Search Results - "Jitendra, V"
-
1
Object detection using YOLO: challenges, architectural successors, datasets and applications
Published in Multimedia tools and applications (01-03-2023)“…Object detection is one of the predominant and challenging problems in computer vision. Over the decade, with the expeditious evolution of deep learning,…”
Get full text
Journal Article -
2
Sentiment analysis in textual, visual and multimodal inputs using recurrent neural networks
Published in Multimedia tools and applications (01-02-2021)“…Social networking platforms have witnessed tremendous growth of textual, visual, audio, and mix-mode contents for expressing the views or opinions. Henceforth,…”
Get full text
Journal Article -
3
Skin cancer detection using ensemble of machine learning and deep learning techniques
Published in Multimedia tools and applications (01-07-2023)“…Skin cancer is one of the most common forms of cancer, which makes it pertinent to be able to diagnose it accurately. In particular, melanoma is a form of skin…”
Get full text
Journal Article -
4
Sentiment analysis: a convolutional neural networks perspective
Published in Multimedia tools and applications (01-12-2022)“…With the dramatic growth of various social media platforms, sentiment analysis (SA) of and emotion detection (ED) in various social network posts, blogs, and…”
Get full text
Journal Article -
5
Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques
Published in Multimedia tools and applications (2024)“…Localization in wireless sensor networks (WSN) is gaining a lot of attention from the researchers due to its usefulness in many real-time applications to…”
Get full text
Journal Article -
6
Retraction Note: Model hybridization & learning rate annealing for skin cancer detection
Published in Multimedia tools and applications (01-11-2024)Get full text
Journal Article -
7
Improvised detection of deepfakes from visual inputs using light weight deep ensemble model
Published in Multimedia tools and applications (01-05-2023)“…Due to rapid growing image and video technology, synthesis or fabrication of the visual contents by replacing the original person of the visual contents with…”
Get full text
Journal Article -
8
Deep learning based authentication schemes for smart devices in different modalities: progress, challenges, performance, datasets and future directions
Published in Multimedia tools and applications (08-02-2024)“…Deep learning algorithms have shown exceptional effectiveness in a wide range of supervised and unsupervised learning tasks in a variety of fields, including…”
Get full text
Journal Article -
9
-
10
BrC-MCDLM: breast Cancer detection using Multi-Channel deep learning model
Published in Multimedia tools and applications (01-09-2021)“…Breast cancer (BrC) is a lethal form of cancer which causes numerous deaths in women across the world. Generally, mammograms and histopathology biopsy images…”
Get full text
Journal Article -
11
Personalized federated learning for the detection of COVID-19
Published in Multimedia tools and applications (01-03-2024)“…Federated learning (FL) plays a crucial role in COVID-19 detection by enabling collaborative analysis of medical data while preserving privacy. In this…”
Get full text
Journal Article -
12
RETRACTED ARTICLE: Model hybridization & learning rate annealing for skin cancer detection
Published in Multimedia tools and applications (2023)“…The increasing frequency of skin tumour across the globe and their timely diagnosis is one of the most promising research directions in the healthcare domain…”
Get full text
Journal Article -
13
Improvised light weight deep CNN based U-Net for the semantic segmentation of lungs from chest X-rays
Published in Results in engineering (01-03-2023)“…In the last decade, neural networks and deep learning techniques are widely adopted in the field of medical imaging for image detection, classification, and…”
Get full text
Journal Article -
14
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
Published in The Journal of supercomputing (01-08-2021)“…Telecare medicine information system (TMIS) is recognized as an important tool for improving the quality and protection of healthcare services. In addition to…”
Get full text
Journal Article -
15
Congenital Sub-Mitral Aneurysm: Anesthetics and Surgical Management
Published in Annals of cardiac anaesthesia (01-01-2024)“…A sub-mitral left ventricular aneurysm is a rare condition. It is a congenital outpouching of the left ventricular wall, invariably occurring adjacent to the…”
Get full text
Journal Article -
16
Growth Hormone-Secreting Pituitary Adenoma and Difficult Airway: Awake Oral Fiberoptic Intubation Approach
Published in Curēus (Palo Alto, CA) (31-07-2024)“…Acromegaly is a rare endocrine disorder characterized by excessive growth hormone (GH) secretion, usually due to a pituitary adenoma. This condition leads to…”
Get full text
Journal Article -
17
GA-MPG: efficient genetic algorithm for improvised mobile plan generation
Published in Journal of ambient intelligence and humanized computing (01-10-2024)“…In the competitive landscape of the telecom sector, a Communication Service Provider's success hinges on its ability to offer compelling mobile plans tailored…”
Get full text
Journal Article -
18
A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems
Published in IEEE systems journal (01-12-2021)“…Internet of Things (IoT) consists of numerous smart devices for sharing sensed data through the availability of online services. Direct communication by smart…”
Get full text
Journal Article -
19
Where do capabilities come from and how do they matter? A study in the software services industry
Published in Strategic management journal (01-01-2005)“…Recent years have witnessed a surge of interest in the notion of capabilities as an important source of competitive advantage. This recognition has, in turn,…”
Get full text
Journal Article -
20
A Provably Secure Lightweight Subtree-Based Short Signature Scheme With Fuzzy User Data Sharing for Human-Centered IoT
Published in IEEE access (2021)“…Internet of Things (IoT) is made up of various smart devices for the exchange of sensed data through online services. Direct contact with people through smart…”
Get full text
Journal Article