Search
Search Results
-
An Improved Pelican Optimization Algorithm Based Residual Recurrent Neural Network for Channel Estimation with Hybrid Precoder in MIMO-OFDM System
Massive multiple input multiple output (MIMO) technology stands as a cornerstone in the evolution of 5G networks. Using an abundance of degrees of...
-
Towards optimal score level fusion for adaptive multi-biometric authentication system
Multi-biometric authentication systems have been extensively investigated due to their merit over unimodal systems. Multi-biometric systems not only...
-
Advancing automotive high-performance computing: integrating direction API with LORA technology in unified machine vision for future smart cars
This manuscript addresses the challenges in develo** Automotive High-Performance Computing (HPC) systems for Future Smart Cars and Unmanned Mobile...
-
Autonomous Landing of Unmanned Aerial Vehicles: Hybrid Metaheuristic Aided Detection and Extended Kalman Filter for Localization
The majority of uses for UAVs are in precision agriculture, cinematography, aerial surveillance, military applications, disaster relief, construction...
-
Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach
Efficient virtual machine (VM) placement is vital for optimizing the performance of cloud data centers. While recent studies have addressed this...
-
Privacy-preserving cross-domain recommendation using hybrid federated transfer learning
Cross-domain recommender systems, which serve as a panacea to data sparsity and cold-start problems, are increasingly vital for providing...
-
Television shows ideation, and testing with smart digital twins to advance ratings
Generating ideas for immersive television shows is fundamental to the television industry. TV channel managers are looking to stay ahead of their...
-
Skin Lesion Classification via ensemble method on deep learning
Deep neural networks have shown promising results in the classification of skin lesion images, particularly when they focus on the most significant...
-
Towards Detection of DDoS Attacks in IoT with Optimal Features Selection
The exponential growth of internet-enabled devices and their interconnectedness heightens the vulnerability of technology to cyber threats. The...
-
Vehicle-infrastructure cooperative 3D target detection based on Feature Prediction Atrous Spatial Pyramid Pooling Net
Due to wireless communication delays in actual Vehicle-Infrastructure Cooperation (VIC) data transmission, the misalignment in time and space of the...
-
Soliton emissions at 1.59 and 1.95 μm utilizing nickel-trimesic acid metal-organic framework saturable absorber
This study demonstrates the potential of nickel-trimesic acid, a material from the metal-organic framework (MOF) family, as a real saturable absorber...
-
Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection
Adversarial malware poses novel threats to smart devices since they grow progressively integrated into daily life, highlighting their potential...
-
A Critical Review of Distributed Generations Planning in Distribution Networks for Improved System Performances
With the help of a range of load models including static, dynamic, composite, and realistic load models, the planning of distributed generations...
-
Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach
Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...
-
Review of Deep Learning Techniques for Neurological Disorders Detection
Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its...
-
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of...
-
Information flow control for comparative privacy analyses
The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...
-
A quantitative analysis of the security of PoW-based blockchains
This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...
-
Energy Efficient Routing in Cluster Based Heterogeneous Wireless Sensor Network Using Hybrid GWO and Firefly Algorithm
Object tracking application is one of the important as well as challenging application of energy constrained Wireless Sensor Network (WSN).Timely and...