2020
DOI: 10.1016/j.compeleceng.2019.106524
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-enabled deep semantic video-to-video summarization for IoT devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…Squeezing assessments and reproductions demonstrate that this plan vessel effectively opposes not well-arranged uses and diminishes inactivity from the agreement strategy by coordinating with it with old strategies [25]. A concentrate by [26] on the different strides of key casing extraction from a video upheld by secure and progressed transportation to clients offered a technique that permits clients to audit a video dependent on people and items as boundaries. Cryptographic hashes are utilized, including blockchain, and hashes are made from diminished video hinders, communicated, and moved through blockchain by [26].…”
Section: Review Of Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Squeezing assessments and reproductions demonstrate that this plan vessel effectively opposes not well-arranged uses and diminishes inactivity from the agreement strategy by coordinating with it with old strategies [25]. A concentrate by [26] on the different strides of key casing extraction from a video upheld by secure and progressed transportation to clients offered a technique that permits clients to audit a video dependent on people and items as boundaries. Cryptographic hashes are utilized, including blockchain, and hashes are made from diminished video hinders, communicated, and moved through blockchain by [26].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…A concentrate by [26] on the different strides of key casing extraction from a video upheld by secure and progressed transportation to clients offered a technique that permits clients to audit a video dependent on people and items as boundaries. Cryptographic hashes are utilized, including blockchain, and hashes are made from diminished video hinders, communicated, and moved through blockchain by [26]. Additionally, [27] presented a Blockchain-based calculated construction that gives an explanation for primary squares of the actual Web concerning the substitution of significant worth and genuine resources in strategic frameworks and decentralized control structures [27].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…We rank all tasks onto a virtual machine based on the HEFT [28] heuristic, and added weight to all nodes and edges according to their priorities. All data offloaded to the system follow a first-come-first-served policy and are sequenced by all proposed methods as shown in Figure 3.…”
Section: Task Sequencingmentioning
confidence: 99%
“…Existing heuristics such as Baseline1 and Baseline2 were compared with proposed DAPWTS-based algorithm components. We evaluated the overall performance and validity based on the above components, and all RPD results proposed that the algorithm is better when compared to all benchmark heuristics bound by deadline constraints [28,30,31].…”
Section: Task-sequencing Rulesmentioning
confidence: 99%
“…Supervised approaches summarize the video by taking humancreated summaries as references [1], [15], [17], [35], [43]. Earlier works design various score functions to measure the properties that a summary is expected to hold.…”
Section: Supervised Video Summarizationmentioning
confidence: 99%