We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  2. Procedure-Aware Action Quality Assessment: Datasets and Performance Evaluation

    In this paper, we investigate the problem of procedure-aware action quality assessment, which analyzes the action quality by delving into the...

    **glin Xu, Yongming Rao, ... Jiwen Lu in International Journal of Computer Vision
    Article 14 July 2024
  3. ASRE-KG&RS: knowledge graph and recommender system for adaptive smart radio environment

    With the rapid advancement of wireless communication technologies, efficient utilization of the spectrum has become more complex and competitive....

    Wenyu Luo, Tianze Yan, ... **a Shao in Signal, Image and Video Processing
    Article 13 July 2024
  4. VLSI realization of hybrid fast fourier transform using reconfigurable booth multiplier

    A discrete fourier transform (DFT) of a series of samples may be quickly and efficiently computed with the use of a mathematical procedure known as...

    A. V. S. S. Varma, Kasiprasad Manepalli in International Journal of Information Technology
    Article 13 July 2024
  5. Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling

    To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An...

    Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad in International Journal of Information Technology
    Article 13 July 2024
  6. DQMMBSC: design of an augmented deep Q-learning model for mining optimisation in IIoT via hybrid-bioinspired blockchain shards and contextual consensus

    Single-chained blockchains are highly secure but cannot be scaled to larger IIoT (Internet of Industrial Things) network scenarios due to storage...

    Manisha Gokuldas Gedam, Swapnili Karmore in International Journal of Data Science and Analytics
    Article 13 July 2024
  7. Improving predictive performance in e-learning through hybrid 2-tier feature selection and hyper parameter-optimized 3-tier ensemble modeling

    The paper presents a new feature selection technique developed in detail here to address improved prediction accuracy not only for the...

    N S Koti Mani Kumar Tirumanadham, Thaiyalnayaki S, Sriram M in International Journal of Information Technology
    Article 13 July 2024
  8. Fast Global Image Smoothing via Quasi Weighted Least Squares

    Image smoothing is a long-studied research area with tremendous approaches proposed. However, how to perform high-quality image smoothing with less...

    Wei Liu, **** Zhang, ... Michael Ng in International Journal of Computer Vision
    Article 13 July 2024
  9. LV-YOLO: logistic vehicle speed detection and counting using deep learning based YOLO network

    In the era of smart cities and advancing transportation technologies, predicting logistic vehicle and vehicle speed is pivotal to enhancing traffic...

    N. Gopika Rani, N. Hema Priya, ... N. Muthukumaran in Signal, Image and Video Processing
    Article 13 July 2024
  10. Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application

    Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical...

    Subhash Kamble, J. S. Arunalatha, K. R. Venugopal in International Journal of Information Technology
    Article 13 July 2024
  11. Trust attack prevention based on Spark-blockchain in social IoT: a survey

    Integrating the Internet of Things (IoT) with Social Networks (SN) has given rise to a new paradigm called Social IoT, which allows users and objects...

    Mariam Masmoudi, Ikram Amous, ... Florence Sèdes in International Journal of Information Security
    Article 13 July 2024
  12. Enhancing OCT patch-based segmentation with improved GAN data augmentation and semi-supervised learning

    For optimum performance, deep learning methods, such as those applied for retinal and choroidal layer segmentation in optical coherence tomography...

    Jason Kugelman, David Alonso-Caneiro, ... Michael J. Collins in Neural Computing and Applications
    Article Open access 13 July 2024
  13. The Multi-attribute impact of hyperlinks in blogs: an emotion-centric approach

    As a digital social medium, blogs have transformed into arenas where individuals can express their perspectives, concepts, and feelings. This...

    Stella Mbila-Uma, Oyindamola Koleoso, ... Nitin Agarwal in Social Network Analysis and Mining
    Article 12 July 2024
  14. 3D Reconstruction of flame temperature field based on lightweight residual network with spatial attention mechanism

    Flame temperature field measurement has always been a key topic in combustion research, which is of great significance for combustion state diagnosis...

    Liang Shan, Jian Sun, ... Ming Kong in Signal, Image and Video Processing
    Article 12 July 2024
  15. Reduction of the noise effects in phase images using a motorized dual-wavelength quantitative phase microscope

    This article introduces a novel method that leads to the reduction of noise effects and improvement in the quality of phase image acquisition in...

    Saqar Farasatzadeh, Helia Abdolrezaei, Mohammad Reza Jafarfard in Signal, Image and Video Processing
    Article 12 July 2024
  16. Multi-modal Prototypes for Open-World Semantic Segmentation

    In semantic segmentation, generalizing a visual system to both seen categories and novel categories at inference time has always been practically...

    Yuhuan Yang, Chaofan Ma, ... Yanfeng Wang in International Journal of Computer Vision
    Article 12 July 2024
  17. End-to-End Video Text Spotting with Transformer

    Recent video text spotting methods usually require the three-staged pipeline, i.e., detecting text in individual images, recognizing localized text,...

    Weijia Wu, Yuanqiang Cai, ... ** Luo in International Journal of Computer Vision
    Article 12 July 2024
  18. Research on gesture segmentation method based on FCN combined with CBAM-ResNet50

    As a key step of gesture recognition, gesture segmentation can effectively reduce the impact of complex backgrounds on recognition results and...

    Hongtu Zhao, Menghua Liang, Hao Li in Signal, Image and Video Processing
    Article 12 July 2024
  19. Explicit constructions of NMDS self-dual codes

    Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...

    Dongchun Han, Hanbin Zhang in Designs, Codes and Cryptography
    Article 12 July 2024
Did you find what you were looking for? Share feedback.