Images Quality in the Transportation industry is considered the most significant term and gains more attention among the higher authorities and researchers. Therefore, the accuracy level of the image has been evaluate...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of evidence than still photographs. Due to the tremendous growth of video editing tools, anyone with access to advanced editing software and a modern Smartphone can easily do digital video manipulations and fake it. As a result, to utilize video content as proof in court, it is necessary to evaluate and determine whether it is original or modified. To check the integrity and validity of video recordings, digital forgery detection techniques are required. The objective of the study is to present a systematic review of techniques for detecting forgery in digital videos. We conducted a systematic literature review (SLR) in this study to present a detailed review of the initial and recent research efforts in Digital video forgery detection, summarizing 260 relevant papers from 2000 to 2023 that have presented a variety of techniques. For analysis, we have presented our references in three different ways: according to the type of forgery detected, according to the type of model or technique used and according to the feature used for forgery detection. We look through the several datasets that are cited in articles and determine their applicable domain. Then, we looked at the numerous measuring metrics employed by different research papers and compared the effectiveness of deep and non-deep models in each category of forgery that was found. Finally, research gaps concerning passive video forgery detection are classified and highlighted. A comparison between our survey and other existing survey articles has been presented in the paper. Researchers who wish to work on video forgery detection will get assistance to determine what kind of efforts in forgery detection work is still required. This survey will also help to select techniques and features based on their
People who lead hectic lives daily suffer from a variety of illnesses, including diabetes, high blood pressure, hypertension, etc. For someone to survive, they must become aware of these illnesses promptly. The Intern...
详细信息
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation ...
详细信息
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation delay, node displacement, and environmental errors, making network maintenance difficult. The objective of this study is to address the energy efficiency and performance issues in IOUT networks by proposing and evaluating an energy-efficient routing protocol called Efficient Cost Wakeup Routing Protocol (ECWRP). To achieve the objective, the study focuses on two key parameters: Cost and Duty Cycle. The Duty Cycle parameter helps in reducing undesirable impacts during underwater communications, improving the performance of the routing protocol. The Cost parameter is utilized to select the most efficient path for data transmission, considering factors such as transmitting power levels. The protocol is applied to a multi-hop mesh-based network. The proposed ECWRP routing protocol is assessed through simulations, demonstrating its superior efficiency compared to the Ride algorithm. By eliminating unnecessary handshaking and optimizing route selection, ECWRP significantly enhances energy efficiency and overall performance within the IoUT network. The study's findings on the enhanced energy efficiency and performance improvements achieved by the ECWRP protocol hold promising implications for the design and optimization of IoUT networks, paving the way for more sustainable and effective communication systems in underwater environments. In conclusion, the study demonstrates the effectiveness of the Efficient Cost Wakeup Routing Protocol (ECWRP) in enhancing energy efficiency and performance in multi-hop mesh-based IoUT networks. The protocol's utilization of the Duty Cycle parameter reduces undesirable impacts, while the Cost parameter enables the selection of the most efficient path for data transmission. The results confirm the superiority of the ECWRP protoc
Developing manufacturing methods for flexible electronics will enable and improve the large-scale production of flexible, spatially efficient, and lightweight devices. Laser sintering is a promising postprocessing met...
详细信息
Healthcare systems face challenges in certifying the security, accuracy, and efficiency of data gathered from IoT sensors. Confidentiality and integrity of patient information are paramount while optimizing resource u...
详细信息
Feature selection makes significant role in movement classification based on electromyography data. It is assumed that the efficiency of movement classification is improved when time-domain (TD) and frequency-time-dom...
详细信息
Graph databases have gained widespread adoption in various industries and have been utilized in a range of applications,including financial risk assessment,commodity recommendation,and data lineage *** the principles ...
详细信息
Graph databases have gained widespread adoption in various industries and have been utilized in a range of applications,including financial risk assessment,commodity recommendation,and data lineage *** the principles and design of these databases have been the subject of some investigation,there remains a lack of comprehensive examination of aspects such as storage layout,query language,and *** present study focuses on the design and implementation of graph storage layout,with a particular emphasis on tree-structured key-value *** also examine different design choices in the graph storage layer and present our findings through the development of TuGraph,a highly efficient single-machine graph database that significantly outperforms well-known Graph DataBase Management System(GDBMS).Additionally,TuGraph demonstrates superior performance in the Linked Data Benchmark Council(LDBC)Social Network Benchmark(SNB)interactive benchmark.
In this paper, we discuss work-in-progress research on tangible interfaces for interactive cutaway visualizations in Mixed Reality (MR). We present an approach that allows users to flexibly and intuitively define virt...
详细信息
Background: Pneumonia is one of the leading causes of death and disability due to respiratory infections. The key to successful treatment of pneumonia is in its early diagnosis and correct classification. PneumoniaNet...
详细信息
暂无评论