This manuscript addresses the challenges in developing Automotive High-Performance Computing (HPC) systems for Future Smart Cars and Unmanned Mobile Vehicles (UMVs). We introduce a novel Unified Machine Vision (UMV) n...
详细信息
Network attacks, such as botnets stealing sensitive data, constitute a critical concern for administrators in the Internet area. Such attacks can be prevented using a network access control (NAC) scheme. However, exis...
详细信息
In an infrastructure cloud environment, task scheduling should focus on optimizing execution time and saving energy. The data center consumes a large amount of energy during the execution of the task. Energy-saving te...
详细信息
Hyperspectral imaging has transformed remote sensing by offering detailed spectral data for monitoring environmental changes, like urban development and terrestrial cover variations. However, existing change detection...
详细信息
The pandemic of COVID-19 has affected worldwide population. Diagnosing this highly contagious disease at an initial stage is essential for controlling its spread. In this paper, we propose a novel lightweight hybrid c...
详细信息
Identical video sharing across social networks results in redundant video data traffic, consuming additional bandwidth, storage resources, and data usage. A novel method is proposed to optimise redundant video-sharing...
详细信息
Background: Pneumonia is one of the leading causes of death and disability due to respiratory infections. The key to successful treatment of pneumonia is in its early diagnosis and correct classification. PneumoniaNet...
详细信息
Cybersecurity is crucial in today’s interconnected world, as digital technologies are increasingly used in various sectors. The risk of cyberattacks targeting financial, military, and political systems has increased ...
详细信息
Wireless networks such as MANETs present unique challenges due to their dynamic and decentralized nature. Efficient routing protocols are essential for achieving reliable and robust communication in such networks. In ...
详细信息
In digital identification technologies, fingerprint-based biometric systems are extensively utilized for authentication. Fingerprint authentication systems usually store the original minutiae points as user templates ...
详细信息
暂无评论