Results 1 to 10 of about 2,827,837 (350)
Implicit privacy preservation: a framework based on data generation
This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contrast to traditional (explicit) privacy, implicit privacy has two essential properties: (1) It is not initially defined as a privacy attribute; (2) it is ...
Yang Qing+4 more
doaj +1 more source
Multiple Hypothesis Detection and Tracking Using Deep Learning for Video Traffic Surveillance
Moroccan Intelligent Transport System is the first Moroccan system that uses the latest advances in computer vision, machine learning and deep learning techniques to manage Moroccan traffic and road violations. In this paper, we propose a fully automatic
Hamd Ait Abdelali+4 more
doaj +1 more source
Self-Supervised Joint Learning Fault Diagnosis Method Based on Three-Channel Vibration Images
The accuracy of bearing fault diagnosis is of great significance for the reliable operation of rotating machinery. In recent years, increasing attention has been paid to intelligent fault diagnosis techniques based on deep learning.
Weiwei Zhang, Deji Chen, Yang Kong
doaj +1 more source
Byzantine-robust federated learning via credibility assessment on non-IID data
Federated learning is a novel framework that enables resource-constrained edge devices to jointly learn a model, which solves the problem of data protection and data islands.
Kun Zhai+3 more
doaj +1 more source
Multi-Task Autoencoders and Transfer Learning for Day-Ahead Wind and Photovoltaic Power Forecasts
Integrating new renewable energy resources requires robust and reliable forecasts to ensure a stable electrical grid and avoid blackouts. Sophisticated representation learning techniques, such as autoencoders, play an essential role, as they allow for ...
Jens Schreiber, Bernhard Sick
doaj +1 more source
During an emergency rescue operation, rescuers have to deal with many different health complications like cardiovascular, respiratory, neurological, psychiatric, etc.
Abu Shad Ahammed+2 more
doaj +1 more source
Embedded Systems Security [PDF]
Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these ...
Farooq-I-Azam, Muhammad+1 more
openaire +3 more sources
This Open Access book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have emerged particularly within the last five years. This book introduces the most prominent reliability concerns from today’s points of view and roughly recapitulates the progress in the community so far.
Henkel, Jörg, Dutt, Nikil
openaire +5 more sources
It is extremely important to build a reasonable traffic network structure for traffic flow prediction. Owing to the complexity and dynamic of traffic networks, the graph neural network model has become one of the most effective methods for mining the ...
Xiaohui Cheng+3 more
doaj +1 more source
Video surveillance and machine vision systems are attracting growing academic and industrial interests. The market for digital CCTV systems is constantly growing because of terror attacks, crime, vandalism, and violence in public and also in business domains.
Heinrich Garn, Dietmar Dietrich
openaire +1 more source