2022
DOI: 10.1007/978-3-030-98015-3_21
|View full text |Cite
|
Sign up to set email alerts
|

Content-Based Feature Extraction and Extreme Learning Machine for Optimizing File Cluster Types Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…Current studies in Digital Forensic investigation concentrate on developing file recovery methods with missing fragments or file system information. Mainly, these studies focus on the JPEG image format that is widely used due to its sophisticated characteristics [2][3][4][5][6][7]. Subsequently, various JPEG image recovery methods are proposed in the literature.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Current studies in Digital Forensic investigation concentrate on developing file recovery methods with missing fragments or file system information. Mainly, these studies focus on the JPEG image format that is widely used due to its sophisticated characteristics [2][3][4][5][6][7]. Subsequently, various JPEG image recovery methods are proposed in the literature.…”
Section: Related Workmentioning
confidence: 99%
“…Joint Photographic Experts Group (JPEG) is a standard image file format having less structured contents that make its retrieval "recovery" possible when the file system is missing [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. Since many JPEG images on laptops, tablets, and smartphones are valuable, these images are exposed accidentally to deformation or deletion for many reasons, including storage damage and deliberate destruction.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this routing strategy, among multiple cars, one node in the cluster area is designated as a cluster (CH); the other nodes, referred to as cluster members, are handled by the other nodes. A border node is located between the communication ranges of two or more clusters [25].…”
Section: Clustering-based Routingmentioning
confidence: 99%