SfM can reconstruct the 3D shape of an object with high accuracy if there are many feature points on the surface to be measured. However, in the field of architecture, there is a problem that building surfaces are bea...
详细信息
Effective development of virtual reality (VR) applications is heavily reliant on the evaluation of user experience (UX). However, traditional methods such as questionnaires have inherent limitations which hinder their...
详细信息
In this paper, we propose hardware acceleration to improve a performance of scripting programming languages for embedded developments. Scripting programming languages enable more efficient software developments and sc...
详细信息
Visible light communications (VLC) enable wireless data transmission using existing light-emitting diode (LED) illumination. This experimental study evaluates the performance of multiple input and multiple output (MIM...
详细信息
Under-resourced automatic speech recognition (ASR) has become an active field of research and has experienced significant progress during the past decade. However, the performance of under-resourced ASR trained by exi...
详细信息
Magnesium chips were coated with a high concentration of graphite using a binder and were used as the raw material for injection molding. The microstructure of the magnesium injection-molded product with added graphit...
详细信息
The early identification of plant diseases is crucial for preventing the loss of crop production. Recently, the advancement of deep learning has significantly improved the identification of plant leaf diseases. Howeve...
Creating pixel-level ground-truth (GT) masks is quite costly for deep learning-based image segmentation. Specialists in areas such as anomaly detection and medical diagnostics face difficulties in producing many GT ma...
详细信息
The number of phishing websites is increasing, and the methods used to direct users to these sites are becoming more diverse. As web push notifications become more widespread, adversaries have begun using them as a me...
详细信息
In recent years, there has been a proliferation of Internet of Things (IoT) devices, and so has been the attacks on them. In this paper we will propose a methodology to detect Distributed Denial of Service (DDoS) atta...
详细信息
暂无评论