Performance of Landsat 8 OLI and Sentinel 2 MSI Images Based on MNF Versus PCA Algorithms and Convolution Operators for Automatic Lithuanian Coastline Extraction
Faced with the increasing coastalization in the world, exposing populations and activities to coastal risks, decision-support tools based on the extraction of coastlines by remote sensing have become essential for measuring coastal dynamics and ...
Task-Level Checkpointing and Localized Recovery to Tolerate Permanent Node Failures for Nested Fork–Join Programs in Clusters
Exascale supercomputers consist of millions of processing units, and this number is still growing. Therefore, hardware failures, such as permanent node failures, become increasingly frequent. They can be tolerated with system-level Checkpoint/...
Simulation of Routing Protocols for IoV in Real-Time Mobility Model Environment
Vehicles in the Internet of Vehicles (IoV) create wireless connections and participate in routing by sending information to other nodes. Despite the recent growth in popularity of IoV, there are still issues with high vehicle speeds, frequent ...
pCTFusion: Point Convolution-Transformer Fusion with Semantic Aware Loss for Outdoor LiDAR Point Cloud Segmentation
LiDAR-generated point clouds are crucial for perceiving outdoor environments. The segmentation of point clouds is also essential for many applications. Previous research has focused on using self-attention and convolution (local attention) ...
Hand and Sign Recognition of Alphabets Using YOLOv5
Deaf and dumb people who apply visual gestures can communicate using hand, facial, and body gestures. As there are various ways to communicate but still no compatible technologies available that aid in linking this group of deaf and dumb people to ...
Enhancing DeepFake Detection: Leveraging Mesonet for Video Fraud Identification
Machine learning, while a successful and helpful approach, has now sparked widespread public concern because of the availability of technology that can modify photographs and videos of individuals in ways that the average person cannot distinguish ...
Performance Optimization Across the Edge-Cloud Continuum: A Multi-agent Rollout Approach for Cloud-Native Application Workload Placement
- Polyzois Soumplis,
- Georgios Kontos,
- Panagiotis Kokkinos,
- Aristotelis Kretsis,
- Sergio Barrachina-Muñoz,
- Rasoul Nikbakht,
- Jorge Baranda,
- Miquel Payaró,
- Josep Mangues-Bafalluy,
- Emmanuel Varvarigos
The advancements in virtualization technologies and distributed computing infrastructures have sparked the development of cloud-native applications. This is grounded in the breakdown of a monolithic application into smaller, loosely connected ...
A Literature Perspective of Stakeholder’s Perceptions of Value and Risks for the Secondary Use of Health Data
Scientific literature and practice emphasize the need for a robust framework for the secondary use of health data, one that unifies standards and practices. Multiple reviews focus on secondary health data use from the technological perspective; ...
An Approach for Detection of Botnet Based on Machine Learning Classifier
Botnet detection systems are becoming more important as cybercriminals continue to develop new Bot tools and applications. A botnet is a collection of several compromised systems that are connected to the central controller called a botmaster. ...
Reliable and Accurate Implicit Neural Representation of Multiple Swept Volumes with Application to Safe Human–Robot Interaction
In automated production using collaborative robots in a manufacturing cell, a crucial aspect is to avoid collisions to ensure the safety of workers and robots in human–robot interaction. One approach for detecting collisions is using the swept ...
A Bilateral Assessment of Human Activities Using PSO-Based Feature Optimization and Non-linear Multi-task Least Squares Twin Support Vector Machine
Human activity recognition (HAR) is an essential part of many applications, including smart surroundings, sports analysis, and healthcare. Accurately categorizing intricate actions from sensor data is still difficult, though. This method infers an ...
PRAY So You Don’t Become Prey
Cloned journals refer to deceptive or counterfeit scientific journals that imitate genuine scholarly publications with the intention of misleading scholars into submitting their works. As early career researchers fall prey to these hijacked/cloned ...
Almost: Predicting “Natural" Sequences
Neural networks have remained the most widely used learning method for at least one decade thanks to their flexibility in solving problems across fields. Neural networks attempt to model learning based on a simplified version of neural activity in ...
A Bagging Ensemble Algorithm for Seasonal Time Series Forecasting
Time series forecasting is valuable in making informed decisions, improving financial planning, optimizing resource allocation, increasing operational efficiency, and managing risks. But accurate forecasting is difficult, as the amount of out-of-...
Speech Processing for Arabic Speech Synthesis Based on Concatenation Rules
The purpose of this paper is to address speech processing phase of the synthesizer to produce artificial speech from the phonetic sequences generated at the linguistic processing level. This research work is part of the realization of a text-to-...
Drone Swarm Coordination Using Reinforcement Learning for Efficient Wildfires Fighting
Natural events, such as wildfires, pose a serious threat to the human population and cause significant environmental and economic damage. As climate change increases the frequency and intensity of extreme natural events, more efficient solutions ...
Comparative Assessment of Image Super-Resolution Techniques for Spatial Downscaling of Gridded Rainfall Data
With an increasing focus on improving localized understanding of weather and climate phenomena and the computation cost involved in high-resolution modelling, spatial downscaling of data has proven to be a viable alternative method to obtain high-...
A Lightweight Authentication Protocol for a Blockchain-Based Off-Chain Medical Data Access in Multi-server Environment
Presently, blockchain technology is used to secure electronic medical records (EMR) and an arrangement of multiple servers as off-chain storage is advocated to minimize the storage overhead of the medical blockchain. Therefore, an authorized ...
Lung Cancer Detection by Employing Adaptive Entropy Variance Dropout Regularization in GAN Variants
Lung cancer segmentation using Deep Neural Networks (DNN) needs accurate pixel-level data which is typically small. This leads to overfitting issue, and in order to alleviate this, the research is been done on L2 regularization and dropout ...
Implementation of DEWMA-Based Hello Packet for AODV to Improve the Performance of FANET with 3D-GMM
Flying ad hoc network (FANET) is a new sub-domain of MANET (mobile ad hoc network) with moving nodes known as automated flying vehicles (AFV) carrying various loads such as cameras and sensors to work in a limited geographical area. AFV are ...
Frame Selection Using Spatiotemporal Dynamics and Key Features as Input Pre-processing for Video Super-Resolution Models
This paper presents a novel approach to video super-resolution (VSR) by focusing on the selection of input frames, a process critical to VSR. VSR methods typically rely on deep learning techniques, those that are able to learn features from a ...