The Climate-Enhanced Drug Inventory and Supply Chain Monitoring System is a state-of-the-art platform designed to improve the oversight of pharmaceutical inventory and logistics. This system aims to refine the storage...
详细信息
In this paper, we have proposed a multi-task learning model for multi-lingual Optical Character Recognition. Our model does the script identification and text recognition simultaneously of offline machine printed docu...
详细信息
The ultra-dense network (UDN) concept with multi-connectivity (MC) has emerged as a promising scenario for millimeter-wave (mmWave) communications due to its synergistic effect. However, mmWave UDNs with MC face chall...
详细信息
Advances in Internet-of-Things (IoT) wearable sensors and Edge-Artificial Intelligence (Edge-AI) have enabled practical realizations of Machine Learning (ML)-enabled mobile sensing applications like Human Activity Rec...
详细信息
Predictability is an essential challenge for autonomous vehicles(AVs)’*** neural networks have been widely deployed in the AV’s perception ***,it is still an open question on how to guarantee the perception predicta...
详细信息
Predictability is an essential challenge for autonomous vehicles(AVs)’*** neural networks have been widely deployed in the AV’s perception ***,it is still an open question on how to guarantee the perception predictability for AV because there are millions of deep neural networks(DNNs)model combinations and system configurations when deploying DNNs in *** paper proposes configurable predictability testbed(CPT),a configurable testbed for quantifying the predictability in AV’s perception *** provides flexible configurations of the perception pipeline on data,DNN models,fusion policy,scheduling policies,and predictability *** top of CPT,the researchers can profile and optimize the predictability issue caused by different application and system *** has been open-sourced at:https://***/Torreskai0722/CPT.
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injec...
详细信息
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injections are only a few drawbacks of using machine learning algorithms for *** overcome these obstacles,researchers have created several network IDS models,such as the Hidden Naive Bayes Multiclass Classifier and supervised/unsupervised machine learning *** study provides an updated learning strategy for artificial neural network(ANN)to address data categorization problems caused by unbalanced *** to traditional approaches,the augmented ANN’s 92%accuracy is a significant improvement owing to the network’s increased resilience to disturbances and computational complexity,brought about by the addition of a random weight and standard *** the ever-evolving nature of cybersecurity threats,this study introduces a revolutionary intrusion detection method.
Fog computing offers a compelling paradigm for real-time healthcare data processing by minimizing latency and bringing computation closer to its source. However, efficient service placement remains a critical challeng...
详细信息
Indian Sign Language (ISL) is a vital means of interaction for the country's deaf and hard-of-hearing citizens. This highly developed visual-gestural system of language uses forms, gestures with the hands, and fac...
详细信息
Air pollution is a significant environmental and societal problem that affects human health, wildlife, and ecological balance. While human activities such as industry, agriculture, traffic, and energy production are m...
详细信息
Social media platforms like Instagram, Twitter, and Facebook have completely changed our world. People today exhibit a kind of digital character and are more linked than ever. While social media undoubtedly offers man...
详细信息
暂无评论