Search
Search Results
-
Hardware Efficient Reconfigurable Digital Hearing aid using Pascal Structure
This paper proposes a hardware efficient reconfigurable digital hearing aid with minimum delay and minimum matching error, employing Pascal structure...
-
Complexity Reduction in Intra Prediction of HEVC Using a Modified Convolutional Neural Network Model Incorporating Depth Map and RGB Texture
The use of videos has become widespread across various domains, including personal, entertainment, business, and education. As the demand for video...
-
Supernode Fusion Model Based on Bimodal Action Recognition
Skeleton action recognition based on graph convolutional neural networks (GCNs) has become a hot research topic in recent years. Existing graph...
-
Determining the Number of Clusters in Clinical Response of TMS Treatment using Hyperdimensional Computing
This paper addresses clustering of clinical response of subjects with major depressive disorder (MDD) after they are treated with transcranial...
-
VLSI-Implementation-Based Fast Symbol Detector for PQSM MIMO Systems
Parallel quadrature spatial modulation (PQSM) multiple-input multiple-output (MIMO) technology is a variant of spatial modulation (SM) technology and...
-
Impact of LiDAR point cloud compression on 3D object detection evaluated on the KITTI dataset
The rapid growth on the amount of generated 3D data, particularly in the form of Light Detection And Ranging (LiDAR) point clouds (PCs), poses very...
-
Remote expert viewing, laboratory tests or objective metrics: which one(s) to trust?
We present a study on the validity of quality assessment in the context of the development of visual media coding schemes. The work is motivated by...
-
Subjective performance evaluation of bitrate allocation strategies for MPEG and JPEG Pleno point cloud compression
The recent rise in interest in point clouds as an imaging modality has motivated standardization groups such as JPEG and MPEG to launch activities...
-
Adaptive bridge model for compressed domain point cloud classification
The recent adoption of deep learning-based models for the processing and coding of multimedia signals has brought noticeable gains in performance,...
-
Robust and Recovery Watermarking Approach Based on SVD and OTP Encryption
Informed watermarking relates to a particular strategy in digital watermarking, a method utilized to embed data in multimedia content. There are...
-
Learning-based light field imaging: an overview
Conventional photography can only provide a two-dimensional image of the scene, whereas emerging imaging modalities such as light field enable the...
-
Energy-Efficient Object Detection: Impact of Weight Clustering for Different Arithmetic Representations
Object detection in video streams is often realized with Deep Neural Networks (DNNs), which require fetching, to the computing unit where they are...
-
Self-Organizing Key Security Management Algorithm in Socially Aware Networking
In socially aware networking, encryption algorithms are used in privacy-preserving algorithms to provide security for the nodes. However, the shared...
-
Kaczmarz Projection Algorithms with Rank Two Gain Update
New Kaczmarz algorithms with rank two gain update, extended orthogonality property and forgetting mechanism which includes both exponential and...
-
Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering
Big data privacy preservation is a critical challenge for data mining and data analysis. Existing methods for anonymizing big data streams using...
-
Cartoon copyright recognition method based on character personality action
Aiming at the problem of cartoon piracy and plagiarism, this paper proposes a method of cartoon copyright recognition based on character personality...
-
4AC-YOLOv5: an improved algorithm for small target face detection
In real scenes, small target faces often encounter various conditions, such as intricate background, occlusion and scale change, which leads to the...
-
Analysis of thermal videos for detection of lie during interrogation
The lie-detection tests are traditionally carried out by well-trained experts using polygraph machines. However, it is time-consuming, invasive, and,...
-
Deep Learning-based Privacy-preserving Publishing Method for Location Big Data in Vehicular Networks
In contemporary times, there is an increasing integration of Location-Based Service (LBS) enabled smart devices into the fabric of individuals’ daily...
-
Intelligent AUV Surfacing Control in Network Attack Scenario
Autonomous Underwater Vehicle (AUV) have become an important tool for humans to explore the ocean. The evolution of AUV is trending towards...