Search
Search Results
-
Accurate entropy modeling in learned image compression with joint enchanced SwinT and CNN
Recently, learned image compression (LIC) has shown significant research potential. Most existing LIC methods are CNN-based or transformer-based or...
-
A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlap** community detection in social networks
In recent years, extensive studies have been carried out in community detection for social network analysis because it plays a crucial role in social...
-
Automatic identification of Malvani dialects from audio signal based on hybrid FFO-TSO with deep neural network
Marathi language is originated from the geographical regions of Maharashtra, which include several different varieties of Malvani. The identification...
-
Ant lion optimization based inertia weight optimized KGMO for mobility Management in Heterogeneous LTE cellular networks
This study proposes a hybrid optimization-based mobility management strategy employing Kinetic Gas Molecular Optimization (KGMO) and Ant Lion...
-
TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs)
Electric vehicles (EVs) have attracted significant attention in recent years primarily due to minimal adverse impact on the environment and...
-
Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework
In this paper, we introduce the large language model (LLM) ChatGPT-3.5 to automatically and intelligently generate a new metaheuristic algorithm (MA)...
-
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized...
-
A clarity and fairness aware framework for selecting workers in competitive crowdsourcing tasks
Crowdsourcing is a powerful technique for accomplishing tasks that are difficult for machines but easy for humans. However, ensuring the quality of...
-
A multi-scale no-reference video quality assessment method based on transformer
Video quality assessment is essential for optimizing user experience, enhancing network efficiency, supporting video production and editing,...
-
ViCLEVR: a visual reasoning dataset and hybrid multimodal fusion model for visual question answering in Vietnamese
In recent years, visual question answering (VQA) has gained significant attention for its diverse applications, including intelligent car assistance,...
-
Encryption of medical data based on blockchain and multi-chaotic maps
In this work, the SHA-256 mapper of the blockchain has been utilized to secure medical data from brute-force attacks. The uniform distribution and...
-
Constructing a non-degenerate 2D chaotic map with application in irreversible PRNG
To solve the weakness of reversibility that exited in some pseudo-random number generators (PRNGs), we designed an enhanced chaos-based irreversible...
-
Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the...
-
Text classification based on optimization feature selection methods: a review and future directions
A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a...
-
Anomaly detection using deep learning approach for IoT smart city applications
With the advancements of IoT devices, many smart applications start to rule this era. In particular, smart cities has been adapted and realized by...
-
Deep learning based features extraction for facial gender classification using ensemble of machine learning technique
Accurate and efficient gender recognition is an essential for many applications such as surveillance, security, and biometrics. Recently, deep...
-
Pothole detection in adverse weather: leveraging synthetic images and attention-based object detection methods
Potholes are a pervasive road hazard with the potential to cause accidents and vehicle damage. Detecting potholes accurately is essential for timely...
-
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
IoT application uses MQTT, an application layer protocol that facilitates machine-to-machine communication using a central entity called broker. The...
-
Trust management in the internet of vehicles: a systematic literature review of blockchain integration
The Internet of Vehicles (IoV) promises to revolutionize transportation in smart cities, but its interconnectedness raises critical security and...