|
|
|
Fang Ren, Xuan Shi, Enya Tang and Mengmeng Zeng
To protect the security of medical images and to improve the embedding ability of data in encrypted medical images, this paper proposes a permutation ordered binary (POB) number system-based hiding and authentication scheme for medical images, which incl...
ver más
|
|
|
|
|
|
Hui-Jun Kim, Jung-Soon Kim and Sung-Hee Kim
The existing question-and-answer screening test has a limitation in that test accuracy varies due to a high learning effect and based on the inspector?s competency, which can have consequences for rapid-onset cognitive-related diseases. To solve this pro...
ver más
|
|
|
|
|
|
Mu-Lin Huang, Xue-Mei He, Ming-Yue Du, Peng-Fei Jiang and Xue-Feng Wang
High-temperature and high-pressure (HTHP)-treated diamonds have attracted attention all over the world due to their vivid colors. In order to explore a new method for the rapid and non-destructive identification of HTHP-treated diamonds, in this paper, f...
ver más
|
|
|
|
|
|
Cheolhyeon Kwon and Donghyun Kang
Recently, the technologies of on-device AI have been accelerated with the development of new hardware and software platforms. Therefore, many researchers and engineers focus on how to enable ML technologies on mobile devices with limited hardware resourc...
ver más
|
|
|
|
|
|
Shweta More, Moad Idrissi, Haitham Mahmoud and A. Taufiq Asyhari
The rapid proliferation of new technologies such as Internet of Things (IoT), cloud computing, virtualization, and smart devices has led to a massive annual production of over 400 zettabytes of network traffic data. As a result, it is crucial for compani...
ver más
|
|
|