125   Artículos

 
en línea
Xiaojuan Wang and Weilan Wang    
As there is a lack of public mark samples of Tibetan historical document image characters at present, this paper proposes an unsupervised Tibetan historical document character recognition method based on deep learning (UD-CNN). Firstly, using the Tibetan... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Pengfei Zhao and Ze Liu    
The three-dimensional (3D) reconstruction of Electromagnetic Tomography (EMT) is an important task for many applications, such as the non-destructive testing of inner defects in rail systems. Additionally, image reconstruction algorithms utilizing deep l... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Chenhong Yan, Shefeng Yan, Tianyi Yao, Yang Yu, Guang Pan, Lu Liu, Mou Wang and Jisheng Bai    
Ship-radiated noise classification is critical in ocean acoustics. Recently, the feature extraction method combined with time?frequency spectrograms and convolutional neural networks (CNNs) has effectively described the differences between various underw... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Monika Rybczak and Krystian Kozakiewicz    
Today, specific convolution neural network (CNN) models assigned to specific tasks are often used. In this article, the authors explored three models: MobileNet, EfficientNetB0, and InceptionV3 combined. The authors were interested in investigating how q... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Jiaming Song, Xiaojuan Wang, Mingshu He and Lei Jin    
In computer networks, Network Intrusion Detection System (NIDS) plays a very important role in identifying intrusion behaviors. NIDS can identify abnormal behaviors by analyzing network traffic. However, the performance of classifier is not very good in ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Chao Liu, Buhong Wang, Zhen Wang, Jiwei Tian, Peng Luo and Yong Yang    
With the development of the air traffic management system (ATM), the cyber threat for ATM is becoming more and more serious. The recognition of ATM cyber threat entities is an important task, which can help ATM security experts quickly and accurately rec... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Ghizlane Hnini, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy and Hamid Tairi    
Spammers have created a new kind of electronic mail (e-mail) called image-based spam to bypass text-based spam filters. Unfortunately, these images contain harmful links that can infect the user?s computer system and take a long time to be deleted, which... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Li-Wei Lung and Yu-Ren Wang    
A construction site features an open field and complexity and relies mainly on manual labor for construction progress, quality, and field management to facilitate job site coordination and productive results. It has a tremendous impact on the effectivene... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Songnan Chen, Mengxia Tang, Ruifang Dong and Jiangming Kan    
The semantic segmentation of outdoor images is the cornerstone of scene understanding and plays a crucial role in the autonomous navigation of robots. Although RGB?D images can provide additional depth information for improving the performance of semanti... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Habib Hussain Zuberi, Songzuo Liu, Muhammad Bilal, Ayman Alharbi, Amar Jaffar, Syed Agha Hussnain Mohsan, Abdulaziz Miyajan and Mohsin Abrar Khan    
The excavation of the ocean has led to the submersion of numerous autonomous vehicles and sensors. Hence, there is a growing need for multi-user underwater acoustic communication. On the other hand, due to the limited bandwidth of the underwater acoustic... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

« Anterior     Página: 1 de 8     Siguiente »