Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Shoeleh, Farzaneh"'
Deep learning techniques are one of the most significant elements of any Artificial Intelligence (AI) services. Recently, these Machine Learning (ML) methods, such as Deep Neural Networks (DNNs), presented exceptional achievement in implementing huma
Externí odkaz:
http://arxiv.org/abs/2103.05590
Autor:
Kaur, Barjinder, Dadkhah, Sajjad, Shoeleh, Farzaneh, Neto, Euclides Carlos Pinto, Xiong, Pulei, Iqbal, Shahrear, Lamontagne, Philippe, Ray, Suprio, Ghorbani, Ali A.
Publikováno v:
In Internet of Things July 2023 22
Autor:
Dadkhah, Sajjad, Shoeleh, Farzaneh, Yadollahi, Mohammad Mehdi, Zhang, Xichen, Ghorbani, Ali A.
Publikováno v:
In Applied Soft Computing Journal June 2021 104
Knowledge representation is a key component to the success of all rule based systems including learning classifier systems (LCSs). This component brings insight into how to partition the problem space what in turn seeks prominent role in generalizati
Externí odkaz:
http://arxiv.org/abs/1506.04002
Autor:
Majd, Mahshid, Shoeleh, Farzaneh
Cephalometric analysis has an important role in dentistry and especially in orthodontics as a treatment planning tool to gauge the size and special relationships of the teeth, jaws and cranium. The first step of using such analyses is localizing some
Externí odkaz:
http://arxiv.org/abs/1506.03936
Autor:
Safi, Miraqa, Dadkhah, Sajjad, Shoeleh, Farzaneh, Mahdikhani, Hassan, Molyneaux, Heather, Ghorbani, Ali A.
Publikováno v:
ACM Transactions on Internet of Things. 3:1-39
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and sys
Autor:
Erfani, Masoud, Shoeleh, Farzaneh, Dadkhah, Sajjad, Kaur, Barjinder, Xiong, Pulei, Iqbal, Shahrear, Ray, Suprio, Ghorbani, Ali A.
Publikováno v:
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech).
Internet of Things (IoT) devices' unique identity and adequate network infrastructure of physical objects em-bedded with software, actuators, and sensors create an open playground for various cybersecurity attacks. Recently, several researchers attem
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Shoeleh, Farzaneh, Asadpour, Masoud
Publikováno v:
In Pattern Recognition Letters 1 February 2017 87:104-116