Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Edward Yellakuor Baagyere"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 5, Pp 1718-1729 (2022)
Road surface anomaly detection and classification based on crowd-sourced smart phone sensor data has become an important area of research over the last decade due to its potential benefits to road maintenance. Previous studies focused on paved roads
Externí odkaz:
https://doaj.org/article/45001d93b85a41a187e345ae7712b40f
Autor:
Edward Yellakuor Baagyere, Peter Awon-Natemi Agbedemnab, Zhen Qin, Mohammed Ibrahim Daabo, Zhiguang Qin
Publikováno v:
IEEE Access, Vol 8, Pp 100438-100447 (2020)
Over the years, Steganography and Cryptography have been complementary techniques for enforcing security of digital data. The need for the development of robust multi-layered schemes to counter the exponential grow in the power of computing devices t
Externí odkaz:
https://doaj.org/article/8657144d8dba413b8ea432372eb77d98
Autor:
Mighty Abra Ayidzoe, Yongbin Yu, Patrick Kwabena Mensah, Jingye Cai, Edward Yellakuor Baagyere, Faiza Umar Bawah
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 44:3079-3091
Colorectal cancer is the third most diagnosed malignancy in the world. Polyps (either malignant or benign) are the primary cause of colorectal cancer. However, the diagnosis is susceptive to human error, less effective, and falls below recommended le
Publikováno v:
Asian Journal of Research in Computer Science. :228-237
The Internet of Things’ (IoT) market is expected to grow exponentially at the global level in the coming years, due to the proliferation of more reliable and faster networks resulting from the extensive rollout of 5 to 10 G mobile networks. By 2025
Publikováno v:
Information Sciences. 605:267-285
Publikováno v:
Journal of King Saud University - Computer and Information Sciences. 34:1718-1729
Road surface anomaly detection and classification based on crowd-sourced smart phone sensor data has become an important area of research over the last decade due to its potential benefits to road maintenance. Previous studies focused on paved roads
Publikováno v:
Asian Journal of Research in Computer Science. :35-49
There has been a significant attempt to derive supervised learning models for training Spiking Neural Networks (SNN), which is the third and most recent generation of Artificial Neural Network (ANN). Supervised SNN learning models are considered more
Publikováno v:
Asian Journal of Research in Computer Science. :1-14
The possibility of errors being propagated during the encoding process of cryptographic and steganographic schemes is real due to the introduction of noise by ciphering the data from stage to stage. This real possibility therefore requires that an ef
Autor:
Zhiguang Qin, Edward Yellakuor Baagyere, Mohammed Ibrahim Daabo, Zhen Qin, Peter Awon-Natemi Agbedemnab
Publikováno v:
IEEE Access, Vol 8, Pp 100438-100447 (2020)
Over the years, Steganography and Cryptography have been complementary techniques for enforcing security of digital data. The need for the development of robust multi-layered schemes to counter the exponential grow in the power of computing devices t
Autor:
Muhammed Amin Abdullah, Zhiguang Qin, Edward Yellakuor Baagyere, Benjamin Appiah, Kwabena Owusu-Agyemang
Publikováno v:
IEEE Access, Vol 8, Pp 171664-171671 (2020)
Deep Neural Networks (DNNs) classifiers performance degrades under adversarial attacks, such attacks are indistinguishably perturbed relative to the original data. Providing robustness to adversarial attacks is an important challenge in DNN training,