Results 1 to 10 of about 11,867 (119)
Implicit privacy preservation: a framework based on data generation
This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contrast to traditional (explicit) privacy, implicit privacy has two essential properties: (1) It is not initially defined as a privacy attribute; (2) it is ...
Yang Qing+4 more
doaj +1 more source
Multiple Hypothesis Detection and Tracking Using Deep Learning for Video Traffic Surveillance
Moroccan Intelligent Transport System is the first Moroccan system that uses the latest advances in computer vision, machine learning and deep learning techniques to manage Moroccan traffic and road violations. In this paper, we propose a fully automatic
Hamd Ait Abdelali+4 more
doaj +1 more source
Self-Supervised Joint Learning Fault Diagnosis Method Based on Three-Channel Vibration Images
The accuracy of bearing fault diagnosis is of great significance for the reliable operation of rotating machinery. In recent years, increasing attention has been paid to intelligent fault diagnosis techniques based on deep learning.
Weiwei Zhang, Deji Chen, Yang Kong
doaj +1 more source
Byzantine-robust federated learning via credibility assessment on non-IID data
Federated learning is a novel framework that enables resource-constrained edge devices to jointly learn a model, which solves the problem of data protection and data islands.
Kun Zhai+3 more
doaj +1 more source
Multi-Task Autoencoders and Transfer Learning for Day-Ahead Wind and Photovoltaic Power Forecasts
Integrating new renewable energy resources requires robust and reliable forecasts to ensure a stable electrical grid and avoid blackouts. Sophisticated representation learning techniques, such as autoencoders, play an essential role, as they allow for ...
Jens Schreiber, Bernhard Sick
doaj +1 more source
During an emergency rescue operation, rescuers have to deal with many different health complications like cardiovascular, respiratory, neurological, psychiatric, etc.
Abu Shad Ahammed+2 more
doaj +1 more source
Embedded Systems Security [PDF]
Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these ...
Farooq-I-Azam, Muhammad+1 more
openaire +4 more sources
It is extremely important to build a reasonable traffic network structure for traffic flow prediction. Owing to the complexity and dynamic of traffic networks, the graph neural network model has become one of the most effective methods for mining the ...
Xiaohui Cheng+3 more
doaj +1 more source
Video surveillance and machine vision systems are attracting growing academic and industrial interests. The market for digital CCTV systems is constantly growing because of terror attacks, crime, vandalism, and violence in public and also in business domains.
Heinrich Garn, Dietmar Dietrich
openaire +1 more source
Sdn+K8s Routing Optimization Strategy in 5G Cloud Edge Collaboration Scenario
The cloud-edge-collaboration framework in the 5G scenario emerged as the times developing. The horizontal and vertical disassembly of computing power is particularly important, relying on the full life cycle resource allocation and flexible configuration
Chungang Yan, Shuo Sheng
doaj +1 more source