Zobrazeno 1 - 10
of 615
pro vyhledávání: '"Khan Awais"'
Autor:
Uz Zaman Atteeq, Khan Awais, Zaman Fatima, Khan Muhammad Moheen, Farooq Umar, Shehbaz Tauheed, Karim Muhammad Ramzan Abdul
Publikováno v:
MATEC Web of Conferences, Vol 381, p 02009 (2023)
In this work, pure nickel was reinforced with various contents of h-BN (4 & 8wt.%) and SiC (2, 4, 6 & 8wt.%) prepared via PM route. The synergistic effect of h-BN and SiC on mechanical and microstructural behaviour was investigated. The microstructur
Externí odkaz:
https://doaj.org/article/b0af5efd88d2457a9a5d813ce9ab924b
Autor:
Khan, Awais Hameed, Kegalle, Hiruni, D'Silva, Rhea, Watt, Ned, Whelan-Shamy, Daniel, Ghahremanlou, Lida, Magee, Liam
Publikováno v:
Microsoft Journal for Applied Research, Vol 21 (2024), pp 69 - 87
Large Language Models (LLMs) are promising analytical tools. They can augment human epistemic, cognitive and reasoning abilities, and support 'sensemaking', making sense of a complex environment or subject by analysing large volumes of data with a se
Externí odkaz:
http://arxiv.org/abs/2405.06919
Autor:
Kim, Yoochan, Kim, Kihyun, Cho, Yonghyeon, Kim, Jinwoo, Khan, Awais, Kang, Ki-Dong, An, Baik-Song, Cha, Myung-Hoon, Kim, Hong-Yeon, Kim, Youngjae
Distributed Deep Learning (DDL), as a paradigm, dictates the use of GPU-based clusters as the optimal infrastructure for training large-scale Deep Neural Networks (DNNs). However, the high cost of such resources makes them inaccessible to many users.
Externí odkaz:
http://arxiv.org/abs/2403.05861
Autor:
Thiele Graham, Khan Awais, Heider Bettina, Kroschel Jürgen, Harahagazwe Dieudonné, Andrade Maria, Bonierbale Merideth, Friedmann Michael, Gemenet Dorcus, Cherinet Mihiretu, Quiroz Roberto, Faye Emile, Dangles Olivier
Publikováno v:
Open Agriculture, Vol 2, Iss 1, Pp 350-361 (2017)
The CGIAR Research Program (CRP) on Roots, Tubers and Bananas (RTB) includes vegetatively propagated staple crops linked by common breeding, seed, and postharvest issues, and by the frequency with which women are involved in their production and use.
Externí odkaz:
https://doaj.org/article/4c45f9cee1134d9e957bebdbb01783a2
Autor:
Khan, Awais, Malik, Khalid Mahmood
The Automatic Speaker Verification (ASV) system is vulnerable to fraudulent activities using audio deepfakes, also known as logical-access voice spoofing attacks. These deepfakes pose a concerning threat to voice biometrics due to recent advancements
Externí odkaz:
http://arxiv.org/abs/2310.03856
Autor:
Khan, Awais, Malik, Khalid Mahmood
Automatic Speaker Verification (ASV) systems are increasingly used in voice bio-metrics for user authentication but are susceptible to logical and physical spoofing attacks, posing security risks. Existing research mainly tackles logical or physical
Externí odkaz:
http://arxiv.org/abs/2309.10560
Voice spoofing attacks pose a significant threat to automated speaker verification systems. Existing anti-spoofing methods often simulate specific attack types, such as synthetic or replay attacks. However, in real-world scenarios, the countermeasure
Externí odkaz:
http://arxiv.org/abs/2309.09837
Maker culture and DIY practices are central to democratizing the design of technology; enabling non-designers (future end-users) to actively participate in the design process. However, little is known about how individuals from under-resourced commun
Externí odkaz:
http://arxiv.org/abs/2302.10402
Publikováno v:
MATEC Web of Conferences, Vol 160, p 02010 (2018)
In this modern era electricity is the major component of human life. Its play a vital role to facilitate the human life by operating all modern electrical equipment. The consumption of electricity increases rapidly due to its uses in the domestic and
Externí odkaz:
https://doaj.org/article/c411cda8f934406d8d82cc21518d5c72