Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Tanmay Kumar Behera"'
Publikováno v:
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Vol 16, Pp 1771-1784 (2023)
Unmanned aerial vehicles (UAVs) are promising remote sensors capable of reforming remote sensing applications. However, for artificial-intelligence-guided tasks, such as land cover mapping and ground-object mapping, most deep-learning-based architect
Externí odkaz:
https://doaj.org/article/4ec4086609f740489858f7667d6a912d
Autor:
Nayan Kumar Subhashis Behera, Michele Nappi, Pankaj Kumar Sa, Tanmay Kumar Behera, Sambit Bakshi
Publikováno v:
Pattern Recognition Letters. 151:163-171
This article presents an overview of how person re-identification can be achieved over the Internet of Biometric Things (IoBT) architecture by enabling technologies and protocols for multimodal biometric authentication leveraging futuristic cues. The
Publikováno v:
IEEE journal of biomedical and health informatics.
Nowadays, brain MR (Magnetic Resonance) images are widely used by clinicians to examine the brain's anatomy to look into various pathological conditions like cerebrovascular incidents and neuro-degenerative diseases. Generally, these diseases can be
Publikováno v:
IT Professional. 23:82-88
Nowadays, most of the available unmanned aerial vehicles (UAVs) are equipped with inbuilt cameras and depth sensors, which are capable of capturing images and videos of high resolution (sometimes with depth information). These images do have a wide r
Publikováno v:
Sustainable Computing: Informatics and Systems. 37:100841
Publikováno v:
Computers and Electronics in Agriculture. 198:107094
Detection of Mobile Phone Fraud Using Possibilistic Fuzzy C-Means Clustering and Hidden Markov Model
Publikováno v:
International Journal of Synthetic Emotions. 7:23-44
This paper presents a novel approach for fraud detection in mobile phone networks by using a combination of Possibilistic Fuzzy C-Means clustering and Hidden Markov Model (HMM). The clustering technique is first applied on two calling features extrac
Publikováno v:
2017 3rd International Conference on Computational Intelligence and Networks (CINE).
Database security has become a prime concern in today's internet world due to the escalation of various web applications and information systems. Ensuring the security of the back-end databases is highly essential for maintaining the confidentiality
Publikováno v:
2017 2nd International Conference for Convergence in Technology (I2CT).
Database security has become a prime concern in today's internet world due to the escalation of various web applications and informationsystems. Ensuring the security of the back-end databases is highlyessential for maintaining the confidentiality an