Date


People

Download Available

Library Of Congress

Dewey Decimal

2192 results

Accelerating neural network architecture search using multi-GPU high-performance computing

Journal Article
Lupión, M., Cruz, N. C., Sanjuan, J. F., Paechter, B., & Ortigosa, P. M. (2023)
Accelerating neural network architecture search using multi-GPU high-performance computing. Journal of Supercomputing, 79, 7609-7625. https://doi.org/10.1007/s11227-022-04960-z
Neural networks stand out from artificial intelligence because they can complete challenging tasks, such as image classification. However, designing a neural network for a par...

Quantum Dynamic Optimization Algorithm for Neural Architecture Search on Image Classification

Journal Article
Jin, J., Zhang, Q., He, J., & Yu, H. (2022)
Quantum Dynamic Optimization Algorithm for Neural Architecture Search on Image Classification. Electronics, 11(23), Article 3969. https://doi.org/10.3390/electronics11233969
Deep neural networks have proven to be effective in solving computer vision and natural language processing problems. To fully leverage its power, manually designed network te...

Internet of drones security: taxonomies, open issues, and future directions

Journal Article
Derhab, A., Cheikhrouhou, O., Allouch, A., Koubaa, A., Qureshi, B., Ferrag, M. A., …Khan, F. A. (2023)
Internet of drones security: taxonomies, open issues, and future directions. Vehicular Communications, 39, Article 100552. https://doi.org/10.1016/j.vehcom.2022.100552
Unmanned Aerial Vehicles (UAVs), also known as drones, have recently become one of the most important technological breakthroughs. They have opened the horizon for a vast arra...

Guest Editorial: Special issue on recent developments in advanced mechatronics systems

Journal Article
Meng, L., Deng, M., Yu, H., & Wen, S. (2022)
Guest Editorial: Special issue on recent developments in advanced mechatronics systems. CAAI Transactions on Intelligence Technology, 7(4), 547-548. https://doi.org/10.1049/cit2.12147

DEF-Net: A Dual-Encoder Fusion Network for Fundus Retinal Vessel Segmentation

Journal Article
Li, J., Gao, G., Yang, L., Liu, Y., & Yu, H. (2022)
DEF-Net: A Dual-Encoder Fusion Network for Fundus Retinal Vessel Segmentation. Electronics, 11(22), Article 3810. https://doi.org/10.3390/electronics11223810
The deterioration of numerous eye diseases is highly related to the fundus retinal structures, so the automatic retinal vessel segmentation serves as an essential stage for ef...

From a network model to a model network: strategies for network development to narrow the LIS research-practice gap

Journal Article
Hall, H., Ryan, B., Salzano, R., & Stephen, K. (in press)
From a network model to a model network: strategies for network development to narrow the LIS research-practice gap. Journal of Documentation, https://doi.org/10.1108/JD-04-2022-0088
PURPOSE: The purpose of the empirical study was to examine whether strategies shown to work well in one model of network development for Library and Information Science (LIS) ...

Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications

Journal Article
Ez-zaki, F., Belaid, K. A., Ahmad, S., Belahrach, H., Ghammaz, A., Al-Gburi, A. J. A., & Parachin, N. O. (2022)
Circuit Modelling of Broadband Antenna Using Vector Fitting and Foster Form Approaches for IoT Applications. Electronics, 11(22), Article 3724. https://doi.org/10.3390/electronics11223724
Computation of the broadband antenna impedance behavior requires the wideband lumped equivalent circuit. This work aims to provide a comprehensive study of broadband antenna e...

Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things

Journal Article
Hasan, A., Khan, M. A., Shabir, B., Munir, A., Malik, A. W., Anwar, Z., & Ahmad, J. (2022)
Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Applied Sciences, 12(22), Article 11442. https://doi.org/10.3390/app122211442
The internet of things (IoT) is prone to various types of denial of service (DoS) attacks due to their resource-constrained nature. Extensive research efforts have been dedica...

From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity

Journal Article
Maglaras, L. (2022)
From Mean Time to Failure to Mean Time to Attack/Compromise: Incorporating Reliability into Cybersecurity. Computers, 11(11), Article 159. https://doi.org/10.3390/computers11110159

A robust deep learning approach for tomato plant leaf disease localization and classification

Journal Article
Nawaz, M., Nazir, T., Javed, A., Masood, M., Rashid, J., Kim, J., & Hussain, A. (2022)
A robust deep learning approach for tomato plant leaf disease localization and classification. Scientific Reports, 12(1), Article 18568. https://doi.org/10.1038/s41598-022-21498-5
Tomato plants' disease detection and classification at the earliest stage can save the farmers from expensive crop sprays and can assist in increasing the food quantity. Altho...

Date


Date


Date


Date