We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 81-100 of 10,000 results
  1. Towards enhancing shadow removal from images

    Addressing challenges posed by shadows in computer vision tasks, this study employs advanced deep learning techniques for shadow removal in RGB...

    Muhammad Hamza Tariq, Ahmad Salman, Khawar Khurshid in Multimedia Tools and Applications
    Article 10 July 2024
  2. Fast Learning Network Algorithm for Voice Pathology Detection and Classification

    The utilisation of ML (Machine Learning) techniques in the detection of the VP (Voice Pathology) has recently gained a lot of consideration. However,...

    Musatafa Abbas Abbood Albadr, Masri Ayob, ... Ali Hashim Abbas in Multimedia Tools and Applications
    Article 10 July 2024
  3. Enhancement of patient's health prediction system in a graphical representation using digital twin technology

    The patient health prediction system is the most critical study in medical research. Several prediction models exist to predict the patient's health...

    M. Sobhana, Smitha Chowdary Ch, ... K. Kranthi Kumar in Multimedia Tools and Applications
    Article 10 July 2024
  4. BangleFIR: bridging the gap in fashion image retrieval with a novel dataset of bangles

    In this paper, we introduce Bangle Fashion Image Retrieval (BangleFIR), a novel dataset focusing on bangles within the fashion domain. While garment...

    Sk Maidul Islam, Subhankar Joardar, Arif Ahmed Sekh in Multimedia Tools and Applications
    Article 10 July 2024
  5. A review of video-based human activity recognition: theory, methods and applications

    Video-based human activity recognition (HAR) is an important task in many fields, such as healthcare monitoring, video surveillance, and sports...

    Tanvir Fatima Naik Bukht, Hameedur Rahman, ... Ahmad Jalal in Multimedia Tools and Applications
    Article 10 July 2024
  6. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  7. RALFusion: a residual attention guided lightweight deep-learning framework for infrared and visible image fusion

    Infrared and visible image fusion plays an important role in subsequent advanced visual tasks, especially for complex marine environments. To improve...

    Ting Liu, Yuxin Zhang, ... Yunsheng Fan in Multimedia Tools and Applications
    Article 10 July 2024
  8. Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content

    The rapid development of generative artificial intelligence technology and large-scale pre-training models has led to the emergence of artificial...

    **ao Feng, Zheng Yuan in Journal of Real-Time Image Processing
    Article 10 July 2024
  9. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  10. A comprehensive review on the Internet of Things in precision agriculture

    A quickening transformation in the agriculture sector is being driven by the growth of Internet of Things (IoT) technology. The need for food...

    Gurpreet Singh, Sandeep Sharma in Multimedia Tools and Applications
    Article 09 July 2024
  11. Introducing a parametric function on relaxation times in magnetic resonance imaging

    Relaxation times in MRI are able to indicate various objects on the T 1 - and T 2 -weighted images as well as the other pathophysiological quantities....

    Mansour Ashoor, Abdollah Khorshidi in Multimedia Tools and Applications
    Article 09 July 2024
  12. Lorentz-modulated multiscale nonlinear diffusion for stitching in near-uniform scenes

    Image stitching finds diverse applications in multimedia contexts, and creating panoramic images with this technique can be particularly challenging...

    Tze Kian Jong, David B. L. Bong in Multimedia Tools and Applications
    Article 09 July 2024
  13. An optimized deep network-based intermediate code generation for the mathematical expression

    In recent times, the system's mathematical expression and operation have gained greater reach in engineering and mathematics. It is vital to solving...

    H. N. Sharada, Basavaraj Anami, Shridhar Allagi in Multimedia Tools and Applications
    Article 09 July 2024
  14. TSDAnet: texture strip dual attention network for intraclass texture classification

    Intraclass texture classification is a challenging task due to the high similarity between subtypes within the same texture. The presence of...

    G. Sakthipriya, N. Padmapriya, N. Venkateswaran in Signal, Image and Video Processing
    Article 09 July 2024
  15. A novel single kernel parallel image encryption scheme based on a chaotic map

    The development of communication technologies has increased concerns about data security, increasing the prominence of cryptography. Images are one...

    Joao Inacio Moreira Bezerra, Alexandre Molter, ... VinĂ­cius Valduga de Almeida Camargo in Journal of Real-Time Image Processing
    Article 09 July 2024
  16. A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification

    Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc....

    Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh in Cluster Computing
    Article 09 July 2024
  17. Recognizing text lines in handwritten archival document images using octave convolutional and attention recurrent neural networks

    Over the past several years, many archivists and historians have pointed out growing needs closely related to robust and efficient offline...

    Olfa Mechi, Maroua Mehri, ... Najoua Essoukri Ben Amara in Multimedia Tools and Applications
    Article 09 July 2024
  18. Vision transformer and CNN-based skin lesion analysis: classification of monkeypox

    Monkeypox is an important health problem. Rapid diagnosis of monkeypox skin lesions and emergency isolation when necessary is essential. Also, some...

    Gozde Yolcu Oztel in Multimedia Tools and Applications
    Article Open access 09 July 2024
  19. SORDI.ai: large-scale synthetic object recognition dataset generation for industries

    Smart robots play a crucial role in assisting human workers within manufacturing units (like Industry 4.0) by perceiving and analyzing their...

    Chafic Abou Akar, Jimmy Tekli, ... Marc Kamradt in Multimedia Tools and Applications
    Article 09 July 2024
  20. Secure container Orchestration: A framework for detecting and mitigating Orchestrator - level vulnerabilities

    This paper presents Secure Orchestration, a novel framework meticulously planned to uphold rigorous security measures over the profound security...

    V. Mahavaishnavi, R. Saminathan, R. Prithviraj in Multimedia Tools and Applications
    Article 09 July 2024
Did you find what you were looking for? Share feedback.