Search
Now showing items 61-70 of 99
Multi-person head segmentation in low resolution crowd scenes using convolutional encoder-decoder framework
(
Springer Verlag
, 2019 , Conference Paper)
Person head detection in crowded scenes becomes a challenging task if facial features are absent, resolution is low and viewing angles are unfavorable. Motion and out-of-focus blur along with headwear of varying shapes ...
Supervised machine learning techniques for efficient network intrusion detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cloud computing is gaining significant traction and virtualized data centers are becoming popular as a cost-effective infrastructure in telecommunication industry. Infrastructure as a Service (IaaS), Platform as a Service ...
A Comparative Study of Machine Learning Approaches for Handwriter Identification
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
During the past few years, writer identification has attracted significant interest due to its real-life applications including document analysis, forensics etc. Machine learning algorithms have played an important role ...
A Scheme for Three-way Secure and Verifiable E-Voting
(
IEEE Computer Society
, 2019 , Conference Paper)
Online voting systems are gaining acceptance with the widespread use of secure web services and cloud computing such as electronic currency and online banking. However, they still face privacy, security and accountability ...
Deep-Gap: A deep learning framework for forecasting crowdsourcing supply-demand gap based on imaging time series and residual learning
(
IEEE Computer Society
, 2019 , Conference Paper)
Mobile crowdsourcing has become easier thanks to the widespread of smartphones capable of seamlessly collecting and pushing the desired data to cloud services. However, the success of mobile crowdsourcing relies on balancing ...
Using Mandatory Concepts for Knowledge Discovery and Data Structuring
(
Springer
, 2019 , Conference Paper)
A data scientist could apply several machine learning approaches in order to discover valuable knowledge from the data. While applying several techniques, he might discover that some pieces of knowledge are invariant, what ...
Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting
(
Springer Verlag
, 2019 , Conference Paper)
While data from Supervisory Control And Data Acquisition (SCADA) systems is sent upstream, it is both the length of pulses as well as their frequency present an excellent opportunity to incorporate statistical fingerprinting. ...
Exploitation of additional degrees of freedom of multiphase drives in low-frequency operation of modular multilevel converters
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
MMC encounters serious limitations in the zero and low-frequency operation of variable-speed motor drives. In MMC, the voltage ripples of SubModule (SM) capacitor is inversely proportional to the phase current frequency. ...
A Combined Decision for Secure Cloud Computing Based on Machine Learning and Past Information
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cloud computing has been presented as one of the most efficient techniques for hosting and delivering services over the internet. However, even with its wide areas of application, cloud security is still a major concern ...
CouchDB Based Real-Time Wireless Communication System for Clinical Simulation
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Medical simulators are advancing in technology and complexity to enhance realism and hence implementing a real-time communication system for such simulators is a challenge that engineers face. This paper follows up on the ...