We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Automatic identification of Malvani dialects from audio signal based on hybrid FFO-TSO with deep neural network

    Marathi language is originated from the geographical regions of Maharashtra, which include several different varieties of Malvani. The identification...

    Madhavi S. Pednekar, Kaustubh Bhattacharyya in Multimedia Tools and Applications
    Article 06 July 2024
  2. A new attack resistant encryption method based on hybrid chaotic-quantum key distribution (CQKD)

    In this paper, a new hybrid chaotic-quantum encryption model is investigated aiming to solve the interception trouble of information transmission...

    Vida Mamandi, Nahid Ardalani, Behbod Ghalamkari in Quantum Information Processing
    Article 06 July 2024
  3. Ant lion optimization based inertia weight optimized KGMO for mobility Management in Heterogeneous LTE cellular networks

    This study proposes a hybrid optimization-based mobility management strategy employing Kinetic Gas Molecular Optimization (KGMO) and Ant Lion...

    G Venkata Narasimha Reddy, T Venkata Naga Jayudu, ... B Lakshmi Narayana Reddy in Multimedia Tools and Applications
    Article 06 July 2024
  4. Introduction: online grocery shop** – current and future challenges and opportunities

    Philipp BrĂĽggemann, Luis F. Martinez, ... J. Christopher Westland in Electronic Commerce Research
    Article Open access 06 July 2024
  5. Lorentz invariants of pure three-qubit states

    Extending the mathematical framework of Sudha et al. (Phys Rev A 102:052419, 2020), we construct Lorentz invariant quantities of pure three-qubit...

    A. R. Usha Devi, Sudha, ... B. N. Karthik in Quantum Information Processing
    Article 06 July 2024
  6. Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy

    This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the...

    Santosh Kumar Henge, R. Rajakumar, ... Wu-Lin Chen in Multimedia Tools and Applications
    Article 06 July 2024
  7. Encryption of medical data based on blockchain and multi-chaotic maps

    In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and...

    Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur in Multimedia Tools and Applications
    Article 06 July 2024
  8. Constructing a non-degenerate 2D chaotic map with application in irreversible PRNG

    To solve the weakness of reversibility that exited in some pseudo-random number generators (PRNGs), we designed an enhanced chaos-based irreversible...

    Article 06 July 2024
  9. Text classification based on optimization feature selection methods: a review and future directions

    A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a...

    Osamah Mohammed Alyasiri, Yu-N Cheah, ... Ammar Kamal Abasi in Multimedia Tools and Applications
    Article 06 July 2024
  10. Anomaly detection using deep learning approach for IoT smart city applications

    With the advancements of IoT devices, many smart applications start to rule this era. In particular, smart cities has been adapted and realized by...

    S. Shibu, S. Kirubakaran, ... Vineet Tirth in Multimedia Tools and Applications
    Article 06 July 2024
  11. Periodic and random incremental backup policies in reliability theory

    For a 24/7 database system, backups should be implemented right after a large volume of data has been updated, putting their backup windows in...

    Xufeng Zhao, Yilei Bu, ... Jiajia Cai in Software Quality Journal
    Article 05 July 2024
  12. Pothole detection in adverse weather: leveraging synthetic images and attention-based object detection methods

    Potholes are a pervasive road hazard with the potential to cause accidents and vehicle damage. Detecting potholes accurately is essential for timely...

    Maros Jakubec, Eva Lieskovska, ... Katarina Zabovska in Multimedia Tools and Applications
    Article Open access 05 July 2024
  13. Augmenting Cervical Cancer Analysis with Deep Learning Classification and Topography Selection Using Artificial Bee Colony Optimization

    According to the research and study, cervical cancer has risen to develop the fourth most communal malignancy to strike women. Five different forms...

    K. Ramu, Arun Ananthanarayanan, ... Sanjay Kumar Suman in SN Computer Science
    Article 05 July 2024
  14. Multimedia Educational System and its Improvement Using AI Model for a Higher Education Platform

    In the world of technology today, the hardware, applications, and online computing service have transformed instructional approaches and classroom...

    Abdullah Bajahzar in SN Computer Science
    Article 05 July 2024
  15. Image encryption framework based on multi-chaotic maps and equal pixel values quantization

    The importance of image encryption has considerably increased, especially after the dramatic evolution of the internet and network communications,...

    Hoshang Kolivand, Sabah Fadhel Hamood, ... William Hurst in Multimedia Tools and Applications
    Article Open access 05 July 2024
  16. Heart disease prediction using machine learning, deep Learning and optimization techniques-A semantic review

    Cardiovascular disease holds the position of being the foremost cause of death worldwide. Heart Disease Prediction (HDP) is a difficult task as it...

    Girish Shrikrushnarao Bhavekar, Agam Das Goswami, ... Harsha Vyawahare in Multimedia Tools and Applications
    Article 05 July 2024
  17. Optimal saturated information load analysis for enhancing robustness in unmanned swarms system

    Saturated information load is defined as the information received by a unmanned aerial vehicle (UAV) node in a swarm network reaches the overload...

    Jian Wu, Yichuan Jiang, ... Linfei Ding in Complex & Intelligent Systems
    Article Open access 05 July 2024
  18. Tree-based quantum anonymous ranking protocol

    We propose an improved quantum anonymous multiparty multidata ranking (QAMMR) protocol based on the binary search tree. In a QAMMR protocol, multiple...

    Justin Joseph, Syed Taqi Ali in Quantum Information Processing
    Article 05 July 2024
  19. Enhancing Forecasting Accuracy with a Moving Average-Integrated Hybrid ARIMA-LSTM Model

    This research provides a time series forecasting model that is hybrid which combines Long Short-Term Memory (LSTM) and Autoregressive Integrated...

    Sumalatha Saleti, Lovely Yeswanth Panchumarthi, ... Shilpa Jitte in SN Computer Science
    Article 05 July 2024
  20. Deep learning in medicine: advancing healthcare with intelligent solutions and the future of holography imaging in early diagnosis

    Deep Learning (DL) is currently transforming health services by significantly improving early cancer diagnosis, drug discovery, protein–protein...

    Asifa Nazir, Ahsan Hussain, ... Assif Assad in Multimedia Tools and Applications
    Article 05 July 2024
Did you find what you were looking for? Share feedback.