|
|
|
Ludek Bures, Petra Sychova, Petr Maca, Radek Roub and Stepan Marval
An appropriate digital elevation model (DEM) is required for purposes of hydrodynamic modelling of floods. Such a DEM describes a river?s bathymetry (bed topography) as well as its surrounding area. Extensive measurements for creating accurate bathymetry...
ver más
|
|
|
|
|
|
|
Dominik Warch, Patrick Stellbauer and Pascal Neis
In the digital transformation era, video media libraries? untapped potential is immense, restricted primarily by their non-machine-readable nature and basic search functionalities limited to standard metadata. This study presents a novel multimodal metho...
ver más
|
|
|
|
|
|
|
Frank Ato Ghansah and David John Edwards
Despite the growing rich and fragmented literature focusing on quality assurance (QA) and Industry 4.0, the implementation of associated individual digital technologies has not been fully evaluated and synthesised to achieve adequate QA in the constructi...
ver más
|
|
|
|
|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|
|
|
|
Paolo Ciancarini, Raffaele Giancarlo and Gennaro Grimaudo
Digital transformation in the public sector provides digital services to the citizens aiming at increasing their quality of life, as well as the transparency and accountability of a public administration. Since adaptation to the citizens changing needs i...
ver más
|
|
|
|
|
|
|
Georgios Karantaidis and Constantine Kotropoulos
The detection of computer-generated (CG) multimedia content has become of utmost importance due to the advances in digital image processing and computer graphics. Realistic CG images could be used for fraudulent purposes due to the deceiving recognition ...
ver más
|
|
|
|
|
|
|
Nikola Andelic and Sandi Baressi ?egota
This investigation underscores the paramount imperative of discerning network intrusions as a pivotal measure to fortify digital systems and shield sensitive data from unauthorized access, manipulation, and potential compromise. The principal aim of this...
ver más
|
|
|
|
|
|
|
Abderrazzaq Kharroubi, Zouhair Ballouch, Rafika Hajji, Anass Yarroudh and Roland Billen
Railway scene understanding is crucial for various applications, including autonomous trains, digital twining, and infrastructure change monitoring. However, the development of the latter is constrained by the lack of annotated datasets and limitations o...
ver más
|
|
|
|
|
|
|
Todd Dobbs, Abdullah-Al-Raihan Nayeem, Isaac Cho and Zbigniew Ras
Art authentication is the process of identifying the artist who created a piece of artwork and is manifested through events of provenance, such as art gallery exhibitions and financial transactions. Art authentication has visual influence via the uniquen...
ver más
|
|
|
|
|
|
|
William Hurst, Orestis Spyrou, Bedir Tekinerdogan and Caspar Krampe
As a concept that is somewhat under emergence, the notion of the Metaverse varies across different academic articles. Yet there is a shared view on the benefits to its ongoing implementation, particularly for digital art, where the technology can provide...
ver más
|
|
|
|