Nowadays, the integration of blockchain and edge computing has become important in computer science due to the significant advantages it can bring to a range of real-world applications. By combining the strengths of b...
详细信息
With the application of modern informationtechnology in volleyball games, the "rules" of volleyball games can now be reflected as quickly and accurately. Statistics have gradually become an important source...
详细信息
Facial recognition technology is widely used for biometric authentication, but it struggles with accurately identifying individuals from low-resolution images. This study introduces a new method for improving low-reso...
详细信息
ISBN:
(纸本)9798350366396;9798350366389
Facial recognition technology is widely used for biometric authentication, but it struggles with accurately identifying individuals from low-resolution images. This study introduces a new method for improving low-resolution face recognition (LRFR) by combining super-resolution techniques and multilinear subspace learning. Using deep learning VGG-face models for feature extraction and super-resolution methods like SRGAN and SRResNet, the proposed method, Multilinear Side-information-based Discriminant Analysis (MSIDA), enhances facial image quality. This methodology integrates image enhancement, deep feature extraction, and tensor subspace learning for precise face verification. The effectiveness of this approach is demonstrated on the Labeled Faces in the Wild (LFW) dataset, showing superior performance in face verification tasks compared to existing methods. MSIDA achieves accuracies of 91.03%, 91.60%, and 92.57% for different resolutions. This advancement represents significant progress in image processing and pattern recognition, particularly for scenarios involving low-resolution images.
This research paper delves into the exploration of students' viewpoints regarding the integration of smart computing for optimizing both online and offline education. Employing a meticulous approach, a comprehensi...
详细信息
The rapid advancement of smart home technologies necessitates efficient human activity recognition (HAR) systems while ensuring user privacy. This research presents a novel architecture that integrates deep learning a...
详细信息
The proceedings contain 51 papers. The topics discussed include: design and implementation of a virtual lab platform for academic teaching: experience in the development and use of a new platform for the digitization ...
ISBN:
(纸本)9789898704627
The proceedings contain 51 papers. The topics discussed include: design and implementation of a virtual lab platform for academic teaching: experience in the development and use of a new platform for the digitization of laboratories for computer science classes;cross organizational workflow management system with controlled disclosure and no-redundant data on blockchain;a guide for selecting research design in information systems studies;new approach for the generalized maximum flow problem;an ant colony optimization algorithm for the steel plate yard inbound problem with pre-process time and relocation;web-based light simulation and interactive configuration for lighting systems;semantic frameworks for selected domain-specific languages in our research: methodologies and applications;and tuning intersection-over-union algorithm to enhance tracking performances.
Radio Frequency Identification (RFID) is a technology that is used widely for mobile payment, the security is the main issue of the usage of this technology. The aim of this study is to identify the key factors influe...
详细信息
Cloud computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries;It introduced the notion of 'pay as you use' and revolutionized devel...
详细信息
ISBN:
(纸本)9783031686382;9783031686399
Cloud computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries;It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24 x 7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security;in this article, the algorithms and their security measures are discussed.
Cloud computing is a technology that impacted the performance of modern markets and businesses. Because of this, cloud computing has become more significant to humans with its virtualization and distributed computing....
详细信息
With the rapid development of deep learning technology, deep counterfeiting has also quietly ascended to the stage of history, and voice disguise fraud, as a new type of attack means, has laid a huge hidden danger for...
详细信息
暂无评论