Indices
This title is listed in the following:
Close
Reference Hub
This research has been cited in:
Conference
Image Encryption Method Using Differential Expansion Technique, AES and RSA Algorithm2019 Fifth International Conference on Image Information Processing (ICIIP)10.1109/ICIIP47207.2019.8985665 Article
Towards generic platform to support collaboration in freight transportation: taxonomic literature and design based on Zachman frameworkEnterprise Information Systems10.1080/17517575.2021.1939894 Article
Optimal Hybrid Feature Extraction with Deep Learning for COVID-19 ClassificationsComputers, Materials & Continua10.32604/cmc.2022.024312 Article
A novel interactive assembly teaching aid using multi-template augmented realityMultimedia Tools and Applications10.1007/s11042-020-09584-0 Article
Conference
A Novel Approach for Excavating Communication Using Taxonomy and Outline Mechanisms2021 Sixth International Conference on Image Information Processing (ICIIP)10.1109/ICIIP53038.2021.9702588 Article
Article
A Comprehensive Review on Smart Health Care: Applications, Paradigms, and Challenges with Case StudiesContrast Media & Molecular Imaging10.1155/2022/4822235 Conference
Implementation of SCADA Through Cloud Based IoT Devices - Initial Design Steps2019 Fifth International Conference on Image Information Processing (ICIIP)10.1109/ICIIP47207.2019.8985966 Article
Object detection in real time based on improved single shot multi-box detector algorithmEURASIP Journal on Wireless Communications and Networking10.1186/s13638-020-01826-x Conference
An Image Sentence Generation Based on Deep Neural Network Using RCNN-LSTM Model2021 Sixth International Conference on Image Information Processing (ICIIP)10.1109/ICIIP53038.2021.9702685 Article
SmHeSol (IoT-BC): Smart Healthcare Solution for Future Development Using Speech Feature Extraction Integration Approach with IoT and BlockchainJournal of Sensors10.1155/2022/3862860 Article
Object Detection System Based on Convolution Neural Networks Using Single Shot Multi-Box DetectorProcedia Computer Science10.1016/j.procs.2020.04.283 Article
Extraction of Cerebral Hemorrhage on CT Images Using Level Set Algorithm and Otsu ThresholdJournal of Medical Imaging and Health Informatics10.1166/jmihi.2021.3659 Conference
Object Recognition and Detection in Remote Sensing Images: A Comparative Study2020 International Conference on Artificial Intelligence and Signal Processing (AISP)10.1109/AISP48273.2020.9073614 Article
Conference
A Novel Data Security Framework in Distributed Cloud Computing2019 Fifth International Conference on Image Information Processing (ICIIP)10.1109/ICIIP47207.2019.8985941 Article
Deep action: A mobile action recognition framework using edge offloadingPeer-to-Peer Networking and Applications10.1007/s12083-021-01232-0 Article
An ensemble multi-scale residual attention network (EMRA-net) for image DehazingMultimedia Tools and Applications10.1007/s11042-021-11081-x Conference
An End-to-End Security Framework for Smart Healthcare Information Sharing against Botnet-based Cyber-Attacks2021 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE50685.2021.9427753 Article
An efficient hidden marking approach for forensic and contents verification of digital imagesMultimedia Tools and Applications10.1007/s11042-022-14104-3 Article
Feature Extraction Approach for Speaker Verification to Support Healthcare System Using Blockchain Security for Data PrivacyComputational and Mathematical Methods in Medicine10.1155/2022/8717263 Article
Prediction Accuracy Model Aiming to Improve Prediction Accuracy in Congenital Heart Anomaly Detection using Hybrid Feature Selection with Modified Particle Swarm Optimization ApproachJournal of Physics: Conference Series10.1088/1742-6596/1998/1/012011 Article
Design and Implementation of Balance Ability Assessment Training System for Special Children Based on Education Cloud IntegrationJournal of Environmental and Public Health10.1155/2022/9359367 Chapter
Resume Screening Using Natural Language Processing and Machine Learning: A Systematic ReviewMachine Learning and Information Processing10.1007/978-981-33-4859-2_21 Article
Medical Sports Data Privacy Protection Method Based on Legal Risk ControlJournal of Healthcare Engineering10.1155/2021/6630429 Conference
Article
CoySvM-(GeD): Coyote Optimization-Based Support Vector Machine Classifier for Cancer Classification Using Gene Expression DataJournal of Sensors10.1155/2022/6716937 Article
Perlindungan Kekayaan Intelektual Batik Tradisional Dalam Perspektif HukumIndonesian Journal of Law and Justice10.47134/ijlj.v1i1.2009 Conference
Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment2021 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCWorkshops50388.2021.9473886 Article
Smart Healthcare: Disease Prediction Using the Cuckoo-Enabled Deep Classifier in IoT FrameworkScientific Programming10.1155/2022/2090681 Article
Conference
Chapter
Evolution of Big Data in Medical Imaging Modalities to Extract Features Using Region Growing Segmentation, GLCM, and Discrete Wavelet TransformAdvancements in Security and Privacy Initiatives for Multimedia Images10.4018/978-1-7998-2795-5.ch003 Chapter
A Machine Learning Approach for Anomaly Detection to Secure Smart Grid SystemsAdvancements in Security and Privacy Initiatives for Multimedia Images10.4018/978-1-7998-2795-5.ch008 Chapter
Building an IPFS and Blockchain-Based Decentralized Storage Model for Medical ImagingAdvancements in Security and Privacy Initiatives for Multimedia Images10.4018/978-1-7998-2795-5.ch002 Chapter
Evolution of Big Data in Medical Imaging Modalities to Extract Features Using Region Growing Segmentation, GLCM, and Discrete Wavelet TransformResearch Anthology on Big Data Analytics, Architectures, and Applications10.4018/978-1-6684-3662-2.ch022 Chapter
Chapter
A Machine Learning Approach for Anomaly Detection to Secure Smart Grid SystemsResearch Anthology on Smart Grid and Microgrid Development10.4018/978-1-6684-3666-0.ch040 Chapter
Video Classification Using 3D Convolutional Neural NetworkAdvancements in Security and Privacy Initiatives for Multimedia Images10.4018/978-1-7998-2795-5.ch001 Article
A Comparative Study of Generative Adversarial Networks for Text-to-Image SynthesisInternational Journal of Software Science and Computational Intelligence10.4018/IJSSCI.300364 Chapter
Building an IPFS and Blockchain-Based Decentralized Storage Model for Medical ImagingResearch Anthology on Improving Medical Imaging Techniques for Analysis and Intervention10.4018/978-1-6684-7544-7.ch046 Article
Trust Evaluation and Prioritization of Cloud Service Providers Using MADM MethodsInternational Journal of Cloud Applications and Computing10.4018/IJCAC.305219
Close Top Results From Your Most Recent Search
Close