Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Pallabi Ghosh"'
Autor:
Indranil Ghosh, Muhammad Mahbubur Rashid, Pallabi Ghosh, Shukranul Mawa, Rupal Roy, Md Manjurul Ahsan, Kishor Datta Gupta
Publikováno v:
Technologies, Vol 10, Iss 4, p 82 (2022)
In this paper, a numerical study has been undertaken on the susceptible-infected-recovered (SIR) epidemic model that encompasses the mechanisms of the evolution of disease transmission; a prophylactic vaccination strategy in the susceptible populatio
Externí odkaz:
https://doaj.org/article/fe84a5a0565647d68b22e08f3f0c5d14
Autor:
Indranil Ghosh, Muhammad Mahbubur Rashid, Shukranul Mawa, Rupal Roy, Md Manjurul Ahsan, Muhammad Ramiz Uddin, Kishor Datta Gupta, Pallabi Ghosh
Publikováno v:
Algorithms, Vol 15, Iss 5, p 175 (2022)
The human immunodeficiency virus (HIV) mainly attacks CD4+ T cells in the host. Chronic HIV infection gradually depletes the CD4+ T cell pool, compromising the host’s immunological reaction to invasive infections and ultimately leading to acquired
Externí odkaz:
https://doaj.org/article/cbe7c99e088541cdb41dc098af231c5a
Autor:
Pallabi Ghosh, Gijung Lee, Mengdi Zhu, Olivia P. Dizon-Paradis, Ulbert J. Botero, Damon L. Woodard, Domenic Forte
Electronic counterfeiting is a long-lasting problem that continues to cost original manufacturers billions, fund organized crime, and jeopardize national security and mission-critical infrastructures. Manual inspection is a popular and standardized w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8b966c51c5488a04b949581666b29f6e
https://doi.org/10.21203/rs.3.rs-2697879/v1
https://doi.org/10.21203/rs.3.rs-2697879/v1
Publikováno v:
IEEE Transactions on Information Forensics and Security. 16:5294-5309
A Hierarchical Bloom Filter (HBF) -based biometric framework was recently proposed to provide compact storage, noise tolerance, and fast query processing for resource-constrained environments, e.g., Internet of things (IoT). While security and privac
Publikováno v:
Plant Metal and Metalloid Transporters ISBN: 9789811961021
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7ec77635efccbf68b5dd2bf9c079c51d
https://doi.org/10.1007/978-981-19-6103-8_11
https://doi.org/10.1007/978-981-19-6103-8_11
Publikováno v:
CVPR
Fixed input graphs are a mainstay in approaches that utilize Graph Convolution Networks (GCNs) for knowledge transfer. The standard paradigm is to utilize relationships in the input graph to transfer information using GCNs from training to testing no
Publikováno v:
Journal of Hardware and Systems Security. 3:250-260
Counterfeit integrated circuits (ICs) constitute a major threat to system reliability, as well as security from personal to national scale. Most current techniques for counterfeit electronics detection are expensive, time consuming, and prone to huma
Publikováno v:
IEEE Transactions on Industrial Informatics. 15:1966-1974
Wide proliferation of counterfeit integrated circuits (ICs) is a major global threat. Currently, the process of counterfeit IC detection is time-consuming and requires highly skilled subject matter experts. In this paper, we have developed an automat
Publikováno v:
Emerging Topics in Hardware Security ISBN: 9783030644475
The application of computer vision to hardware security has the potential to address the limitations of both electrical testing and traditional physical inspection approaches to hardware security. This chapter begins by providing an overview of basic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5220b33b58f3fc34dcf7a604a65e4579
https://doi.org/10.1007/978-3-030-64448-2_18
https://doi.org/10.1007/978-3-030-64448-2_18
Publikováno v:
WACV
We propose novel Stacked Spatio-Temporal Graph Convolutional Networks (Stacked-STGCN) for action segmentation, i.e., predicting and localizing a sequence of actions over long videos. We extend the Spatio-Temporal Graph Convolutional Network (STGCN) o