De-noising the image using DBST-LCM-CLAHE: A deep learning approach

S Chakraverti, P Agarwal, HS Pattanayak… - Multimedia Tools and …, 2024 - Springer
Histogram Equalization (HE) is one of the most popular techniques for this purpose. Most
histogram equalization techniques, including Contrast Limited Adaptive Histogram …

[PDF][PDF] A review on image forgery & its detection procedure

V Dhir - International Journal of Advanced Research in …, 2017 - academia.edu
Image forgery and image forgery detection are emerging as well as hot research topics
among researchers. In today's digital scenario, images are playing a major role in our day to …

Application of binary PSO for public cloud resources allocation system of video on demand (VoD) services

B Aygun, BG Kilic, N Arici, A Cosar, B Tuncsiper - Applied Soft Computing, 2021 - Elsevier
Video streaming, whether on demand or live, has become one of the most popular internet
applications. However, financial investments required for it is a severe problem since it …

[PDF][PDF] Real-time QoS Monitoring for Big Data Analytics in Mobile Environment: an Overview

F **ao, P Wainaina - scholar.archive.org
The laid out service delivery techniques, models and the aforesaid monitoring strategies for
the mobile environment big data acts as the platform for the big resources application. The …

A LITERATURE REVIEW: EFFICIENT VM MIGRATION TECHNIQUES FOR ENERGY REDUCTION IN CLOUD COMPUTING.

N Singh, V Dhir - International Journal of Advanced …, 2017 - search.ebscohost.com
Broadly speaking cloud computing is nothing but a highly'utilitarian'orientation of IT services
where users benefited on a pay-as-you go basis. In a way it enables the hosting of pervasive …