The automatic identification of the modulation mode of the communication signal is the main task of the intelligent receiver, which is now widely used in a variety of fields, including civil and military. In this pape...
详细信息
Specific modeling techniques are necessary to accurately capture the physical mechanisms for simulating the macroscale thermo-mechanical behavior of an additive directed energy deposition (DED) process. When using the...
详细信息
The immune and enteric systems have been implicated in psychopathology, including depressive disorders. However, the precise neurocognitive mechanisms remain unclear. The present study uses Brain-Inspired Spiking Neur...
详细信息
Numerous ground breaking technical solutions are introduced in the approaching sixth generation communications. Even with fifth generation communications, it is become challenging to employ and optimize the limited ra...
详细信息
Continuous operation of power systems is critical to modern society, even during unexpected or emergency situations. One method to evaluate the security of power systems is contingency analysis, a computationally-inte...
详细信息
The computation of some crucial and nonlinear functions on the edge has to consider the area and latency. The traditional coordinate rotation digital computer (CORDIC) systems are widely used for these key functions, ...
详细信息
Accurate and early diagnosis of brain tumors plays a vital role in determining appropriate treatment and increasing survival rates. Manual diagnosis using MRI images is often prone to errors and can be a tedious and t...
详细信息
With the emergence of the micro-grid concept in the last years, there are several studies on this subject that serve to develop this kind of structure and make it more reliable and intelligent. These developments affe...
详细信息
One of the many Autonomous systems (ASs), such as autonomous driving cars, performs various safety-critical functions. Many of these autonomous systems take advantage of Artificial Intelligence (AI) techniques to perc...
详细信息
ISBN:
(数字)9783031390593
ISBN:
(纸本)9783031390586;9783031390593
One of the many Autonomous systems (ASs), such as autonomous driving cars, performs various safety-critical functions. Many of these autonomous systems take advantage of Artificial Intelligence (AI) techniques to perceive their environment. But these perceiving components could not be formally verified, since, the accuracy of such AI-based components has a high dependency on the quality of training data. So Machine learning (ML) based anomaly detection, a technique to identify data that does not belong to the training data could be used as a safety measuring indicator during the development and operational time of such AI-based components. Adversarial learning, a sub-field of machine learning has proven its ability to detect anomalies in images and videos with impressive results on simple data sets. Therefore, in this work, we investigate and provide insight into the performance of such techniques on a highly complex driving scenes dataset called Berkeley DeepDrive.
Adding flexibility to 5G networks through circuit spinning an adaptable is a viable approach. Key components such as Network slicing, software-defined networking (SDN), and network service virtualization (NFV) are uti...
详细信息
暂无评论