Direct volume rendering(DVR)is a technique that emphasizes structures of interest(SOIs)within a volume visually,while simultaneously depicting adjacent regional information,e.g.,the spatial location of a structure con...
详细信息
Direct volume rendering(DVR)is a technique that emphasizes structures of interest(SOIs)within a volume visually,while simultaneously depicting adjacent regional information,e.g.,the spatial location of a structure concerning its *** DVR,transfer function(TF)plays a key role by enabling accurate identification of SOIs interactively as well as ensuring appropriate visibility of *** generation typically involves non-intuitive trial-and-error optimization of rendering parameters,which is time-consuming and *** at mitigating this manual process have led to approaches that make use of a knowledge database consisting of pre-designed TFs by domain *** these approaches,a user navigates the knowledge database to find the most suitable pre-designed TF for their input volume to visualize the *** these approaches potentially reduce the workload to generate the TFs,they,however,require manual TF navigation of the knowledge database,as well as the likely fine tuning of the selected TF to suit the *** this work,we propose a TF design approach,CBR-TF,where we introduce a new content-based retrieval(CBR)method to automatically navigate the knowledge *** of pre-designed TFs,our knowledge database contains volumes with SOI *** an input volume,our CBR-TF approach retrieves relevant volumes(with SOI labels)from the knowledge database;the retrieved labels are then used to generate and optimize TFs of the *** approach largely reduces manual TF navigation and fine *** our CBR-TF approach,we introduce a novel volumetric image feature which includes both a local primitive intensity profile along the SOIs and regional spatial semantics available from the co-planar images to the *** the regional spatial semantics,we adopt a convolutional neural network to obtain high-level image feature *** the intensity profile,we extend the dynamic time warping technique to address subtle alignment
Social networks have become essential platforms for information exchange and free expression. However, their open nature also facilitates the spread of harmful content, such as hate speech, cyberbullying, and offensiv...
详细信息
Identifying languages written in Devanagari script, including Hindi, Marathi, Nepali, Bhojpuri, and Sanskrit, is essential in multilingual contexts but challenging due to the high overlap between these languages. To a...
详细信息
The upsurge in urbanization is depleting natural resources due to the wide usage of aggregates in construction, posing a menace to further progress. If the contemporary state persists, it becomes a threat for further ...
详细信息
Nowadays, multimedia technology is progressing everyday. It is very easy to duplicate, distribute and modify digital images with online editing software. Image security and privacy are critical aspects of the multimed...
详细信息
Nowadays, multimedia technology is progressing everyday. It is very easy to duplicate, distribute and modify digital images with online editing software. Image security and privacy are critical aspects of the multimedia revolution. Therefore, digital image watermarking offers an alternative way out for image authentication. Currently, watermarking methods are crucial for safeguarding digital images. Several traditional watermarking approaches have been developed to protect images using spatial domains and transformations. Watermarking techniques that are more traditional are less resistant to repeated attacks. Deep learning-based watermarking has recently gained traction, greatly improving the safety of visual images in a variety of common applications. This study presents a robust and secure digital watermarking method for multimedia content protection and authentication. The watermark image is first transformed using the hybrid wavelet transform, and then it is encrypted using a chaos encryption algorithm. The cover image is simultaneously subjected to neighborhood-based feature extraction. Leveraging these extracted features, a novel Adaptive Gannet Optimization algorithm (AGOA) is employed to determine the optimal embedding location. Subsequently, the watermarked image is seamlessly integrated and extracted using the hybrid Generative adversarial network-based long short-term memory (GAN-LSTM) approach within the identified optimal region. Decryption and Inverse transformation are then used to get the original watermark image. Several previous methods, such as DNN, Deep-ANN, and Deep-CNN, are used to evaluate the performance of the proposed method. This technique improves multimedia content protection and authentication by guaranteeing strong and secure watermarking. The proposed method for digital image watermarking produced a peak signal-to-noise ratio of 46.412 and a mean square error of 24.512. Therefore, the proposed method performs well in digital image wa
The Equilibrium Optimiser(EO)has been demonstrated to be one of the metaheuristic algorithms that can effectively solve global optimisation *** the paradox between exploration and exploitation operations while enhanci...
详细信息
The Equilibrium Optimiser(EO)has been demonstrated to be one of the metaheuristic algorithms that can effectively solve global optimisation *** the paradox between exploration and exploitation operations while enhancing the ability to jump out of the local optimum are two key points to be addressed in EO *** alleviate these limitations,an EO variant named adaptive elite-guided Equilibrium Optimiser(AEEO)is ***,the adaptive elite-guided search mechanism enhances the balance between exploration and *** modified mutualism phase reinforces the information interaction among particles and local optima *** cooperation of these two mechanisms boosts the overall performance of the basic *** AEEO is subjected to competitive experiments with state-of-the-art algorithms and modified algorithms on 23 classical benchmark functions and IEE CEC 2017 function test *** results demonstrate that AEEO outperforms several well-performing EO variants,DE variants,PSO variants,SSA variants,and GWO variants in terms of convergence speed and *** addition,the AEEO algorithm is used for the edge server(ES)placement problem in mobile edge computing(MEC)*** experimental results show that the author’s approach outperforms the representative approaches compared in terms of access latency and deployment cost.
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Op...
详细信息
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional *** disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network ***,this openness introduces new security challenges compared to traditional *** existing studies overlook these security requirements of the O-RAN *** gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G *** then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities *** providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
This paper presents a research study on the use of Convolutional Neural Network (CNN), ResNet50, InceptionV3, EfficientNetB0 and NASNetMobile models to efficiently detect brain tumors in order to reduce the time requi...
详细信息
With the rapid growth and adoption of web-based technologies, more and more service providers offer various services on the web. This can facilitate the organizations to develop business applications using web service...
详细信息
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina...
详细信息
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemination of information fromvehicles and their one-hop neighbor nodes,Road Side Units(RSUs),and VANET infrastructures can lead to performance degradation of VANETs in the existing hostcentric IP-based ***,Information Centric Networks(ICN)are being explored as an alternative architecture for vehicular communication to achieve robust content distribution in highly mobile,dynamic,and errorprone *** ICN-based Vehicular-IoT networks,consumer mobility is implicitly supported,but producer mobility may result in redundant data transmission and caching inefficiency at intermediate vehicular *** paper proposes an efficient redundant transmission control algorithm based on network coding to reduce data redundancy and accelerate the efficiency of information *** proposed protocol,called Network Cording Multiple Solutions Scheduling(NCMSS),is receiver-driven collaborative scheduling between requesters and information sources that uses a global parameter expectation deadline to effectively manage the transmission of encoded data packets and control the selection of information *** results for the proposed NCMSS protocol is demonstrated to analyze the performance of ICN-vehicular-IoT networks in terms of caching,data retrieval delay,and end-to-end application *** end-to-end throughput in proposed NCMSS is 22%higher(for 1024 byte data)than existing solutions whereas delay in NCMSS is reduced by 5%in comparison with existing solutions.
暂无评论