Results 51 to 60 of about 2,061,141 (182)

A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models

open access: yesIET Communications
Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully
Fanghao Xu   +5 more
doaj   +1 more source

New hardware platforms for healthcare consultations [PDF]

open access: yes, 2010
Innovative hardware platforms such as Mobile Clinical Assistants and tabletop computers are emerging that have the potential to significantly impact the interaction between clinician and patient.
Randell, R., Wilson, S.
core  

Combining PCA and DCT for Improved Passive Seismic Data Compression

open access: yesIEEE Access
The seismic surveys conducted by the oil and gas sector result in very large datasets, often exceeding terabytes of data, leading to high costs and technical challenges regarding storage and transmission of such large quantities of data.
Matheus Wagner   +3 more
doaj   +1 more source

A Process Algebra With Qualitative Calculus for Modeling Spatio-Temporal Behaviour

open access: yesIEEE Access, 2019
Distributive real-time autonomous systems like cyber-physical systems (CPS) and biology systems have become a hot topic nowadays. The high-level design of these systems shares a common characteristic that the behavior of agents is always space-related: i.
Yuanrui Zhang, Yixiang Chen, Hengyang Wu
doaj   +1 more source

Design and development of a novel multirotor configuration with counter-rotating coaxial propellers

open access: yesScientific Reports
In this study, a novel multirotor configuration has been developed, which utilizes a coaxial counter-rotating propeller with a large diameter at the center and four propellers with smaller diameters on four arms in an X configuration.
Mohammad Malakouti Khah   +2 more
doaj   +1 more source

Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi
Face recognition uses biometric technologies to identify humans based on their facial characteristics. This method is commonly used to restrict information access control. The benefits of face recognition systems encompass their ease of use and security.
Magfirawaty Magfirawaty   +3 more
doaj   +1 more source

Increasing sensor reliability through confidence attribution

open access: yesJournal of the Brazilian Computer Society, 2019
The reliability of wireless sensor networks (WSN) is getting increasing importance as this kind of networks are becoming the communication base for many cyber-physical systems (CPS).
Roberto M. Scheffel   +1 more
doaj   +1 more source

Representation and matching of knowledge to design digital systems [PDF]

open access: yes, 1988
A knowledge-based expert system is described that provides an approach to solve a problem requiring an expert with considerable domain expertise and facts about available digital hardware building blocks.
Jones, J. U., Shiva, S. G.
core   +1 more source

Combining Magnetostriction with Variable Reluctance for Energy Harvesting at Low Frequency Vibrations

open access: yesApplied Sciences
In this paper, we explore the benefits of using a magnetostrictive component in a variable reluctance energy harvester. The intrinsic magnetic field bias and the possibility to utilize magnetic force to achieve pre-stress leads to a synergetic ...
Johan Bjurström   +2 more
doaj   +1 more source

Linking Physical Fidelity to Downstream Performance in Physics-Informed Fault Diagnosis

open access: yesIEEE Access
A critical question in Scientific Machine Learning is whether improving a Physics-Informed Neural Network’s (PINN) physical fidelity translates into downstream task performance.
Enzo Nicolas Spotorno   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy