Results 1 to 10 of about 11,867 (119)

Implicit privacy preservation: a framework based on data generation

open access: yesSecurity and Safety, 2022
This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contrast to traditional (explicit) privacy, implicit privacy has two essential properties: (1) It is not initially defined as a privacy attribute; (2) it is ...
Yang Qing   +4 more
doaj   +1 more source

Multiple Hypothesis Detection and Tracking Using Deep Learning for Video Traffic Surveillance

open access: yesIEEE Access, 2021
Moroccan Intelligent Transport System is the first Moroccan system that uses the latest advances in computer vision, machine learning and deep learning techniques to manage Moroccan traffic and road violations. In this paper, we propose a fully automatic
Hamd Ait Abdelali   +4 more
doaj   +1 more source

Self-Supervised Joint Learning Fault Diagnosis Method Based on Three-Channel Vibration Images

open access: yesSensors, 2021
The accuracy of bearing fault diagnosis is of great significance for the reliable operation of rotating machinery. In recent years, increasing attention has been paid to intelligent fault diagnosis techniques based on deep learning.
Weiwei Zhang, Deji Chen, Yang Kong
doaj   +1 more source

Byzantine-robust federated learning via credibility assessment on non-IID data

open access: yesMathematical Biosciences and Engineering, 2022
Federated learning is a novel framework that enables resource-constrained edge devices to jointly learn a model, which solves the problem of data protection and data islands.
Kun Zhai   +3 more
doaj   +1 more source

Multi-Task Autoencoders and Transfer Learning for Day-Ahead Wind and Photovoltaic Power Forecasts

open access: yesEnergies, 2022
Integrating new renewable energy resources requires robust and reliable forecasts to ensure a stable electrical grid and avoid blackouts. Sophisticated representation learning techniques, such as autoencoders, play an essential role, as they allow for ...
Jens Schreiber, Bernhard Sick
doaj   +1 more source

Time-Efficient Identification Procedure for Neurological Complications of Rescue Patients in an Emergency Scenario Using Hardware-Accelerated Artificial Intelligence Models

open access: yesAlgorithms, 2023
During an emergency rescue operation, rescuers have to deal with many different health complications like cardiovascular, respiratory, neurological, psychiatric, etc.
Abu Shad Ahammed   +2 more
doaj   +1 more source

Embedded Systems Security [PDF]

open access: yes, 2011
Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these ...
Farooq-I-Azam, Muhammad   +1 more
openaire   +4 more sources

Traffic Flow Prediction Based on Information Aggregation and Comprehensive Temporal-Spatial Synchronous Graph Neural Network

open access: yesIEEE Access, 2023
It is extremely important to build a reasonable traffic network structure for traffic flow prediction. Owing to the complexity and dynamic of traffic networks, the graph neural network model has become one of the most effective methods for mining the ...
Xiaohui Cheng   +3 more
doaj   +1 more source

Embedded Vision System [PDF]

open access: yesEURASIP Journal on Embedded Systems, 2007
Video surveillance and machine vision systems are attracting growing academic and industrial interests. The market for digital CCTV systems is constantly growing because of terror attacks, crime, vandalism, and violence in public and also in business domains.
Heinrich Garn, Dietmar Dietrich
openaire   +1 more source

Sdn+K8s Routing Optimization Strategy in 5G Cloud Edge Collaboration Scenario

open access: yesIEEE Access, 2023
The cloud-edge-collaboration framework in the 5G scenario emerged as the times developing. The horizontal and vertical disassembly of computing power is particularly important, relying on the full life cycle resource allocation and flexible configuration
Chungang Yan, Shuo Sheng
doaj   +1 more source

Home - About - Disclaimer - Privacy