|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|
|
|
|
Marco Vernier, Manuela Farinosi, Alberto Foresti and Gian Luca Foresti
In recent years, social platforms have become integrated in a variety of economic, political and cultural domains. Social media have become the primary outlets for many citizens to consume news and information, and, at the same time, to produce and share...
ver más
|
|
|
|
|
|
|
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re...
ver más
|
|
|
|
|
|
|
Andreea Bianca Popescu, Ioana Antonia Taca, Anamaria Vizitiu, Cosmin Ioan Nita, Constantin Suciu, Lucian Mihai Itu and Alexandru Scafa-Udriste
Deep learning (DL)-based algorithms have demonstrated remarkable results in potentially improving the performance and the efficiency of healthcare applications. Since the data typically needs to leave the healthcare facility for performing model training...
ver más
|
|
|
|
|
|
|
Nikita Andriyanov
The article is devoted to the study of convolutional neural network inference in the task of image processing under the influence of visual attacks. Attacks of four different types were considered: simple, involving the addition of white Gaussian noise, ...
ver más
|
|
|
|
|
|
|
Rui Qiao, Guili Xu, Yuehua Cheng, Zhengyu Ye and Jinlong Huang
Large-scale unmanned aerial vehicle (UAV) formations are vulnerable to disintegration under electromagnetic interference and fire attacks. To address this issue, this work proposed a distributed formation method of UAVs based on the 3 × 3 magic square an...
ver más
|
|
|
|
|
|
|
Guillermo A. Martínez-Mascorro, José R. Abreu-Pederzini, José C. Ortiz-Bayliss, Angel Garcia-Collantes and Hugo Terashima-Marín
Crime generates significant losses, both human and economic. Every year, billions of dollars are lost due to attacks, crimes, and scams. Surveillance video camera networks generate vast amounts of data, and the surveillance staff cannot process all the i...
ver más
|
|
|
|
|
|
|
Biprodip Pal, Debashis Gupta, Md. Rashed-Al-Mahfuz, Salem A. Alyami and Mohammad Ali Moni
The COVID-19 pandemic requires the rapid isolation of infected patients. Thus, high-sensitivity radiology images could be a key technique to diagnose patients besides the polymerase chain reaction approach. Deep learning algorithms are proposed in severa...
ver más
|
|
|
|
|
|
|
Jung-Hong Hong and Yi-Tin Shi
The installation of closed-circuit television monitors (CCTV) has rapidly increased in number ever since the 11 September attacks. With the advantages of direct visual inspection, CCTV systems are widely used on various occasions that require instantaneo...
ver más
|
|
|
|
|
|
|
Maxime Verbist, Jorge M. Branco and Lina Nunes
Among biological agents, insect attacks may cause severe degradation of timber structures in the service life of buildings which leads to lower mechanical performance and, thus, maintenance problems over time. Additionally, compression perpendicular to t...
ver más
|
|
|
|