The requirement to protect the authenticity and accuracy of images motivates the implementation of water-marking on these images. Any alteration or interference with medical images might lead to erroneous diagnosis or...
详细信息
This research work presents the implementation of a wireless, portable bot car controlled by brain signals. This pioneering approach integrates advanced neurotechnology with the internet of Things (IoT) and wireless t...
详细信息
The laboratory, as a research base for university students, is becoming increasingly important to manage. With the development of technology, intelligent laboratory management systems have become a trend. Therefore, h...
详细信息
Automatic modulation recognition (AMR) is a key technology in wireless communication application systems, and the application of deep learning improves the accuracy of AMR. Existing deep learning based modulation reco...
详细信息
With the growth of the IoT ecosystem, IoT data confidentiality is becoming a critical issue, posing various concerns for customers. Using cryptographic methods to ensure data confidentiality is one of the most common ...
详细信息
ISBN:
(纸本)9781665464956
With the growth of the IoT ecosystem, IoT data confidentiality is becoming a critical issue, posing various concerns for customers. Using cryptographic methods to ensure data confidentiality is one of the most common ways for mitigating data confidentiality attacks. Since traditional encryption approaches need important CPU and memory capacity as well as increasing time and energy consumption, researchers have developed a variety of lightweight cryptographic algorithms to provide IoT environments with solutions that take into consideration IoT resources limitations while offering adapted security level. Managing lightweight cryptographic features in an IoT ecosystem is extremely difficult due to the large number of objects, the nature of IoT devices that do not accept the implementation of all possible lightweight solutions, the heterogeneity of the captured data, and the energy required for these lightweight solutions. To address this problem, we propose a novel IoT framework in which lightweight cryptographic features are self-managed according to the Autonomic Computing paradigm in order to ensure IoT data confidentiality while enhancing IoT system performance and extending IoT device lifetime.
Hyperspectral imaging (HSI) provides a powerful guarantee for the accurate identification of various targets due to its rich spectral and spatial information. Anomaly detection, a significant application of HSI, is in...
详细信息
The indoor imaging visible light positioning (VLP) technologybased on the image sensor (IS) utilizes existing indoor lighting infrastructure to provide high-precision indoor positioning services. However, due to the ...
详细信息
In order to solve the problems of 'digital signal processing', such as many common knowledge points, difficult teaching, difficult visual teaching, and so on, a software platform for 'signal processing'...
详细信息
In this work, we consider the target of solving the nonlinear and nonconvex optimization problems arising in the training of deep neural networks. To this aim we propose a nonmonotone trust-region (NTR) approach in a ...
详细信息
ISBN:
(纸本)9781665464956
In this work, we consider the target of solving the nonlinear and nonconvex optimization problems arising in the training of deep neural networks. To this aim we propose a nonmonotone trust-region (NTR) approach in a stochastic setting under inexact function and gradient approximations. We use the limited memory SR1 (L-SR1) updates as Hessian approximations when the curvature information is obtained by several different strategies. We provide results showing the performance of the proposed optimizer in the training of residual networks for image classification. Our results show that the proposed algorithm provides comparable or better testing accuracy than standard stochastic trust-region depending on the adopted curvature computing strategy and outperforms the well-known Adam optimizer.
The proceedings contain 31 papers. The special focus in this conference is on signal and image Processing. The topics include: A Blockchain-based Secure Framework for Storage and Access of Surveillance Video Data;enco...
ISBN:
(纸本)9789819795147
The proceedings contain 31 papers. The special focus in this conference is on signal and image Processing. The topics include: A Blockchain-based Secure Framework for Storage and Access of Surveillance Video Data;encountering the Challenges and Awareness of internet Security;Data-Driven Strategies for Twitter Engagement: Hashtag Recommendations and API Insights;Analyzing and Visualizing AI Decision-Making for Human-Centered Interaction and Trust;AI-ML-based Handover Techniques in Next-Generation Wireless Networks;castle Defender: Design and Implementation of Game based on Pygame;optimizing Healthcare: Enhancing Disease Management with Recommendation systems;optimizing Diabetes Prediction Models for Enhanced Health Data Processing;comparative Analysis of Classification Models Using Various Feature Sets;An Early Detection of Tomato Plant Disease with Deep Reinforcement Learning and CNN;ioT-Powered Health Monitoring System for Protecting Vital Organs Through Cloud-based Diagnosis;LASKV: Lightweight Authenticated Session Key Agreement for Video Surveillance System;Data Analyses of Factors Influencing Sustainable Adoption of Online Public Services: An Extended UTAUT Analysis in North Macedonia;a Comprehensive Review on Real-Time Campus Compass;deep Learning Approaches for Early Detection of Bovine Respiratory Diseases in Cattle;identifying Suitable Cloud Storage Services from Cross Cloud Platforms based on the Requirements;storage-Savvy Frame Recorder: Enhancing Storage Efficiency and Inspection Speed*;lossless Medical image Compression Using Block-Wise Burrows–Wheeler Transform and Modified Run Length Encoding;advancing Software Defect Detection and Prevention: Bridging Gaps in Early-Stage and Evolving Software systems;a New Way to Communicate: Deep Learning for Deaf and Dumb People;dependent Binomial: A Family of Distributions Derivable by Modifying a Base.
暂无评论