Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission

    Osama S. Younes1,2,*, Abdulmohsen Alharbi1, Ali Yasseen1, Faisal Alshareef1, Faisal Albalawi1, Umar A. Albalawi1,3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2895-2920, 2023, DOI:10.32604/csse.2023.040162

    Abstract Due to their significant correlation and redundancy, conventional block cipher cryptosystems are not efficient in encrypting multimedia data. Stream ciphers based on Cellular Automata (CA) can provide a more effective solution. The CA have recently gained recognition as a robust cryptographic primitive, being used as pseudorandom number generators in hash functions, block ciphers and stream ciphers. CA have the ability to perform parallel transformations, resulting in high throughput performance. Additionally, they exhibit a natural tendency to resist fault attacks. Few stream cipher schemes based on CA have been proposed in the literature. Though, their encryption/decryption throughput is relatively low, which… More >

  • Open Access

    ARTICLE

    The Effect of Packet Loss Rate on Multipath Routing for Wireless Multimedia Sensor Network

    Mohammed Abazeed*

    Journal on Internet of Things, Vol.4, No.4, pp. 227-233, 2022, DOI:10.32604/jiot.2022.039598

    Abstract Wireless multimedia sensor networks present unique quality of service and resource management requirements that distinguish them from scalar data in traditional wireless sensor networks. These demands pose a formidable obstacle to sensor nodes, which are resource-constrained and thus require distinct strategies and techniques to operate effectively. Multipath routing improves reliability while conserving the limited resources of sensor nodes. The source node selects the most optimal paths for delivering multimedia packets based on the multi-hop routes. This paper investigates the impact of packet loss on the observed frame rate in multipath routing protocols and evaluates it mathematically at the receiver node.… More >

  • Open Access

    ARTICLE

    Pure Detail Feature Extraction Network for Visible-Infrared Re-Identification

    Jiaao Cui1, Sixian Chan1,2,*, Pan Mu1, Tinglong Tang2, Xiaolong Zhou3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2263-2277, 2023, DOI:10.32604/iasc.2023.039894

    Abstract Cross-modality pedestrian re-identification has important applications in the field of surveillance. Due to variations in posture, camera perspective, and camera modality, some salient pedestrian features are difficult to provide effective retrieval cues. Therefore, it becomes a challenge to design an effective strategy to extract more discriminative pedestrian detail. Although many effective methods for detailed feature extraction are proposed, there are still some shortcomings in filtering background and modality noise. To further purify the features, a pure detail feature extraction network (PDFENet) is proposed for VI-ReID. PDFENet includes three modules, adaptive detail mask generation module (ADMG), inter-detail interaction module (IDI) and… More >

  • Open Access

    ARTICLE

    A Time Pattern-Based Intelligent Cache Optimization Policy on Korea Advanced Research Network

    Waleed Akbar, Afaq Muhammad, Wang-Cheol Song*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3743-3759, 2023, DOI:10.32604/iasc.2023.036440

    Abstract Data is growing quickly due to a significant increase in social media applications. Today, billions of people use an enormous amount of data to access the Internet. The backbone network experiences a substantial load as a result of an increase in users. Users in the same region or company frequently ask for similar material, especially on social media platforms. The subsequent request for the same content can be satisfied from the edge if stored in proximity to the user. Applications that require relatively low latency can use Content Delivery Network (CDN) technology to meet their requirements. An edge and the… More >

  • Open Access

    ARTICLE

    Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework

    Muhammad Rizwan Rashid Rana1,*, Saif Ur Rehman1, Asif Nawaz1, Tariq Ali1, Azhar Imran2, Abdulkareem Alzahrani3, Abdullah Almuhaimeed4,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2415-2428, 2023, DOI:10.32604/csse.2023.035149

    Abstract People utilize microblogs and other social media platforms to express their thoughts and feelings regarding current events, public products and the latest affairs. People share their thoughts and feelings about various topics, including products, news, blogs, etc. In user reviews and tweets, sentiment analysis is used to discover opinions and feelings. Sentiment polarity is a term used to describe how sentiment is represented. Positive, neutral and negative are all examples of it. This area is still in its infancy and needs several critical upgrades. Slang and hidden emotions can detract from the accuracy of traditional techniques. Existing methods only evaluate… More >

  • Open Access

    ARTICLE

    An Algorithm to Reduce Compression Ratio in Multimedia Applications

    Dur-e-Jabeen1,*, Tahmina Khan2, Rumaisa Iftikhar1, Ali Akbar Siddique1, Samiya Asghar1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 539-557, 2023, DOI:10.32604/cmc.2023.032393

    Abstract In recent years, it has been evident that internet is the most effective means of transmitting information in the form of documents, photographs, or videos around the world. The purpose of an image compression method is to encode a picture with fewer bits while retaining the decompressed image’s visual quality. During transmission, this massive data necessitates a lot of channel space. In order to overcome this problem, an effective visual compression approach is required to resize this large amount of data. This work is based on lossy image compression and is offered for static color images. The quantization procedure determines… More >

  • Open Access

    REVIEW

    A Thorough Investigation on Image Forgery Detection

    Anjani Kumar Rai*, Subodh Srivastava

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1489-1528, 2023, DOI:10.32604/cmes.2022.020920

    Abstract Image forging is the alteration of a digital image to conceal some of the necessary or helpful information. It cannot be easy to distinguish the modified region from the original image in some circumstances. The demand for authenticity and the integrity of the image drive the detection of a fabricated image. There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files, including re-sampling or copy-moving. This work presents a high-level view of the forensics of digital images and their possible detection approaches. This work presents a thorough analysis of digital image forgery detection techniques with their… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics-Based Clustering Scheme for Wireless Multimedia Sensor Networks

    R. Uma Mageswari1, Sara A. Althubiti2, Fayadh Alenezi3, E. Laxmi Lydia4, Gyanendra Prasad Joshi5, Woong Cho6,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4179-4192, 2022, DOI:10.32604/cmc.2022.030806

    Abstract Traditional Wireless Sensor Networks (WSNs) comprise of cost-effective sensors that can send physical parameters of the target environment to an intended user. With the evolution of technology, multimedia sensor nodes have become the hot research topic since it can continue gathering multimedia content and scalar from the target domain. The existence of multimedia sensors, integrated with effective signal processing and multimedia source coding approaches, has led to the increased application of Wireless Multimedia Sensor Network (WMSN). This sort of network has the potential to capture, transmit, and receive multimedia content. Since energy is a major source in WMSN, novel clustering… More >

  • Open Access

    ARTICLE

    Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins

    M. Kavitha1, B. Sankara Babu2, B. Sumathy3, T. Jackulin4, N. Ramkumar5, A. Manimaran6, Ranjan Walia7, S. Neelakandan8,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1571-1586, 2022, DOI:10.32604/iasc.2022.026385

    Abstract With the advancement of communication and computing technologies, multimedia technologies involving video and image applications have become an important part of the information society and have become inextricably linked to people's daily productivity and lives. Simultaneously, there is a growing interest in super-resolution (SR) video reconstruction techniques. At the moment, the design of digital twins in video computing and video reconstruction is based on a number of difficult issues. Although there are several SR reconstruction techniques available in the literature, most of the works have not considered the spatio-temporal relationship between the video frames. With this motivation in mind, this… More >

  • Open Access

    ARTICLE

    Hyper-Parameter Optimization of Semi-Supervised GANs Based-Sine Cosine Algorithm for Multimedia Datasets

    Anas Al-Ragehi1, Said Jadid Abdulkadir1,2,*, Amgad Muneer1,2, Safwan Sadeq3, Qasem Al-Tashi4,5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2169-2186, 2022, DOI:10.32604/cmc.2022.027885

    Abstract Generative Adversarial Networks (GANs) are neural networks that allow models to learn deep representations without requiring a large amount of training data. Semi-Supervised GAN Classifiers are a recent innovation in GANs, where GANs are used to classify generated images into real and fake and multiple classes, similar to a general multi-class classifier. However, GANs have a sophisticated design that can be challenging to train. This is because obtaining the proper set of parameters for all models-generator, discriminator, and classifier is complex. As a result, training a single GAN model for different datasets may not produce satisfactory results. Therefore, this study… More >

Displaying 1-10 on page 1 of 24. Per Page