Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Effect of patient position on the EEG bispectral index and entropy index under general anaesthesia
Technology and Health Care (TAHC), Volume 33, Issue 1Pages 311–319https://doi.org/10.3233/THC-241026BACKGROUND:Perioperative depth monitoring techniques, such as electroencephalography bispectral index (BIS), entropy index, and auditory evoked potential, are commonly used to assess anesthesia depth. However, the influence of patient positioning ...
- research-articleDecember 2024
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation
ACM Transactions on Privacy and Security (TOPS), Volume 28, Issue 1Article No.: 12, Pages 1–36https://doi.org/10.1145/3705004Secure multi-party computation has seen substantial performance improvements in recent years and is being increasingly used in commercial products. While a significant amount of work was dedicated to improving its efficiency under standard security models,...
- ArticleDecember 2024
Explore Statistical Properties of Undirected Unweighted Networks from Ensemble Models
AbstractComplex network theory has been widely demonstrated as a powerful tool in modeling and characterizing various complex systems. In the past, complex network theory has focused on the behaviors as well as the characteristics of the network nodes and ...
- research-articleNovember 2024
- ArticleOctober 2024
Diversity Population Metrics in Diploid and Haploid Genetic Algorithm Variants
AbstractGenetic Algorithms (GAs) are powerful optimization techniques inspired by the principles of natural selection and genetics. One critical aspect of their success lies in the diversity of solutions within their populations. Diversity ensures ...
-
- research-articleOctober 2024
New Approach for Online Voting Ensuring Privacy and Verifiability
Programming and Computing Software (KLU-PACS), Volume 50, Issue Suppl 1Pages S60–S68https://doi.org/10.1134/S0361768824700427AbstractDistrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of ...
- research-articleAugust 2024
- research-articleAugust 2024
A Research on Genetic Algorithm-Based Task Scheduling in Cloud-Fog Computing Systems
Automatic Control and Computer Sciences (ACCS), Volume 58, Issue 4Pages 392–407https://doi.org/10.3103/S0146411624700512AbstractIn recent years, the proliferating of IoT (Internet of things)-originated applications have generated huge amounts of data, which has put enormous pressure on infrastructures such as the network cloud. In this regard, scholars have proposed an ...
- research-articleJuly 2024
Use of Threshold and No-Threshold Methods of Discrete Wavelet Filtering of Radar Signals
Cybernetics and Systems Analysis (KLU-CASA), Volume 60, Issue 4Pages 656–666https://doi.org/10.1007/s10559-024-00704-4AbstractThe efficiency of threshold and no-threshold wavelet noise filtering methods in processing radar signals is analyzed. Three methods of wavelet analysis are considered: a method with a general limit threshold for wavelet coefficients of detail; a ...
- short-paperJune 2024
Engineered Features for Personal Textual Language Style Clusters
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive EnvironmentsPages 273–276https://doi.org/10.1145/3652037.3663954Hand-crafted features to detect idiolect (individual language style) in short text passages with k-means clustering differentiate individuals based on stylistic indicators. With a relatively small number of input samples and low computational resources, ...
- short-paperJune 2024
Co-Stega: Collaborative Linguistic Steganography for the Low Capacity Challenge in Social Media
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 7–12https://doi.org/10.1145/3658664.3659657Social media platforms, with their extensive and real-time text data, are important application environments for linguistic generative steganography. However, the fragmented and context-constrained nature of social media text leads to a notably low ...
- research-articleJune 2024
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 187–198https://doi.org/10.1145/3626232.3653280Secure multi-party computation has seen substantial performance improvements in recent years and is being increasingly used in commercial products. While a significant amount of work was dedicated to improving its efficiency under standard security ...
- research-articleJune 2024
Information Theories of Event Probability Estimation
Scientific and Technical Information Processing (SPSTIP), Volume 51, Issue 2Pages 101–105https://doi.org/10.3103/S0147688224700011AbstractThis article analyzes the theoretical and methodological provisions of seminal works concerning the efficiency of research, development and development management, and production for hi-tech products in the context of uncertainty in order to make ...
- research-articleMay 2024
Learning-based Property Estimation with Polynomials
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 3Article No.: 148, Pages 1–27https://doi.org/10.1145/3654994The problem of estimating data properties using sampling frequency histograms has attracted extensive interest in the area of databases. The properties include the number of distinct values (NDV), entropy, and so on. In the field of databases, property ...
- short-paperMay 2024
Predicting Node Influence in Complex Networks by the K-Shell Entropy and Degree Centrality
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 629–632https://doi.org/10.1145/3589335.3651547Currently, with the expansion of the use of social networks, the topic of information dissemination has achieved significant importance. The spread of rumors and efforts to stop them have led researchers to pay more attention than ever to predicting the ...
- research-articleMay 2024
Assessing Web Fingerprinting Risk
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 245–254https://doi.org/10.1145/3589335.3648322Modern Web APIs allow developers to provide extensively customized experiences for website visitors, but the richness of the device information they provide also make them vulnerable to being abused to construct browser fingerprints, device-specific ...
- research-articleJanuary 2025
Incorporating volatility into symbolic encoding with thresholds: New entropy-based approach to market efficiency assessment
Procedia Computer Science (PROCS), Volume 246, Issue CPages 48–57https://doi.org/10.1016/j.procs.2024.09.227AbstractThe aim of this research is to introduce and investigate a novel entropy-based approach to market efficiency assessment that utilizes symbolic encoding procedure including volatility estimates. The proposed new method is compared with the existing ...
- research-articleFebruary 2024
Optimizing the Algorithm of Wavelet Packet Signal Filtering
Cybernetics and Systems Analysis (KLU-CASA), Volume 60, Issue 1Pages 135–145https://doi.org/10.1007/s10559-024-00654-xAbstractA wavelet packet filtering algorithm has been developed, which includes cyclic movement along the branches of the wavelet packet tree with a constraint on each branch of the approximation and detail coefficients until the minimum root-mean-square ...
- research-articleJanuary 2024
Assessment of polluted region using an integrated weighting approach and fuzzy VIKOR method
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 46, Issue 1Pages 2649–2663https://doi.org/10.3233/JIFS-233593Air pollution exerts a profound impact on both public health and the natural environment. In India, festivals like Diwali also contaminate the air by releasing pollutants into the atmosphere. It is essential to identify the most polluted region by ...
- research-articleJanuary 2024
Cross-efficiency aggregation based on interval conditional entropy: An application to forest carbon sink efficiency
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 46, Issue 2Pages 4397–4415https://doi.org/10.3233/JIFS-223071Cross-efficiency evaluation is an extension of data envelopment analysis (DEA), which can effectively distinguish between decision-making units (DMUs) through self- and peer-evaluation. The cross-efficiency of each DMU in a set of DMUs is measured in ...