Buscar
Mostrando ítems 1-10 de 10
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
(Computer Communications, 2020-02-01)
The Mobile networks deploy and offers a multiaspective approach for various resource allocation paradigms and the service based options in the computing segments with its implication in the Industrial Internet of Things ...
Fingerprint image enhancement and reconstruction using the orientation and phase reconstruction
(Information Sciences, 2020-08)
Fingerprints are the one of the most important means in the forensics as a means of identification of the criminals owning to the uniqueness and the distinct features in them. Fingerprint identification is considered as ...
Fast single image haze removal method for inhomogeneous environment using variable scattering coefficient
(CMES - Computer Modeling in Engineering and Sciences, 2020)
The images capture in a bad environment usually loses its fidelity and contrast. As the light rays travel towards its destination they get scattered several times due to the tiny particles of fog and pollutants in the ...
An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks
(IEEE ACCESS, 2020)
Software-Defined Network (SDN) has become a promising network architecture in current days that provide network operators more control over the network infrastructure. The controller, also called as the operating system ...
Feature based video stabilization based on boosted HAAR Cascade and representative point matching algorithm
(Image and Vision Computing, 2020-09)
The success of handheld video capturing devices has further fueled the need of improved video stabilization. The videos often contain many foreground facial features like eyes, nose etc. These foreground features can be ...
A route selection approach for variable data transmission in wireless sensor networks
(Cluster Computing, 2020-09)
The nodes in wireless sensor networks (WSNs) are responsible for communicating data which is primarily of three types viz. video, audio and text. In literature, a large number of energy aware and shortest path based route ...
A Review on Intrusion Detection Systems and Techniques
(International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2020-12)
An Intrusion Detection System (IDS) is a network security system that detects, identifies, and tracks an intruder or an invader in a network. As the usage of the internet is growing every day in our society, the IDS is ...
Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks
(Computer Communications, 2020-03)
Internet of Things (IoT) is the efficient wireless communication in the modern era, energy efficiency is the primary issue that focuses mainly on the Cognitive network. Most of the CR networks are focusing on battery ...
Tree-based convolutional neural networks for object classification in segmented satellite images
(SAGE Publications Inc., 2020)
Satellite images have a very high resolution, which make their automatic processing computationally costly, and they suffer from artifacts making their processing difficult. This paper describes a method for the effective ...
Voltage Regulation using Probabilistic and Fuzzy Controlled Dynamic Voltage Restorer for Oil and Gas Industry
(World Scientific, 2020)
In a power distribution system, faults occurring can cause voltage sag that can affect critical loads connected in the power network which can cause serious effects in the oil and gas industry. The objective of this paper ...