بحث بسيط
السجلات المعروضة 41 -- 50 من 86
LFR face dataset:Left-Front-Right dataset for pose-invariant face recognition in the wild
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this work, a new multitask convolutional neural network (CNN) is proposed aiming for the recognition of face under pose variations. Furthermore, the combination of pose estimation for each corresponding pose in a separate ...
A Scene-to-Speech Mobile based Application: Multiple Trained Models Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The concept of Scene-to-Speech (STS) is to recognize elements in a captured image or a video clip to speak loudly an informative textual content that describes the scene. The contemporary progression in convolution neural ...
IoT malicious traffic identification using wrapper-based feature selection mechanisms
(
Elsevier Ltd
, 2020 , Article)
Machine Learning (ML) plays very significant role in the Internet of Things (IoT) cybersecurity for malicious and intrusion traffic identification. In other words, ML algorithms are widely applied for IoT traffic identification ...
Face Recognition in the Scrambled Domain via Salience-Aware Ensembles of Many Kernels
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
With the rapid development of Internet-of-Things (IoT), face scrambling has been proposed for privacy protection during IoT-targeted image/video distribution. Consequently, in these IoT applications, biometric verification ...
Answer Acquisition for Knowledge Base Question Answering Systems Based on Dynamic Memory Network
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, with the rapid growth of Artificial Intelligence (AI) and the Internet of Things (IoT), the question answering systems for human-machine interaction based on deep learning have become a research hotspot ...
Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
National security is a top priority to mitigate intrusions and criminal acts. Governments require robust national surveillance system that can cover all geographical areas, including the blind spots that may hold violence ...
Communication-efficient hierarchical federated learning for IoT heterogeneous systems with imbalanced data
(
Elsevier B.V.
, 2022 , Article)
Federated Learning (FL) is a distributed learning methodology that allows multiple nodes to cooperatively train a deep learning model, without the need to share their local data. It is a promising solution for telemonitoring ...
Performance Evaluation of Hyperledger Fabric
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Blockchain is a distributed secure ledger that eliminates the need for centralized authority to store data. The centralized approach has several limitations as it is a Single-Point-of-Failure and a third-party might be ...
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ...
Cyber Attack Detection for a Nonlinear Binary Crude Oil Distillation Column
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Cyber security for Industrial Control Systems (ICS) is increasingly becoming an area of research as advance network technology continues to evolve providing extended connectivity between cyber world and control system ...