|
|
|
Falah Amer Abdulazeez, Ismail Taha Ahmed and Baraa Tareq Hammad
A significant quantity of malware is created on purpose every day. Users of smartphones and computer networks now mostly worry about malware. These days, malware detection is a major concern in the cybersecurity area. Several factors can impact malware d...
ver más
|
|
|
|
|
|
Pengfei Zhao and Ze Liu
The three-dimensional (3D) reconstruction of Electromagnetic Tomography (EMT) is an important task for many applications, such as the non-destructive testing of inner defects in rail systems. Additionally, image reconstruction algorithms utilizing deep l...
ver más
|
|
|
|
|
|
Yong Liu, Xiaohui Yan, Wenying Du, Tianqi Zhang, Xiaopeng Bai and Ruichuan Nan
The current work proposes a novel super-resolution convolutional transposed network (SRCTN) deep learning architecture for downscaling daily climatic variables. The algorithm was established based on a super-resolution convolutional neural network with t...
ver más
|
|
|
|
|
|
Nils Hütten, Miguel Alves Gomes, Florian Hölken, Karlo Andricevic, Richard Meyes and Tobias Meisen
Quality assessment in industrial applications is often carried out through visual inspection, usually performed or supported by human domain experts. However, the manual visual inspection of processes and products is error-prone and expensive. It is ther...
ver más
|
|
|
|
|
|
Jih-Ching Chiu, Guan-Yi Lee, Chih-Yang Hsieh and Qing-You Lin
In computer vision and image processing, the shift from traditional cameras to emerging sensing tools, such as gesture recognition and object detection, addresses privacy concerns. This study navigates the Integrated Sensing and Communication (ISAC) era,...
ver más
|
|
|