We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. An Improved Pelican Optimization Algorithm Based Residual Recurrent Neural Network for Channel Estimation with Hybrid Precoder in MIMO-OFDM System

    Massive multiple input multiple output (MIMO) technology stands as a cornerstone in the evolution of 5G networks. Using an abundance of degrees of...

    S. Santhi Jabarani, Jaison Jacob in Wireless Personal Communications
    Article 15 July 2024
  2. Towards optimal score level fusion for adaptive multi-biometric authentication system

    Multi-biometric authentication systems have been extensively investigated due to their merit over unimodal systems. Multi-biometric systems not only...

    Kavita, Rajesh Rohilla, Gurjit Singh Walia in Multimedia Tools and Applications
    Article 15 July 2024
  3. Advancing automotive high-performance computing: integrating direction API with LORA technology in unified machine vision for future smart cars

    This manuscript addresses the challenges in develo** Automotive High-Performance Computing (HPC) systems for Future Smart Cars and Unmanned Mobile...

    Article 15 July 2024
  4. Autonomous Landing of Unmanned Aerial Vehicles: Hybrid Metaheuristic Aided Detection and Extended Kalman Filter for Localization

    The majority of uses for UAVs are in precision agriculture, cinematography, aerial surveillance, military applications, disaster relief, construction...

    T. K. Mohamed Sameer, D. Susitra in Wireless Personal Communications
    Article 15 July 2024
  5. Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach

    Efficient virtual machine (VM) placement is vital for optimizing the performance of cloud data centers. While recent studies have addressed this...

    Arezoo Ghasemi, Amin Keshavarzi in Cluster Computing
    Article 15 July 2024
  6. Privacy-preserving cross-domain recommendation using hybrid federated transfer learning

    Cross-domain recommender systems, which serve as a panacea to data sparsity and cold-start problems, are increasingly vital for providing...

    Samta Jain Goyal, Rajeev Goyal, ... Kuldeep Narayan Tripathi in Multimedia Tools and Applications
    Article 15 July 2024
  7. Television shows ideation, and testing with smart digital twins to advance ratings

    Generating ideas for immersive television shows is fundamental to the television industry. TV channel managers are looking to stay ahead of their...

    Jacob Hornik, Matti Rachamim in Electronic Commerce Research
    Article Open access 15 July 2024
  8. Skin Lesion Classification via ensemble method on deep learning

    Deep neural networks have shown promising results in the classification of skin lesion images, particularly when they focus on the most significant...

    Sekineh Asadi Amiri, Mahda Nasrolahzadeh, ... Amir Hossein Zare Kordkheili in Multimedia Tools and Applications
    Article 15 July 2024
  9. Towards Detection of DDoS Attacks in IoT with Optimal Features Selection

    The exponential growth of internet-enabled devices and their interconnectedness heightens the vulnerability of technology to cyber threats. The...

    Pooja Kumari, Ankit Kumar Jain, ... Anubhav Singh in Wireless Personal Communications
    Article 15 July 2024
  10. Vehicle-infrastructure cooperative 3D target detection based on Feature Prediction Atrous Spatial Pyramid Pooling Net

    Due to wireless communication delays in actual Vehicle-Infrastructure Cooperation (VIC) data transmission, the misalignment in time and space of the...

    Shaohua Wang, Yunxiang Gan, ... Kecheng Sun in Multimedia Tools and Applications
    Article 15 July 2024
  11. Soliton emissions at 1.59 and 1.95 μm utilizing nickel-trimesic acid metal-organic framework saturable absorber

    This study demonstrates the potential of nickel-trimesic acid, a material from the metal-organic framework (MOF) family, as a real saturable absorber...

    Amir Murad, Norita Mohd Yusoff, ... Mohd Adzir Mahdi in Optical and Quantum Electronics
    Article 15 July 2024
  12. Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection

    Adversarial malware poses novel threats to smart devices since they grow progressively integrated into daily life, highlighting their potential...

    Tae hoon Kim, Moez Krichen, ... Sidra Abbas in Peer-to-Peer Networking and Applications
    Article 15 July 2024
  13. A Critical Review of Distributed Generations Planning in Distribution Networks for Improved System Performances

    With the help of a range of load models including static, dynamic, composite, and realistic load models, the planning of distributed generations...

    Ravindra Kumar, B. K. Singh, Bindeshwar Singh in Journal of The Institution of Engineers (India): Series B
    Article 14 July 2024
  14. Text summarization based on semantic graphs: an abstract meaning representation graph-to-text deep learning approach

    Nowadays, due to the constantly growing amount of textual information, automatic text summarization constitutes an important research area in natural...

    Panagiotis Kouris, Georgios Alexandridis, Andreas Stafylopatis in Journal of Big Data
    Article Open access 14 July 2024
  15. Review of Deep Learning Techniques for Neurological Disorders Detection

    Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its...

    Akhilesh Kumar Tripathi, Rafeeq Ahmed, Arvind Kumar Tiwari in Wireless Personal Communications
    Article 14 July 2024
  16. Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach

    The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of...

    N. P. Ponnuviji, G. Nirmala, ... S. Indra Priyadharshini in Journal of The Institution of Engineers (India): Series B
    Article 14 July 2024
  17. Information flow control for comparative privacy analyses

    The prevalence of web tracking and its key characteristics have been extensively investigated by the research community by means of large-scale web...

    Zubair Ahmad, Stefano Calzavara, ... Ben Stock in International Journal of Information Security
    Article 14 July 2024
  18. A quantitative analysis of the security of PoW-based blockchains

    This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification...

    Maher Alharby, Ali Alssaiari, ... Aad van Moorsel in Cluster Computing
    Article Open access 14 July 2024
  19. Energy Efficient Routing in Cluster Based Heterogeneous Wireless Sensor Network Using Hybrid GWO and Firefly Algorithm

    Object tracking application is one of the important as well as challenging application of energy constrained Wireless Sensor Network (WSN).Timely and...

    Jayashree Dev, Jibitesh Mishra in Wireless Personal Communications
    Article 14 July 2024
Did you find what you were looking for? Share feedback.