Theoretical studies on the representation power of GNNs have been centered around understanding the equivalence of GNNs, using WL-Tests for detecting graph isomorphism. In this paper, we argue that such equivalence ig...
详细信息
作者:
Nayomi, B.Deena DivyaJyothsna, V.
Department of Computer Science and Engineering Andhra Pradesh Tirupati India
Department of Data Science Andhra Pradesh Tirupati India
This research study presents a thorough examination of the application of deep learning techniques in enhancing node position prediction within Vehicular Ad-Hoc Networks (VANETs). As VANETs become increasingly integra...
详细信息
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P...
详细信息
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of PC,portable networks,spine of internet,networks engaged with advanced mechanics,power generation interconnection,bio-informatics and substance intensify *** number that can be entirely calculated by a graph is called graph *** mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty ***,no trustworthy evaluation has been embraced to pick,how much these invariants are associated with a network graph or subatomic *** this paper,it will discuss three unmistakable varieties of bridge networks with an incredible capacity of assumption in the field of computerscience,chemistry,physics,drug industry,informatics and arithmetic in setting with physical and manufactured developments and networks,since Contraharmonic-quadratic invariants(CQIs)are recently presented and have different figure qualities for different varieties of bridge graphs or *** study settled the geography of bridge graphs/networks of three novel sorts with two kinds of CQI and Quadratic-Contraharmonic Indices(QCIs).The deduced results can be used for the modeling of the above-mentioned networks.
Deep learning technology has extensive application in the classification and recognition of medical images. However, several challenges persist in such application, such as the need for acquiring large-scale labeled d...
详细信息
Innovative technology solutions have been developed in response to the growing need for effective and customized client contact on e-commerce platforms. This work introduces an intelligent chatbot system that uses mac...
详细信息
Food Infestation Detection is more important for food safety and health concerns. It is a challenging task to separate the grains into infested or non-infested. It is found that in the existing system, there is no eff...
详细信息
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t...
详细信息
An enormous amount of applications that are available for download permits users to enhance the functionality of the devices with brand-new features, which is a significant factor in the growing popularity of smartpho...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of...
详细信息
In the last decade, due to the widespread and inexpensive availability of digital video cameras, digital videos (DV) are employed for security purposes daily, and they are generally regarded as a more credible form of evidence than still photographs. Due to the tremendous growth of video editing tools, anyone with access to advanced editing software and a modern Smartphone can easily do digital video manipulations and fake it. As a result, to utilize video content as proof in court, it is necessary to evaluate and determine whether it is original or modified. To check the integrity and validity of video recordings, digital forgery detection techniques are required. The objective of the study is to present a systematic review of techniques for detecting forgery in digital videos. We conducted a systematic literature review (SLR) in this study to present a detailed review of the initial and recent research efforts in Digital video forgery detection, summarizing 260 relevant papers from 2000 to 2023 that have presented a variety of techniques. For analysis, we have presented our references in three different ways: according to the type of forgery detected, according to the type of model or technique used and according to the feature used for forgery detection. We look through the several datasets that are cited in articles and determine their applicable domain. Then, we looked at the numerous measuring metrics employed by different research papers and compared the effectiveness of deep and non-deep models in each category of forgery that was found. Finally, research gaps concerning passive video forgery detection are classified and highlighted. A comparison between our survey and other existing survey articles has been presented in the paper. Researchers who wish to work on video forgery detection will get assistance to determine what kind of efforts in forgery detection work is still required. This survey will also help to select techniques and features based on their
The surging popularity of online movie databases has created a challenge for viewers: choosing a film from a massive library can be overwhelming. In this paper, it proposes to design a new hybrid movie recommendation ...
详细信息
暂无评论