|
|
|
Xiaojuan Wang and Weilan Wang
As there is a lack of public mark samples of Tibetan historical document image characters at present, this paper proposes an unsupervised Tibetan historical document character recognition method based on deep learning (UD-CNN). Firstly, using the Tibetan...
ver más
|
|
|
|
|
|
|
Pengfei Zhao and Ze Liu
The three-dimensional (3D) reconstruction of Electromagnetic Tomography (EMT) is an important task for many applications, such as the non-destructive testing of inner defects in rail systems. Additionally, image reconstruction algorithms utilizing deep l...
ver más
|
|
|
|
|
|
|
Chenhong Yan, Shefeng Yan, Tianyi Yao, Yang Yu, Guang Pan, Lu Liu, Mou Wang and Jisheng Bai
Ship-radiated noise classification is critical in ocean acoustics. Recently, the feature extraction method combined with time?frequency spectrograms and convolutional neural networks (CNNs) has effectively described the differences between various underw...
ver más
|
|
|
|
|
|
|
Monika Rybczak and Krystian Kozakiewicz
Today, specific convolution neural network (CNN) models assigned to specific tasks are often used. In this article, the authors explored three models: MobileNet, EfficientNetB0, and InceptionV3 combined. The authors were interested in investigating how q...
ver más
|
|
|
|
|
|
|
Jiaming Song, Xiaojuan Wang, Mingshu He and Lei Jin
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in ...
ver más
|
|
|
|
|
|
|
Chao Liu, Buhong Wang, Zhen Wang, Jiwei Tian, Peng Luo and Yong Yang
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately rec...
ver más
|
|
|
|
|
|
|
Ghizlane Hnini, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy and Hamid Tairi
Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user?s computer system and take a long time to be deleted, which...
ver más
|
|
|
|
|
|
|
Li-Wei Lung and Yu-Ren Wang
A construction site features an open field and complexity and relies mainly on manual labor for construction progress, quality, and field management to facilitate job site coordination and productive results. It has a tremendous impact on the effectivene...
ver más
|
|
|
|
|
|
|
Songnan Chen, Mengxia Tang, Ruifang Dong and Jiangming Kan
The semantic segmentation of outdoor images is the cornerstone of scene understanding and plays a crucial role in the autonomous navigation of robots. Although RGB?D images can provide additional depth information for improving the performance of semanti...
ver más
|
|
|
|
|
|
|
Habib Hussain Zuberi, Songzuo Liu, Muhammad Bilal, Ayman Alharbi, Amar Jaffar, Syed Agha Hussnain Mohsan, Abdulaziz Miyajan and Mohsin Abrar Khan
The excavation of the ocean has led to the submersion of numerous autonomous vehicles and sensors. Hence, there is a growing need for multi-user underwater acoustic communication. On the other hand, due to the limited bandwidth of the underwater acoustic...
ver más
|
|
|
|