Search
Search Results
-
ViCLEVR: a visual reasoning dataset and hybrid multimodal fusion model for visual question answering in Vietnamese
In recent years, visual question answering (VQA) has gained significant attention for its diverse applications, including intelligent car assistance,...
-
Modelling the quantification of requirements technical debt
Requirements Technical Debt (RTD) applies the Technical Debt (TD) metaphor to capture the consequences of sub-optimal decisions made concerning...
-
Deep learning based features extraction for facial gender classification using ensemble of machine learning technique
Accurate and efficient gender recognition is an essential for many applications such as surveillance, security, and biometrics. Recently, deep...
-
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
IoT application uses MQTT, an application layer protocol that facilitates machine-to-machine communication using a central entity called broker. The...
-
Integrated feature selection and ensemble learning for heart disease detection: a 2-tier approach with ALAN and ET-ABDF machine learning model
The findings of this investigation give a novel approach to the forecasting of heart disease. For the purpose of determining significant features, it...
-
Periodic and random incremental backup policies in reliability theory
For a 24/7 database system, backups should be implemented right after a large volume of data has been updated, putting their backup windows in...
-
“Solar synergy: maximizing photovoltaic power with spotted hyena method in uniform and partial-shade environmental conditions”
A novel bioinspired Spotted-Hyena Method (SH) is proposed to track the maximum power point of partially shaded photovoltaic arrays. The SH algorithm...
-
Trust management in the internet of vehicles: a systematic literature review of blockchain integration
The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...
-
Blind quality evaluator for multi-exposure fusion image via joint sparse features and complex-wavelet statistical characteristics
Multi-Exposure Fusion (MEF) technique aims to fuse multiple images taken from the same scene at different exposure levels into an image with more...
-
Context-aware adaptive network for UDA semantic segmentation
Unsupervised Domain Adaptation (UDA) plays a pivotal role in enhancing the segmentation performance of models in the target domain by mitigating the...
-
Lattice-based device-to-device authentication and key exchange protocol for IoT system
Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices...
-
Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting
Real-time and accurate traffic flow forecasting plays a crucial role in transportation systems and holds great significance for urban traffic...
-
Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing
Self-adaptive deep learning techniques provide scalability and flexibility in deploying and administrating deep learning models in the cloud...
-
Deep contrastive multi-view clustering with doubly enhanced commonality
Recently, deep multi-view clustering leveraging autoencoders has garnered significant attention due to its ability to simultaneously enhance feature...
-
A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm
Today, with the increasing expansion of IoT devices and the growing number of user requests, processing their demands in computational environments...
-
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication
The study of continuous natural or industrial phenomena in time and space requires the emergence of new wireless sensor networks. A virtual sensor...
-
Quality evaluation methods of handwritten Chinese characters: a comprehensive survey
Quality evaluation of handwritten Chinese characters aims to automatically quantify and assess handwritten Chinese characters through computer vision...
-
Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation
Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...
-
Expediting the design and development of secure cloud-based mobile apps
The adoption and popularity of mobile devices by end-users is partially driven by the increasing development and availability of mobile applications...