Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Evaluating Public Sentiments during Uttarakhand Flood: An Artificial Intelligence Techniques

    Stephen Afrifa1,2,*, Vijayakumar Varadarajan3,4,5,*, Peter Appiahene2, Tao Zhang1, Richmond Afrifa6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1625-1639, 2024, DOI:10.32604/csse.2024.055084 - 22 November 2024

    Abstract Users of social networks can readily express their thoughts on websites like Twitter (now X), Facebook, and Instagram. The volume of textual data flowing from users has greatly increased with the advent of social media in comparison to traditional media. For instance, using natural language processing (NLP) methods, social media can be leveraged to obtain crucial information on the present situation during disasters. In this work, tweets on the Uttarakhand flash flood are analyzed using a hybrid NLP model. This investigation employed sentiment analysis (SA) to determine the people’s expressed negative attitudes regarding the disaster. More >

  • Open Access

    REVIEW

    Robust Deep Image Watermarking: A Survey

    Yuanjing Luo, Xichen Tan, Zhiping Cai*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 133-160, 2024, DOI:10.32604/cmc.2024.055150 - 15 October 2024

    Abstract In the era of internet proliferation, safeguarding digital media copyright and integrity, especially for images, is imperative. Digital watermarking stands out as a pivotal solution for image security. With the advent of deep learning, watermarking has seen significant advancements. Our review focuses on the innovative deep watermarking approaches that employ neural networks to identify robust embedding spaces, resilient to various attacks. These methods, characterized by a streamlined encoder-decoder architecture, have shown enhanced performance through the incorporation of novel training modules. This article offers an in-depth analysis of deep watermarking’s core technologies, current status, and prospective More >

  • Open Access

    ARTICLE

    CeTrivium: A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission

    Osama S. Younes1,2,*, Abdulmohsen Alharbi1, Ali Yasseen1, Faisal Alshareef1, Faisal Albalawi1, Umar A. Albalawi1,3

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2895-2920, 2023, DOI:10.32604/csse.2023.040162 - 09 November 2023

    Abstract Due to their significant correlation and redundancy, conventional block cipher cryptosystems are not efficient in encrypting multimedia data. Stream ciphers based on Cellular Automata (CA) can provide a more effective solution. The CA have recently gained recognition as a robust cryptographic primitive, being used as pseudorandom number generators in hash functions, block ciphers and stream ciphers. CA have the ability to perform parallel transformations, resulting in high throughput performance. Additionally, they exhibit a natural tendency to resist fault attacks. Few stream cipher schemes based on CA have been proposed in the literature. Though, their encryption/decryption… More >

  • Open Access

    ARTICLE

    Pure Detail Feature Extraction Network for Visible-Infrared Re-Identification

    Jiaao Cui1, Sixian Chan1,2,*, Pan Mu1, Tinglong Tang2, Xiaolong Zhou3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2263-2277, 2023, DOI:10.32604/iasc.2023.039894 - 21 June 2023

    Abstract Cross-modality pedestrian re-identification has important applications in the field of surveillance. Due to variations in posture, camera perspective, and camera modality, some salient pedestrian features are difficult to provide effective retrieval cues. Therefore, it becomes a challenge to design an effective strategy to extract more discriminative pedestrian detail. Although many effective methods for detailed feature extraction are proposed, there are still some shortcomings in filtering background and modality noise. To further purify the features, a pure detail feature extraction network (PDFENet) is proposed for VI-ReID. PDFENet includes three modules, adaptive detail mask generation module (ADMG),… More >

  • Open Access

    ARTICLE

    A Time Pattern-Based Intelligent Cache Optimization Policy on Korea Advanced Research Network

    Waleed Akbar, Afaq Muhammad, Wang-Cheol Song*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3743-3759, 2023, DOI:10.32604/iasc.2023.036440 - 15 March 2023

    Abstract Data is growing quickly due to a significant increase in social media applications. Today, billions of people use an enormous amount of data to access the Internet. The backbone network experiences a substantial load as a result of an increase in users. Users in the same region or company frequently ask for similar material, especially on social media platforms. The subsequent request for the same content can be satisfied from the edge if stored in proximity to the user. Applications that require relatively low latency can use Content Delivery Network (CDN) technology to meet their… More >

  • Open Access

    ARTICLE

    Aspect-Based Sentiment Analysis for Social Multimedia: A Hybrid Computational Framework

    Muhammad Rizwan Rashid Rana1,*, Saif Ur Rehman1, Asif Nawaz1, Tariq Ali1, Azhar Imran2, Abdulkareem Alzahrani3, Abdullah Almuhaimeed4,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2415-2428, 2023, DOI:10.32604/csse.2023.035149 - 09 February 2023

    Abstract People utilize microblogs and other social media platforms to express their thoughts and feelings regarding current events, public products and the latest affairs. People share their thoughts and feelings about various topics, including products, news, blogs, etc. In user reviews and tweets, sentiment analysis is used to discover opinions and feelings. Sentiment polarity is a term used to describe how sentiment is represented. Positive, neutral and negative are all examples of it. This area is still in its infancy and needs several critical upgrades. Slang and hidden emotions can detract from the accuracy of traditional… More >

  • Open Access

    ARTICLE

    An Algorithm to Reduce Compression Ratio in Multimedia Applications

    Dur-e-Jabeen1,*, Tahmina Khan2, Rumaisa Iftikhar1, Ali Akbar Siddique1, Samiya Asghar1

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 539-557, 2023, DOI:10.32604/cmc.2023.032393 - 22 September 2022

    Abstract In recent years, it has been evident that internet is the most effective means of transmitting information in the form of documents, photographs, or videos around the world. The purpose of an image compression method is to encode a picture with fewer bits while retaining the decompressed image’s visual quality. During transmission, this massive data necessitates a lot of channel space. In order to overcome this problem, an effective visual compression approach is required to resize this large amount of data. This work is based on lossy image compression and is offered for static color… More >

  • Open Access

    REVIEW

    A Thorough Investigation on Image Forgery Detection

    Anjani Kumar Rai*, Subodh Srivastava

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1489-1528, 2023, DOI:10.32604/cmes.2022.020920 - 20 September 2022

    Abstract Image forging is the alteration of a digital image to conceal some of the necessary or helpful information. It cannot be easy to distinguish the modified region from the original image in some circumstances. The demand for authenticity and the integrity of the image drive the detection of a fabricated image. There have been cases of ownership infringements or fraudulent actions by counterfeiting multimedia files, including re-sampling or copy-moving. This work presents a high-level view of the forensics of digital images and their possible detection approaches. This work presents a thorough analysis of digital image More >

  • Open Access

    ARTICLE

    The Effect of Packet Loss Rate on Multipath Routing for Wireless Multimedia Sensor Network

    Mohammed Abazeed*

    Journal on Internet of Things, Vol.4, No.4, pp. 227-233, 2022, DOI:10.32604/jiot.2022.039598 - 18 July 2023

    Abstract Wireless multimedia sensor networks present unique quality of service and resource management requirements that distinguish them from scalar data in traditional wireless sensor networks. These demands pose a formidable obstacle to sensor nodes, which are resource-constrained and thus require distinct strategies and techniques to operate effectively. Multipath routing improves reliability while conserving the limited resources of sensor nodes. The source node selects the most optimal paths for delivering multimedia packets based on the multi-hop routes. This paper investigates the impact of packet loss on the observed frame rate in multipath routing protocols and evaluates it More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics-Based Clustering Scheme for Wireless Multimedia Sensor Networks

    R. Uma Mageswari1, Sara A. Althubiti2, Fayadh Alenezi3, E. Laxmi Lydia4, Gyanendra Prasad Joshi5, Woong Cho6,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4179-4192, 2022, DOI:10.32604/cmc.2022.030806 - 16 June 2022

    Abstract Traditional Wireless Sensor Networks (WSNs) comprise of cost-effective sensors that can send physical parameters of the target environment to an intended user. With the evolution of technology, multimedia sensor nodes have become the hot research topic since it can continue gathering multimedia content and scalar from the target domain. The existence of multimedia sensors, integrated with effective signal processing and multimedia source coding approaches, has led to the increased application of Wireless Multimedia Sensor Network (WMSN). This sort of network has the potential to capture, transmit, and receive multimedia content. Since energy is a major… More >

Displaying 1-10 on page 1 of 26. Per Page