Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access

    ARTICLE

    A Time Pattern-Based Intelligent Cache Optimization Policy on Korea Advanced Research Network

    Waleed Akbar, Afaq Muhammad, Wang-Cheol Song*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3743-3759, 2023, DOI:10.32604/iasc.2023.036440

    Abstract Data is growing quickly due to a significant increase in social media applications. Today, billions of people use an enormous amount of data to access the Internet. The backbone network experiences a substantial load as a result of an increase in users. Users in the same region or company frequently ask for similar material, especially on social media platforms. The subsequent request for the same content can be satisfied from the edge if stored in proximity to the user. Applications that require relatively low latency can use Content Delivery Network (CDN) technology to meet their requirements. An edge and the… More >

  • Open Access

    ARTICLE

    Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework

    Muhammad Rizwan Rashid Rana1,*, Saif Ur Rehman1, Asif Nawaz1, Tariq Ali1, Azhar Imran2, Abdulkareem Alzahrani3, Abdullah Almuhaimeed4,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2415-2428, 2023, DOI:10.32604/csse.2023.035149

    Abstract People utilize microblogs and other social media platforms to express their thoughts and feelings regarding current events, public products and the latest affairs. People share their thoughts and feelings about various topics, including products, news, blogs, etc. In user reviews and tweets, sentiment analysis is used to discover opinions and feelings. Sentiment polarity is a term used to describe how sentiment is represented. Positive, neutral and negative are all examples of it. This area is still in its infancy and needs several critical upgrades. Slang and hidden emotions can detract from the accuracy of traditional techniques. Existing methods only evaluate… More >

  • Open Access

    ARTICLE

    An Algorithm to Reduce Compression Ratio in Multimedia Applications

    Dur-e-Jabeen1,*, Tahmina Khan2, Rumaisa Iftikhar1, Ali Akbar Siddique1, Samiya Asghar1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 539-557, 2023, DOI:10.32604/cmc.2023.032393

    Abstract In recent years, it has been evident that internet is the most effective means of transmitting information in the form of documents, photographs, or videos around the world. The purpose of an image compression method is to encode a picture with fewer bits while retaining the decompressed image’s visual quality. During transmission, this massive data necessitates a lot of channel space. In order to overcome this problem, an effective visual compression approach is required to resize this large amount of data. This work is based on lossy image compression and is offered for static color images. The quantization procedure determines… More >

  • Open Access

    REVIEW

    A Thorough Investigation on Image Forgery Detection

    Anjani Kumar Rai*, Subodh Srivastava

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1489-1528, 2023, DOI:10.32604/cmes.2022.020920

    Abstract Image forging is the alteration of a digital image to conceal some of the necessary or helpful information. It cannot be easy to distinguish the modified region from the original image in some circumstances. The demand for authenticity and the integrity of the image drive the detection of a fabricated image. There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files, including re-sampling or copy-moving. This work presents a high-level view of the forensics of digital images and their possible detection approaches. This work presents a thorough analysis of digital image forgery detection techniques with their… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics-Based Clustering Scheme for Wireless Multimedia Sensor Networks

    R. Uma Mageswari1, Sara A. Althubiti2, Fayadh Alenezi3, E. Laxmi Lydia4, Gyanendra Prasad Joshi5, Woong Cho6,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4179-4192, 2022, DOI:10.32604/cmc.2022.030806

    Abstract Traditional Wireless Sensor Networks (WSNs) comprise of cost-effective sensors that can send physical parameters of the target environment to an intended user. With the evolution of technology, multimedia sensor nodes have become the hot research topic since it can continue gathering multimedia content and scalar from the target domain. The existence of multimedia sensors, integrated with effective signal processing and multimedia source coding approaches, has led to the increased application of Wireless Multimedia Sensor Network (WMSN). This sort of network has the potential to capture, transmit, and receive multimedia content. Since energy is a major source in WMSN, novel clustering… More >

  • Open Access

    ARTICLE

    Convolutional Neural Networks Based Video Reconstruction and Computation in Digital Twins

    M. Kavitha1, B. Sankara Babu2, B. Sumathy3, T. Jackulin4, N. Ramkumar5, A. Manimaran6, Ranjan Walia7, S. Neelakandan8,*

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1571-1586, 2022, DOI:10.32604/iasc.2022.026385

    Abstract With the advancement of communication and computing technologies, multimedia technologies involving video and image applications have become an important part of the information society and have become inextricably linked to people's daily productivity and lives. Simultaneously, there is a growing interest in super-resolution (SR) video reconstruction techniques. At the moment, the design of digital twins in video computing and video reconstruction is based on a number of difficult issues. Although there are several SR reconstruction techniques available in the literature, most of the works have not considered the spatio-temporal relationship between the video frames. With this motivation in mind, this… More >

  • Open Access

    ARTICLE

    Hyper-Parameter Optimization of Semi-Supervised GANs Based-Sine Cosine Algorithm for Multimedia Datasets

    Anas Al-Ragehi1, Said Jadid Abdulkadir1,2,*, Amgad Muneer1,2, Safwan Sadeq3, Qasem Al-Tashi4,5

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 2169-2186, 2022, DOI:10.32604/cmc.2022.027885

    Abstract Generative Adversarial Networks (GANs) are neural networks that allow models to learn deep representations without requiring a large amount of training data. Semi-Supervised GAN Classifiers are a recent innovation in GANs, where GANs are used to classify generated images into real and fake and multiple classes, similar to a general multi-class classifier. However, GANs have a sophisticated design that can be challenging to train. This is because obtaining the proper set of parameters for all models-generator, discriminator, and classifier is complex. As a result, training a single GAN model for different datasets may not produce satisfactory results. Therefore, this study… More >

  • Open Access

    ARTICLE

    Privacy-Enhanced Data Deduplication Computational Intelligence Technique for Secure Healthcare Applications

    Jinsu Kim1, Sungwook Ryu2, Namje Park1,3,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 4169-4184, 2022, DOI:10.32604/cmc.2022.019277

    Abstract A significant number of cloud storage environments are already implementing deduplication technology. Due to the nature of the cloud environment, a storage server capable of accommodating large-capacity storage is required. As storage capacity increases, additional storage solutions are required. By leveraging deduplication, you can fundamentally solve the cost problem. However, deduplication poses privacy concerns due to the structure itself. In this paper, we point out the privacy infringement problem and propose a new deduplication technique to solve it. In the proposed technique, since the user’s map structure and files are not stored on the server, the file uploader list cannot… More >

  • Open Access

    ARTICLE

    Optimization Based Vector Quantization for Data Reduction in Multimedia Applications

    V. R. Kavitha1,*, M. Kanchana2, B. Gobinathan3, K. R. Sekar4, Mohamed Yacin Sikkandar5

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 853-867, 2022, DOI:10.32604/iasc.2022.018358

    Abstract Data reduction and image compression techniques in the present Internet and multi-media age are essential to increase image and video capacity in relation to memory, network bandwidth use and safe data transmission. There have been a different variety of image compression models with varying compression efficiency and visual image quality in the literature. Vector Quantization (VQ) is a widely used image coding scheme that is designed to generate an efficient coding book that includes a list of codewords that assign the input image vector to a minimum distance of Euclidea. The Linde–Buzo–Gray (LBG) historically widely used model produces the local… More >

  • Open Access

    ARTICLE

    Efficient Three-Dimensional Video Cybersecurity Framework Based on Double Random Phase Encoding

    Osama S. Faragallah1,*, Walid El-Shafai2, Ashraf Afifi1, Ibrahim Elashry3, Mohammed A. AlZain1, Jehad F. Al-Amri1, Ben Soh4, Heba M. El-Hoseny5, Hala S. El-Sayed6, Fathi E.Abd El-Samie2

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 353-367, 2021, DOI:10.32604/iasc.2021.016865

    Abstract With the rapidly increasing rate of using online services and social media websites, cybercriminals have caused a great deterioration in the network security with enormous undesired consequences. Encryption techniques may be utilized to achieve data robustness and security in digital multimedia communication systems. From this perspective, this paper presents an optical ciphering framework using Double Random Phase Encoding (DRPE) for efficient and secure transmission of Three-Dimensional Videos (3DVs). Firstly, in the DRPE-based 3DV cybersecurity framework proposed in the paper, an optical emitter converts each frame of the transmitted 3DV into an optical signal. Then, the DRPE technique encrypts the obtained… More >

Displaying 1-10 on page 1 of 21. Per Page  

Share Link