Buscar
Mostrando ítems 1-10 de 13
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
(Computer Communications, 2020-02-01)
The Mobile networks deploy and offers a multiaspective approach for various resource allocation paradigms and the service based options in the computing segments with its implication in the Industrial Internet of Things ...
Fingerprint image enhancement and reconstruction using the orientation and phase reconstruction
(Information Sciences, 2020-08)
Fingerprints are the one of the most important means in the forensics as a means of identification of the criminals owning to the uniqueness and the distinct features in them. Fingerprint identification is considered as ...
Fast single image haze removal method for inhomogeneous environment using variable scattering coefficient
(CMES - Computer Modeling in Engineering and Sciences, 2020)
The images capture in a bad environment usually loses its fidelity and contrast. As the light rays travel towards its destination they get scattered several times due to the tiny particles of fog and pollutants in the ...
An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks
(IEEE ACCESS, 2020)
Software-Defined Network (SDN) has become a promising network architecture in current days that provide network operators more control over the network infrastructure. The controller, also called as the operating system ...
Feature based video stabilization based on boosted HAAR Cascade and representative point matching algorithm
(Image and Vision Computing, 2020-09)
The success of handheld video capturing devices has further fueled the need of improved video stabilization. The videos often contain many foreground facial features like eyes, nose etc. These foreground features can be ...
A route selection approach for variable data transmission in wireless sensor networks
(Cluster Computing, 2020-09)
The nodes in wireless sensor networks (WSNs) are responsible for communicating data which is primarily of three types viz. video, audio and text. In literature, a large number of energy aware and shortest path based route ...
A Review on Intrusion Detection Systems and Techniques
(International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2020-12)
An Intrusion Detection System (IDS) is a network security system that detects, identifies, and tracks an intruder or an invader in a network. As the usage of the internet is growing every day in our society, the IDS is ...
Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks
(Computer Communications, 2020-03)
Internet of Things (IoT) is the efficient wireless communication in the modern era, energy efficiency is the primary issue that focuses mainly on the Cognitive network. Most of the CR networks are focusing on battery ...
Fast hybrid-MixNet for security and privacy using NTRU algorithm
(Journal of information security and applications, 2021)
Security and privacy-enhancing techniques are developed in order to provide strong protection over the Internet. These techniques aim to enable the users to keep their identities secret during the communication when they ...
Real-time image enhancement for an automatic automobile accident detection through CCTV using deep learning
(Springer Science and Business Media Deutschland GmbH, 2021)
Almost all of the automatic accident detection (AAD) system suffers from the tradeoff between computational overhead and detection accuracy. Recent advances in detection and classification methodologies have shown phenomenal ...