Zobrazeno 1 - 10
of 892
pro vyhledávání: '"Thomas M. Chen"'
FatNet: High-Resolution Kernels for Classification Using Fully Convolutional Optical Neural Networks
Publikováno v:
AI, Vol 4, Iss 2, Pp 361-374 (2023)
This paper describes the transformation of a traditional in silico classification network into an optical fully convolutional neural network with high-resolution feature maps and kernels. When using the free-space 4f system to accelerate the inferenc
Externí odkaz:
https://doaj.org/article/0a13e542d6b946afa205934aa0c95571
Publikováno v:
IEEE Access, Vol 11, Pp 129840-129853 (2023)
Organizations constantly exposed to cyber threats are compelled to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and penetration testing (PT) are widely adopted methods for securi
Externí odkaz:
https://doaj.org/article/c643e4e4f038480987d0dc3d8235ff48
Publikováno v:
Network, Vol 2, Iss 1, Pp 83-105 (2022)
This paper proposes a routing protocol for wireless sensor networks to deal with energy-depleting vampire attacks. This resource-conserving protection against energy-draining (RCPED) protocol is compatible with existing routing protocols to detect ab
Externí odkaz:
https://doaj.org/article/ebbf676eaaff4bdc906c9e08a2a5697d
Autor:
Jamal F. Hwaidi, Thomas M. Chen
Publikováno v:
IEEE Access, Vol 10, Pp 48071-48081 (2022)
The technology of the brain-computer interface (BCI) employs electroencephalogram (EEG) signals to establish direct interaction between the human body and its surroundings with promising applications in medical rehabilitative services and cognitive s
Externí odkaz:
https://doaj.org/article/1dc8b698d0434c9a9e26d85bab17a8e7
Publikováno v:
Journal of Mechanics in Medicine and Biology.
The Cyber threats exposure has created worldwide pressure on organizations to comply with cyber security standards and policies for protecting their digital assets. Vulnerability assessment (VA) and Penetration Testing (PT) are widely adopted Securit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5e9c4ff3a37d7040648a82bc6f44d583
https://doi.org/10.21203/rs.3.rs-2824119/v1
https://doi.org/10.21203/rs.3.rs-2824119/v1
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE).
Publikováno v:
2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT).
Internet of Things (IoT) is promptly spreading and reaching a series of domains, including many industrial applications designed for monitoring purposes. In such networks, sensitive information is being collected and transmitted by IoT devices with l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::956f99a700d4c0abc8086b28f4a0e789
https://openaccess.city.ac.uk/id/eprint/28381/1/2650474.pdf
https://openaccess.city.ac.uk/id/eprint/28381/1/2650474.pdf