Stereo matching is one of the longest-standing problems in computer vision with close to 40 years of studies and research. Throughout the years the paradigm has shifted from local, pixel-level decision to various forms of discrete and continuous optimization to data-driven, learning-based methods.Recently, the rise of machine learning and the rapid...
 Emojis are used in Computer Mediated Communication (CMC) as a way to express paralinguistics otherwise missing from text, such as facial expressions or gestures. However, finding an emoji on the ever expanding emoji list is a linear search problem and most users end up using a small subset of emojis that are near the top of the emoji list. Current ...
 As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
 Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
 COVID-19 is a life threatening disease which has a enormous global impact. As the cause of the disease is a novel coronavirus whose gene information is unknown, drugs and vaccines are yet to be found. For the present situation, disease spread analysis and prediction with the help of mathematical and data driven model will be of great help to initia...
 Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
 As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
 The present study aims to elucidate the main variables that increase the level of stress at the beginning of military conscription service using an artificial neural network (ANN)-based prediction model. Random sample data were obtained from one battalion of the Lithuanian Armed Forces, and a survey was conducted to generate data for the training a...
 The manual system of preparing time table in colleges is very time consuming and tedious task which usually ends up with various classes clashing either at identical room or with same teachers having more than one class at a time. Due to manual approach, proper use of resources is neither effective nor efficient. To overcome all these problems we p...
 The Main Objective of this System is to plan a framework to keep up impressive data of the workers, offices, Customer points of interest for any BPO association. Call Center Executer is an undeniably vital ability as the utilization of call focuses turns into a well-known technique for concentrating data administrations, streamlining request taking...
  To investigate call centre management from the perspective of the managers, particularly what the key management responsibilities are in managing call centres and the key performance indicators (KPIs) used in managing call centres. A survey of call centre managers, followed by in-depth interviews. There is confusion over the strategic intent of ...
 This paper considers wireless link scheduling in a new setting: nodes with Energy Harvesting (EH) as well as energy sharing capabilities. We propose a Mixed Integer Linear Program (MILP) to determine 1) the shortest link schedule, whereby active links in the same slot adhere to the physical interference model; 2) the optimal transmission power of a...
 This paper presents a cost-effective, ultra-low-power and highly sensitive wake-up receiver (WuRX) to reduce overall power consumption of Wireless Sensor Networks (WSN). The proposed tuned radio frequency (TRF) receiver (RX) analogue front-end (AFE) incorporates a 400-MHz, low-power, low-noise amplifier (LNA) with a high voltage gain of 50 dB as we...
 The network control plays a vital role in the mega satellite constellation (MSC) to coordinate massive network nodes to ensure the effectiveness and reliability of operations and services for future space wireless communications networks. One of the critical issues in satellite network control is how to design an optimal network control structure (...
 Passwords are pervasively used to authenticate users' identities in mobile apps. To secure passwords against attacks, protection is applied to the password authentication protocol (PAP). The implementation of the protection scheme becomes an important factor in protecting PAP against attacks. We focus on two basic protection in Android, i.e., SSL/T...
 In recent years, the Internet of Things (IoT) has made great progress. The interconnection between IoT and the Internet enables real-time information processing and transaction implementation through heterogeneous intelligent devices. But the security, the privacy, and the reliability of IoT are key challenges that limit its development. The featur...
 This work takes as a starting point a collection of patterns for engineering software for the cloud and tries to find how they are regarded and adopted by professionals. Existing literature assessed the adoption of cloud computing with a focus on business and technological aspects and fall short in grasping a holistic view of the underlying approac...
 In recent years, the investigations on Cyber-Physical Systems~(CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea ...
 With the enormous growth of wireless technology, and location acquisition techniques, a huge amount of spatio-temporal traces are being accumulated. This dataset facilitates varied location-aware services and helps to take real-life decisions. Efficiently handling and processing spatio-temporal queries are necessary to respond in real-time. Process...
 Machine learning is widely used in developing computer-aided diagnosis (CAD) schemes of medical images. However, CAD usually computes large number of image features from the targeted regions, which creates a challenge of how to identify a small and optimal feature vector to build robust machine learning models. In this study, we investigate feasibi...
 ? Curriculum learning (CL) is a training strategy that trains a machine learning model from easier data to harder data, which imitates the meaningful learning order in human curricula. ? As an easy-to-use plug-in, the CL strategy has demonstrated its power in improving the generalization capacity and convergence rate of various models in a wide r...
 Stereo matching is one of the longest-standing problems in computer vision with close to 40 years of studies and research. Throughout the years the paradigm has shifted from local, pixel-level decision to various forms of discrete and continuous optimization to data-driven, learning-based methods. Recently, the rise of machine learning and the rapi...
 With the fast development of various positioning techniques such as Global Position System (GPS), mobile devices and remote sensing, spatio -temporal data has become increasingly available nowadays.Mining valuable knowledge from spatio - temporal data is critically important to many real-world applications including human mobility understanding, sm...
 In the present arena, wildlife and forest departments are facing the problem of movement of animals from forest area to residential area. The number of trees has reduced drastically from the forest that creates an unhealthy environment for animals to survive in the forest. It has been found in a survey that 80% losses are caused due to fire. This c...
 With the explosive growth of mobile data demand, the fifth generation (5G) mobile network would exploit the enormous amount of spectrum in the millimeter wave (mmWave) bands to greatly increase communication capacity. There are fundamental differences between mmWave communications and existing other communication systems, in terms of high propagati...
 With the advancementofweb technology and its growth, there is huge volume of data present in the web for internet users and a lot of data is generated too. Internet has become a platform for online learning, exchanging ideasandsharing opinions. Social networkingsiteslike Twitter, Face book, Google are rapidly gaining popularity as they allow people...
 Rapid growth in numbers of connected devices including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com