We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN

    Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...

    Dongjian Yang, **aopeng Fan, ... Debin Zhao in Multimedia Systems
    Article 07 July 2024
  2. A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlap** community detection in social networks

    In recent years, extensive studies have been carried out in community detection for social network analysis because it plays a crucial role in social...

    Ahmad Heydariyan, Farhad Soleimanian Gharehchopogh, Mohammad Reza Ebrahimi Dishabi in Cluster Computing
    Article 06 July 2024
  3. Automatic identification of Malvani dialects from audio signal based on hybrid FFO-TSO with deep neural network

    Marathi language is originated from the geographical regions of Maharashtra, which include several different varieties of Malvani. The identification...

    Madhavi S. Pednekar, Kaustubh Bhattacharyya in Multimedia Tools and Applications
    Article 06 July 2024
  4. Ant lion optimization based inertia weight optimized KGMO for mobility Management in Heterogeneous LTE cellular networks

    This study proposes a hybrid optimization-based mobility management strategy employing Kinetic Gas Molecular Optimization (KGMO) and Ant Lion...

    G Venkata Narasimha Reddy, T Venkata Naga Jayudu, ... B Lakshmi Narayana Reddy in Multimedia Tools and Applications
    Article 06 July 2024
  5. TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs)

    Electric vehicles (EVs) have attracted significant attention in recent years primarily due to minimal adverse impact on the environment and...

    Kashif Mehboob Khan, Junaid Arshad, ... Marvi Jokhio in Cluster Computing
    Article 06 July 2024
  6. Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework

    In this paper, we introduce the large language model (LLM) ChatGPT-3.5 to automatically and intelligently generate a new metaheuristic algorithm (MA)...

    Rui Zhong, Yuefeng Xu, ... Jun Yu in Cluster Computing
    Article 06 July 2024
  7. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment

    The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized...

    Akhil Chaurasia, Alok Kumar, Udai Pratap Rao in Cluster Computing
    Article 06 July 2024
  8. A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks

    Crowdsourcing is a powerful technique for accomplishing tasks that are difficult for machines but easy for humans. However, ensuring the quality of...

    Seyyed Javad Bozorg Zadeh Razavi, Haleh Amintoosi, Mohammad Allahbakhsh in Computing
    Article 06 July 2024
  9. A multi-scale no-reference video quality assessment method based on transformer

    Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing,...

    Yingan Cui, Zonghua Yu, ... Junhuai Li in Multimedia Systems
    Article 06 July 2024
  10. ViCLEVR: a visual reasoning dataset and hybrid multimodal fusion model for visual question answering in Vietnamese

    In recent years, visual question answering (VQA) has gained significant attention for its diverse applications, including intelligent car assistance,...

    Khiem Vinh Tran, Hao Phu Phan, ... Ngan Luu Thuy Nguyen in Multimedia Systems
    Article 06 July 2024
  11. Encryption of medical data based on blockchain and multi-chaotic maps

    In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and...

    Suvita Rani Sharma, Birmohan Singh, Manpreet Kaur in Multimedia Tools and Applications
    Article 06 July 2024
  12. Constructing a non-degenerate 2D chaotic map with application in irreversible PRNG

    To solve the weakness of reversibility that exited in some pseudo-random number generators (PRNGs), we designed an enhanced chaos-based irreversible...

    Article 06 July 2024
  13. Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy

    This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the...

    Santosh Kumar Henge, R. Rajakumar, ... Wu-Lin Chen in Multimedia Tools and Applications
    Article 06 July 2024
  14. Text classification based on optimization feature selection methods: a review and future directions

    A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a...

    Osamah Mohammed Alyasiri, Yu-N Cheah, ... Ammar Kamal Abasi in Multimedia Tools and Applications
    Article 06 July 2024
  15. Anomaly detection using deep learning approach for IoT smart city applications

    With the advancements of IoT devices, many smart applications start to rule this era. In particular, smart cities has been adapted and realized by...

    S. Shibu, S. Kirubakaran, ... Vineet Tirth in Multimedia Tools and Applications
    Article 06 July 2024
  16. Deep learning based features extraction for facial gender classification using ensemble of machine learning technique

    Accurate and efficient gender recognition is an essential for many applications such as surveillance, security, and biometrics. Recently, deep...

    Fazal Waris, Feipeng Da, Shanghuan Liu in Multimedia Systems
    Article 06 July 2024
  17. Pothole detection in adverse weather: leveraging synthetic images and attention-based object detection methods

    Potholes are a pervasive road hazard with the potential to cause accidents and vehicle damage. Detecting potholes accurately is essential for timely...

    Maros Jakubec, Eva Lieskovska, ... Katarina Zabovska in Multimedia Tools and Applications
    Article Open access 05 July 2024
  18. A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks

    IoT application uses MQTT, an application layer protocol that facilitates machine-to-machine communication using a central entity called broker. The...

    Ankit Sharma, Kriti Bhushan in Cluster Computing
    Article 05 July 2024
  19. Trust management in the internet of vehicles: a systematic literature review of blockchain integration

    The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...

    Shirin Abbasi, Navid Khaledian, Amir Masoud Rahmani in International Journal of Information Security
    Article 05 July 2024
Did you find what you were looking for? Share feedback.