The exponential growth of the number of devices connected to the Internet and the use of IoT applications increases the amount of data exchange over public channels in low-cost and low-power embedded systems. Images a...
详细信息
In this study, two deep learning models for automatic tattoo detection were analyzed;a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer lea...
详细信息
Fully homomorphic encryption (FHE) is a useful cryptographic primitive. It makes a third-party manipulate data in the ciphertext space and therefore is a key technology for privacy-preserving outsourcing services. The...
详细信息
Data selection can be used in conjunction with adaptive filtering algorithms to avoid unnecessary weight updating and thereby reduce computational overhead. This paper presents a novel correntropy-based data selection...
详细信息
Virtualization technologies are still growing bigger and faster. Despite the greatness of its advancement, the costume industry is still very accessible when it comes to real trials. Off-the-shelf stuff are inadequate...
详细信息
The pace of development in the world of 5G communication systems has proven to be much more demanding than previous generations, with 5G-Advanced seemingly around the corner [1]. Extensive research is already underway...
The pace of development in the world of 5G communication systems has proven to be much more demanding than previous generations, with 5G-Advanced seemingly around the corner [1]. Extensive research is already underway to structure the next generation of wireless systems(i.e. 6G), which may potentially enable an unprecedented level of human–machine interaction [2].
Under-resourced automatic speech recognition (ASR) has become an active field of research and has experienced significant progress during the past decade. However, the performance of under-resourced ASR trained by exi...
详细信息
In this paper, we exploit caches on intermediate nodes for QoE enhancement of multi-view video and audio transmission over ICN/CCN by controlling the content request start timing of consumers. We assume the selected s...
This paper investigates the effect of bitrate control methods on QoE of multi-view video and audio streaming with MPEG-DASH. We adopt three bitrate control methods for conventional single-view video streaming to the M...
详细信息
This paper evaluates the QoE of video and audio transmission over a full-duplex wireless LAN with interference traffic through a computer simulation and a subjective experiment. We employ a simulation environment with...
详细信息
暂无评论