We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Ensemble methods-based comparative study of Landsat 8 operational land imager (OLI) and sentinel 2 multi-spectral images (MSI) for smart farming crop classification

    Agriculture has a significant worldwide impact in terms of generating employment opportunities and stimulating economic growth. In India, agriculture...

    Priyanka Gupta, Prateek Gupta, ... Manoj Kumar in Multimedia Tools and Applications
    Article 08 July 2024
  2. Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model

    One of the preconditions for efficient cloud computing services is the continuous availability of services to clients. However, there are various...

    Raseena M. Haris, Mahmoud Barhamgi, ... Khaled M. Khan in Computing
    Article Open access 08 July 2024
  3. Proposed cancelable biometrics system based on hybrid optical crypto-steganography audio framework for cyber security applications

    Biometric authentication systems have gained significant popularity in recent years due to their high level of security and convenience. Cancelable...

    Article 08 July 2024
  4. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  5. Using the ACE framework to enforce access and usage control with notifications of revoked access rights

    The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is...

    Marco Rasori, Andrea Saracino, ... Marco Tiloca in International Journal of Information Security
    Article Open access 08 July 2024
  6. Visual saliency based maritime target detection

    We present an unsupervised maritime target detection method based on visual saliency. From the perspective of maritime target detection as a salient...

    Qilong Jia, Qingkai Hou in Multimedia Tools and Applications
    Article 08 July 2024
  7. Enhancing visual clarity in hazy media: a comprehensive approach through preprocessing and feature fusion attention-based dehazing

    Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the...

    Abeer Ayoub, Walid El-Shafai, ... El-Sayed M. Rabaie in Multimedia Tools and Applications
    Article 08 July 2024
  8. A three-stage quality evaluation method for experience products: taking animation as an example

    The diversity and dynamics of quality index information bring challenges to quality assessment of experience products. This paper proposes a...

    Qianqian Chen, Zhongjun Tang, ... **g Wang in Multimedia Systems
    Article 08 July 2024
  9. End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks

    Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...

    Gourav Prateek Sharma, Wouter Tavernier, ... Ingrid Moerman in Journal of Network and Systems Management
    Article Open access 08 July 2024
  10. An efficient quantum oblivious transfer protocol

    Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of...

    Sushmita Sarkar, Vikas Srivastava, ... Sihem Mesnager in Cluster Computing
    Article 08 July 2024
  11. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system

    Software can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires...

    Süleyman Muhammed Arıkan, Aynur Koçak, Mustafa Alkan in International Journal of Information Security
    Article Open access 08 July 2024
  12. Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems

    The Sparrow Search Algorithm (SSA) is recognized for its rapid convergence and precision in engineering optimization, yet it faces the challenge of...

    Gang Chen, Hu Sun in Cluster Computing
    Article 07 July 2024
  13. An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer

    Women are commonly diagnosed with breast cancer (BC), and early detection can significantly increase the cure rate. This study suggested a...

    Shuhui Hao, Changcheng Huang, ... Guoxi Liang in Cluster Computing
    Article 07 July 2024
  14. Non-uniform magnetic fields for collective behavior of self-assembled magnetic pillars

    Programmable and self-assembled magnetic pillars are essential to expanding the application domain of magnetic microparticle collectives. Typically,...

    Juan J. Huaroto, Franco N. Piñan Basualdo, ... Sarthak Misra in Swarm Intelligence
    Article Open access 07 July 2024
  15. Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN

    Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...

    Dongjian Yang, **aopeng Fan, ... Debin Zhao in Multimedia Systems
    Article 07 July 2024
  16. A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlap** community detection in social networks

    In recent years, extensive studies have been carried out in community detection for social network analysis because it plays a crucial role in social...

    Ahmad Heydariyan, Farhad Soleimanian Gharehchopogh, Mohammad Reza Ebrahimi Dishabi in Cluster Computing
    Article 06 July 2024
  17. Automatic identification of Malvani dialects from audio signal based on hybrid FFO-TSO with deep neural network

    Marathi language is originated from the geographical regions of Maharashtra, which include several different varieties of Malvani. The identification...

    Madhavi S. Pednekar, Kaustubh Bhattacharyya in Multimedia Tools and Applications
    Article 06 July 2024
  18. Ant lion optimization based inertia weight optimized KGMO for mobility Management in Heterogeneous LTE cellular networks

    This study proposes a hybrid optimization-based mobility management strategy employing Kinetic Gas Molecular Optimization (KGMO) and Ant Lion...

    G Venkata Narasimha Reddy, T Venkata Naga Jayudu, ... B Lakshmi Narayana Reddy in Multimedia Tools and Applications
    Article 06 July 2024
  19. TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs)

    Electric vehicles (EVs) have attracted significant attention in recent years primarily due to minimal adverse impact on the environment and...

    Kashif Mehboob Khan, Junaid Arshad, ... Marvi Jokhio in Cluster Computing
    Article 06 July 2024
  20. Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework

    In this paper, we introduce the large language model (LLM) ChatGPT-3.5 to automatically and intelligently generate a new metaheuristic algorithm (MA)...

    Rui Zhong, Yuefeng Xu, ... Jun Yu in Cluster Computing
    Article 06 July 2024
Did you find what you were looking for? Share feedback.