Jimson Mathew
YOU?
Author Swipe
View article: Retrieval augmented generation for smart calorie estimation in complex food scenarios
Retrieval augmented generation for smart calorie estimation in complex food scenarios Open
View article: Detecting Algorithmically Generated Domains Using Entropy and Lexical Features
Detecting Algorithmically Generated Domains Using Entropy and Lexical Features Open
View article: Combination Treatment with NCX 4040 and Napabucasin Triggers Enhanced Oxidative Stress, STAT3 Inhibition and Plausible Immunogenic Activation in Metastatic Prostate Cancer Cells
Combination Treatment with NCX 4040 and Napabucasin Triggers Enhanced Oxidative Stress, STAT3 Inhibition and Plausible Immunogenic Activation in Metastatic Prostate Cancer Cells Open
Prostate cancer (PCa) remains a significant health concern, ranking as the second most common cancer after lung cancer, despite recent advances in diagnostics and therapeutics. Due to its heterogeneous nature, diverse etiology, and the lim…
View article: A Unified Deep-Domain Adaptation Framework: Advancing Feature Separability and Local Alignment
A Unified Deep-Domain Adaptation Framework: Advancing Feature Separability and Local Alignment Open
In transfer learning, domain adaptation is one of the key research areas. For domain adaptation, domain shift is a known problem when the data distribution of the source domain, from which the training data is fetched, and the target domai…
View article: Augmenting Common Spatial Patterns to deep learning networks for improved alcoholism detection using EEG signals
Augmenting Common Spatial Patterns to deep learning networks for improved alcoholism detection using EEG signals Open
One of the main risk factors for numerous health problems is excessive drinking. Alcoholism is a severe disorder that can affect a person's thinking and cognitive abilities. Early detection of alcoholism can help the subject regain control…
View article: Leveraging stacking machine learning models and optimization for improved cyberattack detection
Leveraging stacking machine learning models and optimization for improved cyberattack detection Open
View article: Nystromformer based cross-modality transformer for visible-infrared person re-identification
Nystromformer based cross-modality transformer for visible-infrared person re-identification Open
Person re-identification (Re-ID) aims to accurately match individuals across different camera views, a critical task for surveillance and security applications, often under varying conditions such as illumination, pose, and background. Tra…
View article: Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies
Securing IIoT systems against DDoS attacks with adaptive moving target defense strategies Open
View article: A hybrid bit-efficientnet framework for automated detection of skin cancer and monkeypox using dermatoscopic images
A hybrid bit-efficientnet framework for automated detection of skin cancer and monkeypox using dermatoscopic images Open
View article: Deep Learning Based Supermarket Product Detection and Recognition with Rectified Images
Deep Learning Based Supermarket Product Detection and Recognition with Rectified Images Open
View article: Advancing explainable MOOC recommendation systems: a morphological operations-based framework on partially ordered neutrosophic fuzzy hypergraphs
Advancing explainable MOOC recommendation systems: a morphological operations-based framework on partially ordered neutrosophic fuzzy hypergraphs Open
Recommendation systems constitute an integral part of nearly all digital service platforms. However, the common assumption in most recommendation systems in the literature is that similar users will be interested in similar items. This ass…
View article: Detecting Deepfakes: Exploring the Frontiers of Deepfake Generation and Detection
Detecting Deepfakes: Exploring the Frontiers of Deepfake Generation and Detection Open
View article: Swin Transformer with Part-Level Tokenization for Occluded Person Re-identification
Swin Transformer with Part-Level Tokenization for Occluded Person Re-identification Open
To determine whether a pedestrian of interest has been captured by another distinct camera across a network of non-overlapping cameras, or by the same camera at a distinct time, is known as the problem of person re-identification and is co…
View article: Artificial Intelligence in Next-Generation Networking: Energy Efficiency Optimization in IoT Networks Using Hybrid LEACH Protocol
Artificial Intelligence in Next-Generation Networking: Energy Efficiency Optimization in IoT Networks Using Hybrid LEACH Protocol Open
The convergence of the Internet of Things (IoT) and Artificial Intelligence (AI) is significantly transforming the landscape of future networking. The Internet of Things (IoT) is a technological paradigm that encompasses embedded systems, …
View article: Grocer-Help
Grocer-Help Open
The dataset is made considering the variation in distance and contains 2460 Close-Shot(Images taken up-close) images, 2604 Long-Shot(images taken from a considerable distance) images and 2307 online images. Out of the total 7371 images a t…
View article: Grocer-Help
Grocer-Help Open
The dataset is made considering the variation in distance and contains 2460 Close-Shot(Images taken up-close) images, 2604 Long-Shot(images taken from a considerable distance) images and 2307 online images. Out of the total 7371 images a t…
View article: Multilevel Multimodal Framework for Automatic Collateral Scoring in Brain Stroke
Multilevel Multimodal Framework for Automatic Collateral Scoring in Brain Stroke Open
In patients with ischemic brain stroke, collateral circulation plays a crucial role in selecting patients suitable for endovascular therapy. The presence of well-developed collaterals improves the patient’s chances of recovery. In clinical…
View article: Enhancing Lung Acoustic Signals Classification With Eigenvectors-Based and Traditional Augmentation Methods
Enhancing Lung Acoustic Signals Classification With Eigenvectors-Based and Traditional Augmentation Methods Open
Identifying lung sound signal patterns is essential for detecting and monitoring respiratory diseases. Existing approaches for analyzing respiratory sounds need domain specialists. Therefore, an accurate and automated lung sound classifica…
View article: Differential Pre-Emphasis of Ofdm Signal for Led-Nonlinearity Mitigation in Uowc System
Differential Pre-Emphasis of Ofdm Signal for Led-Nonlinearity Mitigation in Uowc System Open
View article: Fourier-Wavelet Driven Swin Transformer for Inclement Weather Person Re-Identification
Fourier-Wavelet Driven Swin Transformer for Inclement Weather Person Re-Identification Open
View article: Unified Domain Adaptation with Discriminative Features and Similarity Preservation
Unified Domain Adaptation with Discriminative Features and Similarity Preservation Open
In visual domain adaptation, the goal is to train effective classifiers for the target domain by leveraging information from the source domain. In unsupervised domain adaptation, the source domain provides labeled data while the target dom…
View article: A Framework for Modeling, Analyzing, and Decision-Making in Disease Spread Dynamics and Medicine/Vaccine Distribution
A Framework for Modeling, Analyzing, and Decision-Making in Disease Spread Dynamics and Medicine/Vaccine Distribution Open
The challenges posed by epidemics and pandemics are immense, especially if the causes are novel. This article introduces a versatile open-source simulation framework designed to model intricate dynamics of infectious diseases across divers…
View article: AutoML accurately predicts endovascular mechanical thrombectomy in acute large vessel ischemic stroke
AutoML accurately predicts endovascular mechanical thrombectomy in acute large vessel ischemic stroke Open
Background and objective Automated machine learning or autoML has been widely deployed in various industries. However, their adoption in healthcare, especially in clinical settings is constrained due to a lack of clear understanding and ex…
View article: FDT: A python toolkit for fake image and video detection
FDT: A python toolkit for fake image and video detection Open
With the advent of readily and widely available applications based on deepfake technology, several cybersecurity threats are on the rise. It is challenging to curtail these threats as deepfakes are realistic and very difficult to detect. T…
View article: Blue-Led Based Electrical and Optical Pd-Noma Systems: Characterization in Underwater Environment
Blue-Led Based Electrical and Optical Pd-Noma Systems: Characterization in Underwater Environment Open
View article: RDAOT: Robust Unsupervised Deep Sub-Domain Adaptation Through Optimal Transport for Image Classification
RDAOT: Robust Unsupervised Deep Sub-Domain Adaptation Through Optimal Transport for Image Classification Open
In traditional machine learning, the training and testing data are assumed to come from the same independent and identical distributions. This assumption, however, does not hold up in real-world applications, as differences between the tra…
View article: Design and analysis of DDoS mitigating network architecture
Design and analysis of DDoS mitigating network architecture Open
View article: Fusion of Wavelet Decomposition and N-BEATS for improved Stock Market Forecasting
Fusion of Wavelet Decomposition and N-BEATS for improved Stock Market Forecasting Open
Stock market forecasting is one of the most exciting areas of time series forecasting both for the industry and academia. Stock market is a complex, non-linear and non-stationary system with many governing factors and noise. Some of these …
View article: Inter-spatial heat vulnerability assessment of Summer - 2018 over Madhya Pradesh using discomfort (wind and thermal) indices
Inter-spatial heat vulnerability assessment of Summer - 2018 over Madhya Pradesh using discomfort (wind and thermal) indices Open
Due to global warming, increase in air temperature is a growing concern at present. This rise in temperature may cause mild to severe thermal discomfort and heat related hazards mostly for the people who are engaged in outside activities t…
View article: Subdomain Adaptation Via Correlation Alignment with Entropy Minimization for Unsupervised Domain Adaptation
Subdomain Adaptation Via Correlation Alignment with Entropy Minimization for Unsupervised Domain Adaptation Open