We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. ViCLEVR: a visual reasoning dataset and hybrid multimodal fusion model for visual question answering in Vietnamese

    In recent years, visual question answering (VQA) has gained significant attention for its diverse applications, including intelligent car assistance,...

    Khiem Vinh Tran, Hao Phu Phan, ... Ngan Luu Thuy Nguyen in Multimedia Systems
    Article 06 July 2024
  2. Modelling the quantification of requirements technical debt

    Requirements Technical Debt (RTD) applies the Technical Debt (TD) metaphor to capture the consequences of sub-optimal decisions made concerning...

    Judith Perera, Ewan Tempero, ... Kelly Blincoe in Requirements Engineering
    Article Open access 06 July 2024
  3. Deep learning based features extraction for facial gender classification using ensemble of machine learning technique

    Accurate and efficient gender recognition is an essential for many applications such as surveillance, security, and biometrics. Recently, deep...

    Fazal Waris, Feipeng Da, Shanghuan Liu in Multimedia Systems
    Article 06 July 2024
  4. A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks

    IoT application uses MQTT, an application layer protocol that facilitates machine-to-machine communication using a central entity called broker. The...

    Ankit Sharma, Kriti Bhushan in Cluster Computing
    Article 05 July 2024
  5. Integrated feature selection and ensemble learning for heart disease detection: a 2-tier approach with ALAN and ET-ABDF machine learning model

    The findings of this investigation give a novel approach to the forecasting of heart disease. For the purpose of determining significant features, it...

    Aruna Mandula, Baby Shalini Vijaya Kumar in International Journal of Information Technology
    Article 05 July 2024
  6. Periodic and random incremental backup policies in reliability theory

    For a 24/7 database system, backups should be implemented right after a large volume of data has been updated, putting their backup windows in...

    Xufeng Zhao, Yilei Bu, ... Jiajia Cai in Software Quality Journal
    Article 05 July 2024
  7. “Solar synergy: maximizing photovoltaic power with spotted hyena method in uniform and partial-shade environmental conditions”

    A novel bioinspired Spotted-Hyena Method (SH) is proposed to track the maximum power point of partially shaded photovoltaic arrays. The SH algorithm...

    Saurabh Pandey, Manish Kumar Srivastava in International Journal of Information Technology
    Article 05 July 2024
  8. Trust management in the internet of vehicles: a systematic literature review of blockchain integration

    The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...

    Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani in International Journal of Information Security
    Article 05 July 2024
  9. Blind quality evaluator for multi-exposure fusion image via joint sparse features and complex-wavelet statistical characteristics

    Multi-Exposure Fusion (MEF) technique aims to fuse multiple images taken from the same scene at different exposure levels into an image with more...

    Benquan Yang, Yueli Cui, ... Junhao Lin in Multimedia Systems
    Article 05 July 2024
  10. Context-aware adaptive network for UDA semantic segmentation

    Unsupervised Domain Adaptation (UDA) plays a pivotal role in enhancing the segmentation performance of models in the target domain by mitigating the...

    Yu Yuan, **long Shi, ... Yunhan Sun in Multimedia Systems
    Article 05 July 2024
  11. Lattice-based device-to-device authentication and key exchange protocol for IoT system

    Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices...

    Article 05 July 2024
  12. Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting

    Real-time and accurate traffic flow forecasting plays a crucial role in transportation systems and holds great significance for urban traffic...

    **aohui Huang, Junyang Wang, ... Yuanchun Lan in Cluster Computing
    Article 04 July 2024
  13. Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing

    Self-adaptive deep learning techniques provide scalability and flexibility in deploying and administrating deep learning models in the cloud...

    Logesh Rajendran, Virendra Singh Shekhawat in Cluster Computing
    Article 04 July 2024
  14. Deep contrastive multi-view clustering with doubly enhanced commonality

    Recently, deep multi-view clustering leveraging autoencoders has garnered significant attention due to its ability to simultaneously enhance feature...

    Zhiyuan Yang, Changming Zhu, Zishi Li in Multimedia Systems
    Article 04 July 2024
  15. A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm

    Today, with the increasing expansion of IoT devices and the growing number of user requests, processing their demands in computational environments...

    Sayed Mohsen Hashemi, Amir Sahafi, ... Mahdi Bohlouli in Computing
    Article 04 July 2024
  16. Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication

    The study of continuous natural or industrial phenomena in time and space requires the emergence of new wireless sensor networks. A virtual sensor...

    Adda Boualem, Marwane Ayaida, ... Hichem Sedjelmaci in Cluster Computing
    Article 04 July 2024
  17. Quality evaluation methods of handwritten Chinese characters: a comprehensive survey

    Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision...

    Weiran Chen, Jiaqi Su, ... Chun** Liu in Multimedia Systems
    Article 04 July 2024
  18. Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation

    Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...

    Baptiste Gueuziec, Jean-Pierre Gallois, Frédéric Boulanger in Innovations in Systems and Software Engineering
    Article 04 July 2024
  19. Expediting the design and development of secure cloud-based mobile apps

    The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications...

    Francisco T. Chimuco, Joāo B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 04 July 2024
Did you find what you were looking for? Share feedback.