12   Artículos

 
en línea
Hayat Ullah and Arslan Munir    
The recognition of human activities using vision-based techniques has become a crucial research field in video analytics. Over the last decade, there have been numerous advancements in deep learning algorithms aimed at accurately detecting complex human ... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Muhammad Ali Shafique, Arslan Munir and Joonho Kong    
Deep learning is employed in many applications, such as computer vision, natural language processing, robotics, and recommender systems. Large and complex neural networks lead to high accuracy; however, they adversely affect many aspects of deep learning... ver más
Revista: AI    Formato: Electrónico

 
en línea
Sujith Gunturu, Arslan Munir, Hayat Ullah, Stephen Welch and Daniel Flippo    
To obtain more consistent measurements through the course of a wheat growing season, we conceived and designed an autonomous robotic platform that performs collision avoidance while navigating in crop rows using spatial artificial intelligence (AI). The ... ver más
Revista: AI    Formato: Electrónico

 
en línea
Arslan Munir, Alexander Aved and Erik Blasch    
Situational awareness (SA) is defined as the perception of entities in the environment, comprehension of their meaning, and projection of their status in near future. From an Air Force perspective, SA refers to the capability to comprehend and project th... ver más
Revista: AI    Formato: Electrónico

 
en línea
Muhammad Aneeq Abid, Naokhaiz Afaqui, Muazzam A. Khan, Muhammad Waseem Akhtar, Asad Waqar Malik, Arslan Munir, Jawad Ahmad and Balawal Shabir    
The Internet of Things (IoT) is a mesh network of interconnected objects with unique identifiers that can transmit data and communicate with one another without the need for human intervention. The IoT has brought the future closer to us. It has opened u... ver más
Revista: AI    Formato: Electrónico

 
en línea
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan    
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon... ver más
Revista: Journal of Low Power Electronics and Applications    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »