Search
Search Results
-
Optimization of vision transformer-based detection of lung diseases from chest X-ray images
BackgroundRecent advances in Vision Transformer (ViT)-based deep learning have significantly improved the accuracy of lung disease prediction from...
-
A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes
Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication...
-
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system
Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...
-
Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN
Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...
-
A multi-scale no-reference video quality assessment method based on transformer
Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing,...
-
ViCLEVR: a visual reasoning dataset and hybrid multimodal fusion model for visual question answering in Vietnamese
In recent years, visual question answering (VQA) has gained significant attention for its diverse applications, including intelligent car assistance,...
-
Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset
As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as...
-
Deep learning based features extraction for facial gender classification using ensemble of machine learning technique
Accurate and efficient gender recognition is an essential for many applications such as surveillance, security, and biometrics. Recently, deep...
-
Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering
We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality...
-
Effect of the data-informed platform for health intervention on the culture of data use for decision-making among district health office staff in North Shewa Zone, Ethiopia: a cluster-randomised controlled trial
BackgroundSimilar to other low and middle-income countries, Ethiopia faces limitations in using local health data for decision-making.We aimed to...
-
Measuring electronic health literacy in the context of diabetes care: psychometric evaluation of a Persian version of the condition-specific eHealth literacy scale for diabetes
BackgroundThe rise of the internet and social media has led to increased interest among diabetes patients in using technology for information...
-
Trust management in the internet of vehicles: a systematic literature review of blockchain integration
The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...
-
Vectorial negabent concepts: similarities, differences, and generalizations
In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial...
-
Blind quality evaluator for multi-exposure fusion image via joint sparse features and complex-wavelet statistical characteristics
Multi-Exposure Fusion (MEF) technique aims to fuse multiple images taken from the same scene at different exposure levels into an image with more...
-
Context-aware adaptive network for UDA semantic segmentation
Unsupervised Domain Adaptation (UDA) plays a pivotal role in enhancing the segmentation performance of models in the target domain by mitigating the...
-
Deep contrastive multi-view clustering with doubly enhanced commonality
Recently, deep multi-view clustering leveraging autoencoders has garnered significant attention due to its ability to simultaneously enhance feature...
-
Quality evaluation methods of handwritten Chinese characters: a comprehensive survey
Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision...
-
Errorless robust JPEG steganography using steganographic polar codes
Recently, a robust steganographic algorithm that achieves errorless robustness against JPEG recompression has been proposed. The method employs a...