بحث بسيط
السجلات المعروضة 1 -- 10 من 20
Machine learning-based management of electric vehicles charging: Towards highly-dispersed fast chargers
(
MDPI AG
, 2020 , Article)
Coordinated charging of electric vehicles (EVs) improves the overall efficiency of the power grid as it avoids distribution system overloads, increases power quality, and decreases voltage fluctuations. Moreover, the ...
Deep Reinforcement Learning Algorithm for Smart Data Compression under NOMA-Uplink Protocol
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
One of the highly promising radio access strategies for enhancing performance in the next generation cellular communications is non-orthogonal multiple access (NOMA). NOMA offers a number of advantages including better ...
DL-CRC: Deep learning-based chest radiograph classification for covid-19 detection: A novel approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the exponentially growing COVID-19 (coronavirus disease 2019) pandemic, clinicians continue to seek accurate and rapid diagnosis methods in addition to virus and antibody testing modalities. Because radiographs such ...
Dairy Cow Rumination Detection: A Deep Learning Approach
(
Springer Science and Business Media Deutschland GmbH
, 2020 , Conference Paper)
Cattle activity is an essential index for monitoring health and welfare of the ruminants. Thus, changes in the livestock behavior are a critical indicator for early detection and prevention of several diseases. Rumination ...
Computational methods for automated analysis of corneal nerve images: Lessons learned from retinal fundus image analysis
(
Elsevier
, 2020 , Article Review)
Corneal and retinal imaging provide a descriptive view of the nerve and vessel structure present inside the human eye, in a non-invasive manner. This helps in ocular, or other, disease identification and diagnosis. However, ...
A deep learning based static taint analysis approach for IoT software vulnerability location
(
Elsevier B.V.
, 2020 , Article)
Computer system vulnerabilities, computer viruses, and cyber attacks are rooted in software vulnerabilities. Reducing software defects, improving software reliability and security are urgent problems in the development of ...
LFR face dataset:Left-Front-Right dataset for pose-invariant face recognition in the wild
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this work, a new multitask convolutional neural network (CNN) is proposed aiming for the recognition of face under pose variations. Furthermore, the combination of pose estimation for each corresponding pose in a separate ...
A Scene-to-Speech Mobile based Application: Multiple Trained Models Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The concept of Scene-to-Speech (STS) is to recognize elements in a captured image or a video clip to speak loudly an informative textual content that describes the scene. The contemporary progression in convolution neural ...
Multi-layer security scheme for implantable medical devices
(
Springer
, 2020 , Article)
Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. ...
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ...