the proceedings contain 67 papers. the special focus in this conference is on VLSI, Communication and signalprocessing. the topics include: Full-Duplex Spectrum Sensing with Imperfect CSI and Mobile Nodes;Sensitivity...
ISBN:
(纸本)9789819909728
the proceedings contain 67 papers. the special focus in this conference is on VLSI, Communication and signalprocessing. the topics include: Full-Duplex Spectrum Sensing with Imperfect CSI and Mobile Nodes;Sensitivity Enhancement of Kretschmann Configured Surface Plasmon Resonance Sensor with 2D Nanomaterial: MXene;metasurface-Based Tunable Radar Absorbing Structure for Broadband Applications;underwater Image Enhancement Using Color Correction and Fusion;Study and Analysis of three-Stage Single-Miller CMOS OTA;Stacked Bi-LSTM Network and Dual signal Transformation for Heart Sound Denoising;machinelearning-Based FSOC Link Performance Estimation;Abnormality Detection in Heart Using Combination of CNN, RNN and U-Net;High Speed LVDS Driver Design with Fast Settling Common Mode Feedback Circuit;design and Analysis of Low Power Frequency Divider Circuit;static Single Phase Contention Pulsed Latch for Low Voltage Operation;design of Y-shaped Multiband Antenna Using the Parametric Approach for Wireless Networks;Design and Implementation of 1 × 4 & 4 × 4 RAM Using Quantum-Dot Cellular Automata;FPGA and ASIC-Based Design of Fast and Low Power SEC-DAEC and SEC-DAEC-TAEC Codecs;Reliable Implementation of Finite State machine for On-Board VLSI Designs;Performance Improvement of SAC-OCDMA FSO System Under Rain and Snow Conditions Using Different Zero Cross-Correlation Codes;Robust and Imperceptible Color Image Watermarking Using LWT, Schur Decomposition, and SVD in YCbCr Color Space;BER Efficiency of Outdoor Optics Links Using Hybrid-SIM with Pointing Errors Operating on Extreme Turbulence Regime;Design of three Slot-Based Multiband MIMO Circular Patch Antenna;An Imperceptible Semi-blind Color Image Watermarking Using RDWT and SVD;a Non-invasive Planar Resonant Microwave Sensor for Unknown Liquid Permittivity Estimation.
Security is an essential hot research topic for detecting and localization of malicious nodes and improving the quality of service in wireless sensor networks (WSNs). WSNs are exposed to different routing attacks, inc...
详细信息
Electric vehicles (EV) are becoming more mainstream as consumer purchasing choices are in favor of this innovative technology. Hence, there is a need to install new electric vehicle charging stations (EVCS). thus, det...
详细信息
作者:
Gong, Hai-xiaoHe, JieWuzhou Univ
Sch Data Sci & Software Engn Wuzhou 543002 Peoples R China Wuzhou Univ
Guangxi Coll & Univ Key Lab Image Proc & Intellig Wuzhou 543002 Peoples R China
At present, the commonly used microscopic video signal coding methods have poor processing ability and low coding accuracy. therefore, this paper proposes a new micro video coding method based on machinelearning tech...
详细信息
ISBN:
(纸本)9783030945541;9783030945534
At present, the commonly used microscopic video signal coding methods have poor processing ability and low coding accuracy. therefore, this paper proposes a new micro video coding method based on machinelearning technology. Firstly, the video coding processing architecture is established by intra prediction, inter prediction, transformation, quantization, entropy coding and loop filtering, and then the coding processing is realized by image segmentation, intra prediction and inter prediction, and the depth decision method is used for depth analysis. the experimental results show that this method can effectively improve the processing ability of microscopic video signal coding, and at the same time enhance the coding accuracy.
Detecting psychological disorders, particularly depression, is a complex and critical task within the realm of mental health assessment. this research explores a novel approach to improve the identification of psychol...
详细信息
the amount of complicated texts and documents that require a deeper understanding of machinelearning techniques has expanded rapidly in recent decades. Several machinelearning approaches have shown exceptional resul...
详细信息
the fields of artificial intelligence (AI), machinelearning (ML), and data science have grown significantly over the past ten years, opening up a wide range of opportunities in sectors as varied as healthcare, bankin...
详细信息
Transfer learning method uses the similarity of data, tasks, models in different domains and applies the knowledge from one domain to another domain. Traditional machinelearning requires that the test and training da...
详细信息
ISBN:
(数字)9781665470810
ISBN:
(纸本)9781665470810
Transfer learning method uses the similarity of data, tasks, models in different domains and applies the knowledge from one domain to another domain. Traditional machinelearning requires that the test and training data sets obey the same data distribution. In contrast, transfer learning can reuse the training samples of similar data distribution in different fields and improve new fields' learning and training effect. Currently, there are many studies on the theory of transfer learning, especially in the field of domain adaptability. this paper summarizes and analyzes the research progress of data distribution adaptation methods, feature selection methods, subspace learning methods, and deep transfer learning methods. then, the application of transfer learning in the radar field is further introduced. Finally, the future research direction of transfer learning is discussed.
the correlation calculation of online users' posting behavior is studied as the core part in the analysis and characterization of Internet user entity identity association. the paper will complete the processing o...
详细信息
ISBN:
(纸本)9781450399067
the correlation calculation of online users' posting behavior is studied as the core part in the analysis and characterization of Internet user entity identity association. the paper will complete the processing of the information posted by the network users and train the bag-of-words model to obtain the feature vector of the posted information, and then use the distance formula to calculate the correlation of the posted behavior information, which can assist in the analysis and characterization of network user entity identity association and associate the identity relationship between multiple virtual users, so as to build a network user relationship network. the method in this paper is experimentally verified on the published data of WeChat public account, using three training models, Word2Vec, CNN and Seq2Seq. the results prove the effectiveness of the text method, and provide research ideas and method support for the analysis and characterization of network user entity identity associations.
SVMs had been effectively applied to various signalprocessing tasks in Telecommunications, along with goal detection and category in cognitive radio networks, channel estimation, exploiting spatial variety for multip...
详细信息
暂无评论