Search
Search Results
-
Multivariate Time-Series Methods with Uncertainty Estimation for Correcting Physics-Based Model: Comparisons and Generalization for Industrial Drilling Process
This study employs a hybrid methodology, integrating data-driven and physics-based models to refine the latter’s predictions. Referred to as Hybrid... -
EVO: An Ontology for the Field of Electric Vehicles
The global automotive industry, a thriving economic powerhouse and epicenter of research and development, is increasingly focused on advancing safety... -
A Multi-scale Parallel Unsupervised Model for Multivariate Time Series Anomaly Detection
Anomaly detection for multivariate time series data is of great significance for practical applications. The existing anomaly detection methods... -
Using DCGANs and HOG + Patch-Based CNN for Face Spoofing Mitigation
The use of biometric authentication systems is replacing traditional knowledge-based and token-based systems. With the proliferation of inexpensive... -
Gamified Crowd Management Utilizing AR and Computer Vision on the Edge
The experience of visitors in exhibition areas is a key factor for the success of the endeavor and it can be considerably enhanced by using modern... -
FCGAN: Spectral Convolutions via FFT for Channel-Wide Receptive Field in Generative Adversarial Networks
In this paper, we propose the Fast Fourier Convolution Generative Adversarial Network (FCGAN). This novel approach employs convolutions in the... -
Vertical Federated Image Segmentation
There has been a growing concern for both data privacy and acquisition for the purpose of training robust computer vision algorithms. Often,... -
Active Learning with Unfiltered Informativeness Technique for Object Detection
Contemporary Deep Learning models demand substantial volumes of data to effectively learn, creating a challenge given the difficulty of obtaining... -
Modeling Distributed and Flexible PHM Framework Based on the Belief Function Theory
This paper explores the integration of the belief function theory within the domain of Prognostics and Health Management (PHM), offering a novel... -
WristSense: A Wrist-Wear Dataset for Identifying Aggressive Tendencies
Datasets play a crucial role in digital forensics by providing valuable resources for in-depth analysis and insightful decision-making. This article... -
A Second-Order Adaptive Network Model for Political Opinion Dynamics
This paper introduces a second-order adaptive network model for simulating political opinion dynamics, considering cognitive, affective, and social... -
IOT-Based Water Quality Monitoring for the Tigris River: Addressing Pollution Challenges
The Tigris River is a second-largest river in southwestern Asia, flowing through Turkey, Syria, Iraq, and Iran. The river is facing lack of water... -
Crimes Tweet Detection Based on CNN Hyperparameter Optimization Using Snake Optimizer
The increased use of social media has transformed how people share information. In the voluminous social media content, tweets involving criminal... -
A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT
The research introduces a hybrid encryption system for parallel computing environments, focusing on safeguarding IoT image data for fire incident... -
A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System
The presented study suggests a novel image encryption method depending on a modified Cramer-Shoup encryption algorithm and a 5D hyper chaotic system.... -
Adaptive Evolutionary Algorithm for Maximizing Social Influence
Influence Maximization (IM) is an issue that is represented by a predetermined group of users, sometimes referred to as the seed. The latter can have... -
Enhancing Data Security with a New Color Image Encryption Algorithm Based on 5D Chaotic System and Delta Feature for Dynamic Initialization
This research introduces an innovative color image encryption algorithm that uses a 5D chaotic system and delta feature to modify the initial... -
Hybrid Edge Detection and Singular Value Decomposition for Image Background Removal
Image background removal is a crucial technique for enhancing the visual impact of images or altering their composition, finding applications in... -
Authentication System Based on Zero-Knowledge Proof Employing the Rabin Cryptosystem and a Secret Sharing Schema
Passwords play a significant role in the authentication process for web applications. These applications are widely employed to deliver a diverse... -
Convolutional Neural Network Based Detection Approach of Undesirable SMS (Short Message Service) in the Cameroonian Context
With the low cost of mobile phones, SMS(Short Message Service) and the advent of communications software (whatsapp, telegram, etc.), many people...