Search
Search Results
-
Use Multichannel EEG-Based Biometrics Authentication Signal in Real Time Using Neural Network
As EEG brainwave, which represent human brain activities, are more private, sensitive, and hard to steal or copy, the signals show a lot of promise... -
NeuMan: Neural Human Radiance Field from a Single Video
Photorealistic rendering and reposing of humans is important for enabling augmented reality experiences. We propose a novel framework to reconstruct... -
Vision-Based Mobile Robots Control Along a Given Trajectory
The paper presents the application of a computer vision approach to tracking the mobile robot’s state. As an exemplary environment, we use a feedback... -
Quantum Autoencoder Frameworks for Network Anomaly Detection
Detecting anomalous activities in network traffic is important for the timely identification of emerging cyber-attacks. Accurate analysis of the... -
Examining the Potential of Sequence Patterns from EEG Data as Alternative Case Representation for Seizure Detection
The management of EEG signals for disease diagnosis has been traditionally addressed by extracting features from the bio-signal data, either in the... -
Deep Reinforcement Learning Based Multi-WiFi Offloading of UAV Traffic
As the growing network deployment of Unmanned Aerial Vicheles (UAVs), traffic offloading has been widely used to mitigate UAV's problem of limited... -
Avoid Overfitting in Deep Reinforcement Learning: Increasing Robustness Through Decentralized Control
Deep Reinforcement Learning is known to be brittle towards selection of appropriate hyperparameters. In particular, the selection of the structure of... -
Automatic Extraction of Understandable Controllers from Video Observations of Swarm Behaviors
Swarm behavior emerges from the local interaction of agents and their environment often encoded as simple rules. Extracting the rules by watching a... -
ICWGAN-GP: an image fusion method based on infrared compensator and wasserstein generative adversarial network with gradient penalty
The existing Generative adversarial network (GAN)-based infrared (IR) and visible (VIS) image fusion methods mainly used multiple discriminators to...
-
On the Effectiveness of Visible and MWIR-Based Periocular Human Authentication When Wearing Face Masks
In the COVID-19 (Coronavirus Disease-19) era, everyone is advised to wear a face mask. According to the Centers for Disease Control and Prevention... -
Evaluation of various controllers in fractional order non-linear systems with actuator fault
The tracking control of a non-linear fractional-order system (FOS) is highly tedious since cumulative approximation errors are encountered during the...
-
Deep Learning and AI for 5G Technology: Paradigms
Nowadays Internet of Things (IoT) is a major paradigm shift that will mark an epoch in communication technology such that every physical object can... -
RoadNetGAN: Generating Road Networks in Planar Graph Representation
We propose RoadNetGAN, a road network generation method as an extension to NetGAN, a generative model that can generate graphs similar to real-world... -
A New Hybrid Architecture for Real-Time Detection of Emergency Vehicles
VANET is a vital part of wireless networking. Vehicular movement is expanding indefinitely everywhere and is causing terrible problems to daily... -
Generating Multi-type Temporal Sequences to Mitigate Class-Imbalanced Problem
From the ad network standpoint, a user’s activity is a multi-type sequence of temporal events consisting of event types and time intervals.... -
-
A Comprehensive Study of Weight Sharing in Graph Networks for 3D Human Pose Estimation
Graph convolutional networks (GCNs) have been applied to 3D human pose estimation (HPE) from 2D body joint detections and have shown encouraging... -
Comprehensive Image Captioning via Scene Graph Decomposition
We address the challenging problem of image captioning by revisiting the representation of image scene graph. At the core of our method lies the... -
FFD: A Federated Learning Based Method for Credit Card Fraud Detection
Credit card fraud has caused a huge loss to both banks and consumers in recent years. Thus, an effective Fraud Detection System (FDS) is important... -
Towards converged, collaborative and co-automatic (3C) optical networks
The interconnection of all things is develo** a new diagram of future information networks. However, it is difficult to realize future applications...