Wireless networks such as MANETs present unique challenges due to their dynamic and decentralized nature. Efficient routing protocols are essential for achieving reliable and robust communication in such networks. In ...
详细信息
Requirements form the basis for defining software systems’ obligations and tasks. Testable requirements help prevent failures, reduce maintenance costs, and make it easier to perform acceptance tests. However, despit...
详细信息
作者:
Jia, ChenShi, FanCheng, Xu
School of Computer Science and Engineering Tianjin University of Technology Tianjin China
4D light field imaging captures rich spatial-angular information, providing essential geometric cues for semantic segmentation tasks. In this paper, we introduce a novel backbone network called the Light Field Extract...
详细信息
Network intrusion detection plays an important role in protecting computers and networks against unauthorized access, attacks, and malicious activities. As the effectiveness of cyber threats continues to evolve, the n...
详细信息
Creating descriptive captions for images is now becoming a mission-critical application area in the intersection of natural language processing and computer vision. This work provides the hybrid model VisionGPT2, comb...
详细信息
In the era of big data, efficiently processing and retrieving insights from unstructured data presents a critical challenge. This paper introduces a scalable leader-worker distributed data pipeline designed to handle ...
详细信息
Existing modification-based linguistic steganography methods primarily perform linguistic manipulations within a single embedding space to conceal secret information. However, these methods are stringently constrained...
详细信息
Mental health is a fundamental aspect of overall wellbeing, despite its importance, it remains one of the most neglected issues. By integrating Artificial Intelligence with Natural Language Processing into this domain...
详细信息
This paper demonstrates 2 methods, a reduced memory technique, and a reduced memory along with more security techniques in RSA (Rivest-Shamir-Adleman) and ElGamal which are both asymmetric cryptographic algorithms. Re...
详细信息
This study presents a highly efficient helmet detection system designed for real-time operation on low-cost edge devices, targeting helmet compliance monitoring in vehicular environments. A novel dataset was created b...
详细信息
暂无评论