Results 41 to 50 of about 23,776,920 (366)
An ID Badge Information Extractor Based on Object Detection and Optical Character Recognition
Advancements in Artificial Intelligence and Deep Learning have impacted numerous fields, particularly through innovations like You Only Look Once for object detection and PaddleOCR for optical character recognition in computer vision.
Wallace Cavalcante+5 more
doaj +1 more source
Energy Autonomous Wireless Sensing Node Working at 5 Lux from a 4 cm2 Solar Cell
Harvesting energy for IoT nodes in places that are permanently poorly lit is important, as many such places exist in buildings and other locations. The need for energy-autonomous devices working in such environments has so far received little attention ...
Marcel Louis Meli+7 more
doaj +1 more source
Density-Based Statistical Clustering: Enabling Sidefire Ultrasonic Traffic Sensing in Smart Cities
Traffic routing is a central challenge in the context of urban areas, with a direct impact on personal mobility, traffic congestion, and air pollution.
Volker Lücken+8 more
doaj +1 more source
Embedded System Hardware [PDF]
AbstractIn this chapter, we will present the interface between the physical environment and information processing (the cyphy-interface) together with the hardware required for processing, storing, and communicating information. Due to considering CPS, covering the cyphy-interface is indispensable. The need to cover other hardware components as well is
openaire +2 more sources
Verifying Programs with Logic and Extended Proof Rules: Deep Embedding v.s. Shallow Embedding [PDF]
Many foundational program verification tools have been developed to build machine-checked program correctness proofs, a majority of which are based on Hoare logic. Their program logics, their assertion languages, and their underlying programming languages can be formalized by either a shallow embedding or a deep embedding.
arxiv
Self-Adaptive Multi-Sensor Activity Recognition Systems Based on Gaussian Mixture Models
Personal wearables such as smartphones or smartwatches are increasingly utilized in everyday life. Frequently, activity recognition is performed on these devices to estimate the current user status and trigger automated actions according to the user ...
Martin Jänicke+2 more
doaj +1 more source
Exchanging FPGA-based implementations of cryptographic algorithms during run-time using netlist randomized versions has been introduced recently as a unique countermeasure against side channel attacks.
Ali Asghar+2 more
doaj +1 more source
Embedded Systems for Mobile Sensors [PDF]
In the era of IoT, embedded systems based on mobile sensor ideas turn into increasingly compound and need understanding in various training tools such as signal processing, artificial intelligence, and multimedia communication. After a long period of computational capacity centralization, we are facing a period where the computation capacity is ...
Marco Anisetti+4 more
openaire +2 more sources
Protecting Bare-Metal Embedded Systems with Privilege Overlays
Embedded systems are ubiquitous in every aspect ofmodern life. As the Internet of Thing expands, our dependenceon these systems increases. Many of these interconnected systemsare and will be low cost bare-metal systems, executing without anoperating ...
Abraham A. Clements+6 more
semanticscholar +1 more source
Transformation of Node to Knowledge Graph Embeddings for Faster Link Prediction in Social Networks [PDF]
Recent advances in neural networks have solved common graph problems such as link prediction, node classification, node clustering, node recommendation by developing embeddings of entities and relations into vector spaces. Graph embeddings encode the structural information present in a graph.
arxiv