Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach

A Alzahrani, RA Khan - Computers in Human Behavior, 2024 - Elsevier
Ubiquitous computing systems are deployed everywhere to process and service complex
applications in real time. It has been noticed that most ubiquitous computing practitioners …

LSBlocFL: A secure federated learning model combining blockchain and lightweight cryptographic solutions

S Deng, J Zhang, L Tao, X Jiang, F Wang - Computers and Electrical …, 2023 - Elsevier
In the area of privacy protection, federated learning has received a lot of attention as an
emerging distributed network training model that can effectively protect the privacy of users' …

Deep convolutional generative adversarial networks-based data augmentation method for classifying class-imbalanced defect patterns in wafer bin map

S Park, C You - Applied Sciences, 2023 - mdpi.com
In the semiconductor industry, achieving a high production yield is a very important issue.
Wafer bin maps (WBMs) provide critical information for identifying anomalies in the …

Analysis of employee diligence and mining of behavioral patterns based on portrait portrayal

C Wang, Y Liu - Scientific Reports, 2024 - nature.com
With the deepening of enterprise digital construction, the portrait portrayal based on
employee behaviors has gradually become a research focus. Currently, the employee's …

Automated ethnicity recognition using equilibrium optimizer with machine learning on facial images

Y Asiri, A Alhabeeb, AM Mashraqi, AD Algarni… - Thermal …, 2022 - doiserbia.nb.rs
In recent times, computer vision related face image analysis has gained significant attention
in various applications namely biometrics, surveillance, security, data retrieval, informatics …