Browsing Computer Science & Engineering by Title
Now showing items 1784-1803 of 2211
-
Robust Enhancement of Intrusion Detection Systems Using Deep Reinforcement Learning and Stochastic Game
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)The incorporation of advanced networking technologies makes modern systems vulnerable to cyber-attacks that can result in a number of harmful outcomes. Due to the increase of security incidents and massive activities on ... -
Robust feature point detectors for car make recognition
( Elsevier B.V. , 2018 , Article)An Automatic Vehicle Make and Model Recognition (AVMMR) system can be a useful add-on tool to Automatic Number Plate Recognition (ANPR) to address potential car cloning, including intelligence collection by the police to ... -
Robust gait recognition: A comprehensive survey
( Institution of Engineering and Technology , 2019 , Article Review)Gait recognition has emerged as an attractive biometric technology for the identification of people by analysing the way they walk. However, one of the main challenges of the technology is to address the effects of inherent ... -
Robust human silhouette extraction with Laplacian fitting
( Elsevier , 2014 , Article)Human silhouette extraction has been a primary step to estimate human poses or classify activities from videos. While the accuracy of human silhouettes has great impact on the follow-on human pose/gait estimation, it has ... -
Robust model-free gait recognition by statistical dependency feature selection and Globality-Locality Preserving Projections
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Gait recognition aims to identify people through the analysis of the way they walk. The challenge of model-free based gait recognition is to cope with various intra-class variations such as clothing variations and carrying ... -
Robust normalization protocols for multiplexed fluorescence bioimage analysis
( BioMed Central , 2016 , Article)The study of mapping and interaction of co-localized proteins at a sub-cellular level is important for understanding complex biological phenomena. One of the recent techniques to map co-localized proteins is to use the ... -
A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Emerging technologies change the qualities of modern healthcare by employing smart systems for patient monitoring. To well use the data surrounding the patient, tiny sensing devices and smart gateways are involved. These ... -
Robust secret key extraction from channel secondary random process
( John Wiley and Sons Ltd , 2016 , Conference Paper)The vast majority of existing secret key generation protocols exploit the inherent randomness of the wireless channel as a common source of randomness. However, independent noise added at the receivers of the legitimate ... -
Robustness analysis of superpixel algorithms to image blur, additive Gaussian noise, and impulse noise
( SPIE , 2017 , Article)Superpixels have gradually become popular in computer vision and image processing applications. However, no comprehensive study has been performed to evaluate the robustness of superpixel algorithms in regard to common ... -
Robustness quantification of hierarchical complex networks under targeted failures
( Elsevier Ltd , 2018 , Article)Robustness is one of the key properties in complex networks to ensure the expected level of performance and service availability in case of perturbations and failures. Network robustness is generally quantified using various ... -
RobustTrust - A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security-related concerns have been resolved. ... -
Role of contextual properties in enterprise service migration to cloud computing
( John Wiley and Sons Ltd , 2013 , Article Review)This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ... -
ROM-based inference method built on deep learning for sleep stage classification
( UIKTEN - Association for Information Communication Technology Education and Science , 2019 , Article)We used a classical deep feedforward neural network (DFFNN) for an automatic sleep stage scoring based on a single-channel EEG signal. We used an open-available dataset, randomly selecting one healthy young adult for both ... -
Round-Robin sequential forward selection algorithm for prostate cancer classification and diagnosis using multispectral imagery
( Springer , 2011 , Article)This paper proposes an automatic classification system for the use in prostate cancer diagnosis. The system aims to detect and classify prostatic tissue textures captured from microscopic samples taken from needle biopsies. ... -
Routing and channel assignment in wireless cooperative networks
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In recent years, cooperative communication has attracted researchers' attention as it showed a good capability to increase network performance. On the other hand, a cooperative transmission may cause more interference. ... -
Routing and flow rate assignment using multi-objective optimization in wireless sensor networks
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Wireless sensor networks (WSNs) have shown to be an efficient solution for physical parameters monitoring and activity detection. WSNs are usually designed using single optimization by optimizing one objective function ... -
RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)While the widespread use of ubiquitously connected devices in Internet of Everything (IoE) offers enormous benefits, it also raises serious privacy concerns. Federated learning, as one of the promising solutions to alleviate ... -
RSU cloud and its resource management in support of enhanced vehicular applications
( IEEE , 2014 , Conference Paper)We propose Roadside Unit (RSU) Clouds as a novel way to offer non-safety application with QoS for VANETs. The architecture of RSU Clouds is delineated, and consists of traditional RSUs and specialized micro-datacenters and ... -
RULE BASED RECOMMENDATION SYSTEM: TO SUPPORT CROP LIFECYCLE MANAGEMENT
( Editora Mundos Sociais , 2021 , Article)Crop lifecycle management is important for crop care and maintenance throughout its life. The existing recommendation and expert systems do not provide advice for the entire crop lifecycle. However, each stage of the crop's ... -
Rule-base wearable embedded platform for seizure detection from real EEG data in ambulatory state
( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)This paper describes a classification method is presented using an empirical Rule-base System to detect the occurrences of Partial Seizures from Epilepsy data, which can be implemented in any embedded system as a wearable ...