Search alternatives:
processing algorithm » processing algorithms (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
rd algorithm » _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
processing algorithm » processing algorithms (Expand Search)
deer algorithm » search algorithm (Expand Search)
elements deer » elementi per (Expand Search)
rd algorithm » _ algorithms (Expand Search)
implement » implemented (Expand Search), implementing (Expand Search)
-
1
-
2
-
3
Data Embedding in HEVC Video by Modifying the Partitioning of Coding Units
Published 2019Get full text
article -
4
Predicting Compression Modes and Split Decisions for HEVC Video Coding Using Machine Learning Techniques
Published 2017Get full text
doctoralThesis -
5
-
6
-
7
Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm
Published 2005Get full text
Get full text
Get full text
Get full text
conferenceObject -
8
Video surveillance using deep transfer learning and deep domain adaptation: Towards better generalization
Published 2023“…<p dir="ltr">Recently, developing automated video surveillance systems (VSSs) has become crucial to ensure the security and safety of the population, especially during events involving large crowds, such as sporting events. …”
-
9
An enhanced k-means clustering algorithm for pattern discovery in healthcare data
Published 2015“…The huge amounts of data generated by media sensors in health monitoring systems, by medical diagnosis that produce media (audio, video, image, and text) content, and from health service providers are too complex and voluminous to be processed and analyzed by traditional methods. …”
Get full text
Get full text
Get full text
Get full text
article -
10
-
11
Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring
Published 2024“…Addressing these challenges, this paper introduces the Deep Reinforcement Learning for Live Video Transmission (DRL-LVT) framework. This new technique optimizes video resource allocation in Device-to-Device (D2D) networks within healthcare settings. …”
-
12
FPGA-based Parallel Hardware Architecture for Real-time Object Classification
Published 2014Get full text
doctoralThesis -
13
-
14
A multi-pretraining U-Net architecture for semantic segmentation
Published 2025“…</p><h2>Other Information</h2><p dir="ltr">Published in: Signal, Image and Video Processing<br>License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1007/s11760-025-04125-4" target="_blank">https://dx.doi.org/10.1007/s11760-025-04125-4</a></p>…”
-
15
Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis
Published 2025“…Using a pose/style transfer model, we pay close attention to detail, ensuring hand movements are accurate and align with the driving video. We also apply machine learning algorithms to establish a baseline for deepfake detection on this dataset, contributing to the detection of fraudulent sign language videos.…”
Get full text
article -
16
Optical character recognition on heterogeneous SoC for HD automatic number plate recognition system
Published 2018“…</p><h2>Other Information</h2> <p> Published in: EURASIP Journal on Image and Video Processing<br> License: <a href="https://creativecommons.org/licenses/by/4.0" target="_blank">https://creativecommons.org/licenses/by/4.0</a><br>See article on publisher's website: <a href="http://dx.doi.org/10.1186/s13640-018-0298-2" target="_blank">http://dx.doi.org/10.1186/s13640-018-0298-2</a></p>…”
-
17
Secure and Anonymous Communications Over Delay Tolerant Networks
Published 2020“…Instead, our work introduces a novel message forwarding algorithm that delivers messages, from source to destination, via a random walk process. …”
-
18
Cyberbullying Detection in Arabic Text using Deep Learning
Published 2023“…Cyberbullying involves the use of communication technology and data, including messages, photographs, and videos, to undertake aggressive negative actions to harm others. …”
Get full text