We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Towards Unified Defense for Face Forgery and Spoofing Attacks via Dual Space Reconstruction Learning

    Real-world face recognition systems are vulnerable to diverse face attacks, ranging from digitally manipulated artifacts to physically crafted...

    Junyi Cao, Ke-Yue Zhang, ... Chao Ma in International Journal of Computer Vision
    Article 02 July 2024
  2. Event-Driven Heterogeneous Network for Video Deraining

    Restoring clear frames from rainy videos poses a significant challenge due to the swift motion of rain streaks. Traditional frame-based visual...

    Xueyang Fu, Chengzhi Cao, ... Zheng-Jun Zha in International Journal of Computer Vision
    Article 02 July 2024
  3. Virtual Machine Provisioning Within Data Center Host Machines Using Ensemble Model in Cloud Computing Environment

    In the digital age of exponential data proliferation and growing computing demands, efficient resource management within data centers is crucial. A...

    Manik Chandra Pandey, Pradeep Singh Rawat in SN Computer Science
    Article 02 July 2024
  4. Predictive Assessment of the Interior Quality of Apartments Based on Multimodal Data with Variable Visual Input

    Multimodal analyses in the context of automated real estate valuation (AVM) offer the possibility of enriching the models with additional...

    Miroslav Despotovic, Eric Stumpe, ... Matthias Zeppelzauer in SN Computer Science
    Article Open access 02 July 2024
  5. PEFormer: a pixel-level enhanced CNN-transformer hybrid network for face image super-resolution

    In recent years, the rapid development of deep learning technologies has advanced the field of Face Super-Resolution (FSR), particularly with the...

    **nbiao Lu, **ng Gao, ... Yudan Chen in Signal, Image and Video Processing
    Article 02 July 2024
  6. A novel approach to detect, analyze and block adversarial web pages

    The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with...

    M. Ranjith Kumar, Darshana A. Naik, ... C. V. Guru Rao in International Journal of Information Technology
    Article 02 July 2024
  7. Detecting review fraud using metaheuristic graph neural networks

    Although online reviews play a critical role in sha** consumer behavior and establishing institutional trust, this reliance on online reviews has...

    Article Open access 02 July 2024
  8. A study of falling behavior recognition of the elderly based on deep learning

    The current computer vision-based elderly falling behavior recognition algorithm mainly uses target detection followed by behavior recognition for a...

    Pengfei Xu, Nor Anis Asma Sulaiman, ... Shengpu Li in Signal, Image and Video Processing
    Article 02 July 2024
  9. Analysis of channel capacity for UWB antenna for improvements in the data rates and low Power transmission over wireless application

    Multiple input- Multiple output- Ultra-wideband (MIMO-UWB) is a wireless communication approach that combines multiple antennas at the transmitter...

    Nitin I. Bhopale, Sunil N. Pawar in International Journal of Information Technology
    Article 02 July 2024
  10. A Semiautomatic Image Processing-Based Method for Binary Segmentation of Lungs in Computed Tomography Images

    Precise biomedical image segmentation is pivotal in medical diagnosis and treatment. Among various methodologies, image processing-based techniques...

    Leo Ramos, Israel Pineda in SN Computer Science
    Article 02 July 2024
  11. A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

    Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...

    Rachana Y. Patil, Arijit Karati, Yogesh H. Patil in International Journal of Information Technology
    Article 02 July 2024
  12. An enhanced QoS approach for multi-objective optimization using social spider optimization 5G enable IoMT network

    Social Spider Optimization (SSO) is a swarm algorithm, based on the mating and cooperating behaviour of social spiders. This approach is basically...

    Rasmita Jena, Ram Chandra Barik, ... Saroj Pradhan in International Journal of Information Technology
    Article 01 July 2024
  13. Enhancing Oyente: four new vulnerability detections for improved smart contract security analysis

    Enhancing the security analysis of smart contracts, particularly in Ethereum, by extending the widely used Oyente tool is the main objective of this...

    Article 01 July 2024
  14. Advancing personal identity verification by integrating facial recognition through deep learning algorithms

    This research delves into the realm of facial recognition technology, leveraging the power of convolutional neural network (CNN) to enhance personal...

    Article 01 July 2024
  15. An optimal feature subset selection technique to improve accounting information security for intrusion detection systems

    The goal of an intrusion detection system (IDS) is to secure data on the network by monitoring the flow of traffic and identifying malicious users....

    Ameer Saheb Shaker, Atheer Alkhafaji, ... Ahmed Jassim Al-Yasiri in International Journal of Information Technology
    Article 01 July 2024
  16. A novel kernel filtering algorithm based on the generalized half-quadratic criterion

    In this work we combine the kernel method and the generalized half-quadratic criterion, and a kernel adaptive filtering algorithm is proposed based...

    Yuanlian Huo, Zikang Luo, Jie Liu in Signal, Image and Video Processing
    Article 01 July 2024
  17. An unsupervised statistical representation learning method for human activity recognition

    With the evolution of smart devices like smartphones, smartwatches, and other wearable devices, motion sensors have been integrated into these...

    Mohammad Foad Abdi, Bagher BabaAli, Saleh Momeni in Signal, Image and Video Processing
    Article 01 July 2024
  18. EBFF-YOLO: enhanced bimodal feature fusion network for UAV image object detection

    Existing methods for fusing visible light and infrared features often focus on separating objects from backgrounds. In unmanned aerial vehicle (UAV)...

    ** Xue, Zhen Zhang in Signal, Image and Video Processing
    Article 01 July 2024
  19. A novel IMW-mrmr feature selection approach for early detection of hypertension with HRV analysis

    In the absence of control measures, hypertension poses a major threat to the world’s population’s health and can quickly develop into vascular...

    A. R. Sohara Banu, V. Nagaveni in International Journal of Information Technology
    Article 01 July 2024
  20. Introducing the Cosine Clustering Index (CCI): A Balanced Approach to Evaluating Deep Clustering

    Amidst the surge of Big Data, deep clustering emerges as a pivotal technique in machine learning, necessitating robust and interpretable evaluation...

    Mojtaba Jahanian, Abbas Karimi, ... Faraneh Zarafshan in SN Computer Science
    Article 01 July 2024
Did you find what you were looking for? Share feedback.