Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23,336)
  • Open Access

    ARTICLE

    Random Forests Algorithm Based Duplicate Detection in On-Site Programming Big Data Environment

    Qianqian Li1, Meng Li2, Lei Guo3,*, Zhen Zhang4

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 199-205, 2020, DOI:10.32604/jihpp.2020.016299

    Abstract On-site programming big data refers to the massive data generated in the process of software development with the characteristics of real-time, complexity and high-difficulty for processing. Therefore, data cleaning is essential for on-site programming big data. Duplicate data detection is an important step in data cleaning, which can save storage resources and enhance data consistency. Due to the insufficiency in traditional Sorted Neighborhood Method (SNM) and the difficulty of high-dimensional data detection, an optimized algorithm based on random forests with the dynamic and adaptive window size is proposed. The efficiency of the algorithm can be More >

  • Open Access

    ARTICLE

    A Location Prediction Method Based on GA-LSTM Networks and Associated Movement Behavior Information

    Xingxing Cao1, Liming Jiang1,*, Xiaoliang Wang1, Frank Jiang2

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 187-197, 2020, DOI:10.32604/jihpp.2020.016243

    Abstract Due to the lack of consideration of movement behavior information other than time and location perception in current location prediction methods, the movement characteristics of trajectory data cannot be well expressed, which in turn affects the accuracy of the prediction results. First, a new trajectory data expression method by associating the movement behavior information is given. The pre-association method is used to model the movement behavior information according to the individual movement behavior features and the group movement behavior features extracted from the trajectory sequence and the region. The movement behavior features based on pre-association More >

  • Open Access

    REVIEW

    A Survey on Recent Advances in Privacy Preserving Deep Learning

    Siran Yin1,2, Leiming Yan1,2,*, Yuanmin Shi1,2, Yaoyang Hou1,2, Yunhong Zhang1,2

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 175-185, 2020, DOI:10.32604/jihpp.2020.010780

    Abstract Deep learning based on neural networks has made new progress in a wide variety of domain, however, it is lack of protection for sensitive information. The large amount of data used for training is easy to cause leakage of private information, thus the attacker can easily restore input through the representation of latent natural language. The privacy preserving deep learning aims to solve the above problems. In this paper, first, we introduce how to reduce training samples in order to reduce the amount of sensitive information, and then describe how to unbiasedly represent the data More >

  • Open Access

    REVIEW

    A Survey on Machine Learning in Chemical Spectral Analysis

    Dongfang Yu, Jinwei Wang*

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 165-174, 2020, DOI:10.32604/jihpp.2020.010466

    Abstract Chemical spectral analysis is contemporarily undergoing a revolution and drawing much attention of scientists owing to machine learning algorithms, in particular convolutional networks. Hence, this paper outlines the major machine learning and especially deep learning methods contributed to interpret chemical images, and overviews the current application, development and breakthrough in different spectral characterization. Brief categorization of reviewed literatures is provided for studies per application apparatus: X-Ray spectra, UV-Vis-IR spectra, Micro-scope, Raman spectra, Photoluminescence spectrum. End with the overview of existing circumstances in this research area, we provide unique insight and promising directions for the chemical More >

  • Open Access

    ARTICLE

    Image Denoising with GAN Based Model

    Peizhu Gong, Jin Liu*, Shiqi Lv

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 155-163, 2020, DOI:10.32604/jihpp.2020.010453

    Abstract Image denoising is often used as a preprocessing step in computer vision tasks, which can help improve the accuracy of image processing models. Due to the imperfection of imaging systems, transmission media and recording equipment, digital images are often contaminated with various noises during their formation, which troubles the visual effects and even hinders people’s normal recognition. The pollution of noise directly affects the processing of image edge detection, feature extraction, pattern recognition, etc., making it difficult for people to break through the bottleneck by modifying the model. Many traditional filtering methods have shown poor… More >

  • Open Access

    ARTICLE

    Image Steganography in Spatial Domain: Current Status, Techniques, and Trends

    Adeeb M. Alhomoud*

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 69-88, 2021, DOI:10.32604/iasc.2021.014773

    Abstract This research article provides an up-to-date review of spatial-domain steganography. Maintaining the communication as secure as possible when transmitting secret data through any available communication channels is the target of steganography. Currently, image steganography is the most developed field, with several techniques are provided for different image formats. Therefore, the general image steganography including the fundamental concepts, the terminology, and the applications are highlighted in this paper. Further, the paper depicts the essential characteristics between information hiding and cryptography systems. In addition, recent well-known techniques in the spatial-domain steganography, such as LSB and pixel value More >

  • Open Access

    ARTICLE

    Hybrid Multimodal Biometric Template Protection

    Naima Bousnina1, Sanaa Ghouzali2,*, Mounia Mikram1,3, Maryam Lafkih1, Ohoud Nafea4, Muna Al-Razgan2, Wadood Abdul4

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 35-51, 2021, DOI:10.32604/iasc.2021.014694

    Abstract Biometric template disclosure starts gaining an important concern in deploying practical biometric authentication systems, where an assailant compromises the database for illegitimate access. To protect biometric templates from disclosure attacks, biometric authentication systems should meet these four requirements: security, diversity, revocability, and performance. Different methods have been suggested in the literature such as feature transformation techniques and biometric cryptosystems. However, no single method could satisfy the four requirements, giving rise to the deployment of hybrid mechanisms. In this context, the current paper proposes a hybrid system for multimodal biometric template protection to provide robustness against… More >

  • Open Access

    ARTICLE

    Building Graduate Salary Grading Prediction Model Based on Deep Learning

    Jong-Yih Kuo*, Hui-Chi Lin, Chien-Hung Liu

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 53-68, 2021, DOI:10.32604/iasc.2021.014437

    Abstract Predicting salary trends of students after employment is vital for helping students to develop their career plans. Particularly, salary is not only considered employment information for students to pursue jobs, but also serves as an important indicator for measuring employability and competitiveness of graduates. This paper considers salary prediction as an ordinal regression problem and uses deep learning techniques to build a salary prediction model for determining the relative ordering between different salary grades. Specifically, to solve this problem, the model uses students’ personal information, grades, and family data as input features and employs a More >

  • Open Access

    ARTICLE

    Investigating Crucial Factors of Agile Software Development through Composite Approach

    AbdulHafeez Muhammad1, Ansar Siddique2,*, Quadri Noorulhasan Naveed3, Usman Saleem1, Mohd Abul Hasan4, Basit Shahzad5

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 15-34, 2021, DOI:10.32604/iasc.2021.014427

    Abstract The major emphasis of Software Engineering (SE) discipline is to produce successful software systems. The success of software projects is estimated through quadruple measures including budget, cost, scope, and quality. To meet this aim of SE, several software development processes are presented in the literature. Such processes are categorized into two different methodologies which are known as traditional and agile software development methodologies. The issue with traditional software development methodologies is that they had not shown any remarkable progress towards the fundamental goal of SE. Consequently, software development organizations have started to adopt agile methodologies… More >

  • Open Access

    ARTICLE

    Improved Channel Allocation Scheme for Cognitive Radio Networks

    Shahzad Latif1, Suhail Akraam2, Arif Jamal Malik3, Aaqif Afzaal Abbasi3, Muhammad Habib3, Sangsoon Lim4,*

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 103-114, 2021, DOI:10.32604/iasc.2021.014388

    Abstract

    In recent years, wireless channel optimization technologies witnessed tremendous improvements. In this regard, research for developing wireless spectrum for accommodating a wider range of wireless devices increased. This also helped in resolving spectrum scarcity issues. Cognitive Radio (CR) is a type of wireless communication in which a transceiver can intelligently detect which communication channels are being used. To avoid interference, it instantly moves traffic into vacant channels by avoiding the occupied ones. Cognitive Radio (CR) technology showed the potential to deal with the spectrum shortage problem. The spectrum assignment is often considered as a key research

    More >

Displaying 14251-14260 on page 1426 of 23336. Per Page