Topic Review
2D DWT and PCA with Canonical Huffman Encoding
For image compression, discrete wavelet transform (DWT) and CHC with principal component analysis (PCA) were combined. The lossy method was introduced by using PCA, followed by DWT and CHC to enhance compression efficiency. By using DWT and CHC instead of PCA alone, the reconstructed images have a better peak signal-to-noise ratio (PSNR).
  • 352
  • 16 Oct 2023
Topic Review
World-Wide Federated Content-Based Medical Image Retrieval
Content-based medical image retrieval (CBMIR) is a recent DL-based methodology that allows pathologists a quick and precise search in previously diagnosed and treated cases. In CBMIR, image features, such as texture, shape, color, and intensity, are extracted from the query and data set; then, a similarity measure is applied to compare the query features with the features of the database.
  • 352
  • 17 Oct 2023
Topic Review
Supervised Log Anomaly with Probabilistic Polynomial Approximation
Audit and Security log collection and storage are essential for organizations worldwide to recognize security breaches and are required by law. Logs often contain sensitive information about an organization or its customers. Fully Homomorphic Encryption (FHE) allows calculations on encrypted data, thus very useful for privacy-preserving tasks such as log anomaly detection. While word-wise FHE schemes can perform additions and multiplications, complex functions such as Sigmoid need to be approximated. Probabilistic polynomial approximations using a Perceptron can achieve lower errors compared to deterministic approaches like Taylor and Chebyshev.
  • 352
  • 23 Oct 2023
Topic Review
Secure Internet of Things Based on Blockchain
Centralized networks can host ubiquitous interconnected objects using Internet of Things (IoT) platforms. It is also possible to implement decentralized peer-to-peer solutions using blockchain technology, including smart homes and connected cars. However, both models have limitations regarding their ability to provide privacy and security due to limited resources, centralization management, and scalability, cost, and response time. The diversity of IoT network nodes is expected to result in different throughputs and rates. Centralized networks control and improve the performance of a large number of IoT devices. However, centralizing systems suffer from a number of disadvantages. A third party often has to manipulate the data collected by central cloud storage, which could lead to information leaks that could compromise the user’s privacy.
  • 352
  • 27 Oct 2023
Topic Review
Intrusion Detection in IoT Networks
The Internet of Things (IoT) is expanding rapidly and is becoming increasingly crucial to how we live our daily lives. Internet protocol addresses can be used by IoT nodes for connecting to the Internet. Intrusion detection systems (IDSs) guarantee both the security posture and defense against intrusions of IoT devices.
  • 352
  • 03 Nov 2023
Topic Review
Construction and Analysis of Distributed Processes
CADP (Construction and Analysis of Distributed Processes) is a toolbox for the design of communication protocols and distributed systems. CADP is developed by the CONVECS team (formerly by the VASY team) at INRIA Rhone-Alpes and connected to various complementary tools. CADP is maintained, regularly improved, and used in many industrial projects. 
  • 351
  • 09 Oct 2022
Topic Review
Time Control
A time control is a mechanism in the tournament play of almost all two-player board games so that each round of the match can finish in a timely way and the tournament can proceed. Time controls are typically enforced by means of a game clock, where the times below are given per player. Time pressure (or time trouble or Zeitnot) is the situation of having very little time on a player's clock to complete their remaining moves.
  • 351
  • 21 Oct 2022
Topic Review
Multilevel Distribution Propagation Network
A two-stage framework based on the distribution propagation graph neural network (DPGN) called the multilevel distribution propagation network (MDPN). An instance-segmentation-based object localization (ISOL) module and a graph-based multilevel distribution propagation (GMDP) module are both included in the MDPN.
  • 351
  • 05 Jul 2023
Topic Review
Remote Health Monitoring Systems for Elderly People
Remote Health Monitoring Systems (RHMS) can manage, maintain and monitor a specific set of tasks efficiently over a network with reduced cost and errors. Wearable sensors and vision-based sensors detect any abnormalities in the patient’s behavior, prompting immediate action from caregivers or doctors, enabling them to take necessary measures promptly to address the situation.
  • 351
  • 16 Aug 2023
Topic Review
Point Cloud Semantic Segmentation
For autonomous vehicles driving in off-road environments, it is crucial to have a sensitive environmental perception ability. However, semantic segmentation in complex scenes remains a challenging task. Most current methods for off-road environments often have the problems of single scene and low accuracy. 
  • 351
  • 20 Oct 2023
  • Page
  • of
  • 366
ScholarVision Creations