changes to other elements of the product, and the changes can prop…
Using threads and a projector, a directional volumetric display capable of moving images and full-color representation was developed in our previous work. However, the horizontal resolution of the dir…
Nowadays, the Internet of Things (IoT) has an astonishingly societal impact in which healthcare services stand out. Amplified by the COVID-19 pandemic scenario, challenges include the development of a…
Traditional denoising methods for seismic exploration data design a corresponding mathematical denoising model batch according to the different properties of different random noises, which is a tediou…
Achieving reliable communication over different wavelength channels and modes is one of the main goals of Mode Division Multiplexing-Wavelength Division Multiplexing (MDM-WDM) transmission. The reliab…
The World Wide Web is experiencing a daily increase in data transmission because of developments in multimedia technologies. Consequently, each user should prioritize preventing illegal access of this…
In recent years, the Internet of Things (IoT) has evolved at an exceptional speed, which enables to interconnect a very large number of heterogeneous, distributed, and mobile devices. This number will…
RGB-D salient object detection (SOD) usually describes two modes’ classification or regression problem, namely RGB and depth. The existing RGB-D SOD methods use depth hints to increase the detection p…
Multivariate statistical process control (MSPC) is a technique for detecting anomalies by monitoring several quality characteristics simultaneously. For the MSPC problem, the Hotelling’s T2 contro…
Radio Access Network (RAN) disaggregation allows operators to mix-and-match multivendor components and bring RAN services from one end to the other. Despite this goal, issues of resource misuse or per…
nan…
We develop and evaluate an automated data-driven framework for providing reviewer recommendations for submitted manuscripts. Given inputs comprising a set of manuscripts for review and a listing of a …
Nature computing has evolved with exciting performance to solve complex real-world combinatorial optimization problems. These problems span across engineering, medical sciences, and sciences generally…
DevOps is a set of practices and a cultural movement that aims to break down barriers between development and operation teams to improve collaboration and communication. Different organizations have e…
The digitization of audiovisual data is significantly increasing. Thus, to guarantee the protection of the intellectual properties of this digital content, watermarking has appeared as a solution. Wat…
Traditionally, network and security operation center teams have worked in silos despite commonalities. The network operating center (NOC) team is to provide operationality and availability of informat…
Free open-access publishing with Google Scholar indexing.
Submission Guide →