Abstract: Strokes are a major cause of disability worldwide, with ischemic and hemorrhagic strokes accounting for the majority of cases. In India, stroke remains the second most common cause of ...
Abstract: Reliable uncertainty estimation has become a crucial requirement for the industrial deployment of deep learning algorithms, particularly in high-risk applications such as autonomous driving ...
Researchers from the Faculty of Engineering at The University of Hong Kong (HKU) have developed two innovative deep-learning ...
Abstract: Hybrid beamforming for massive MIMO systems has attracted much interest due to its potential in next-generation wireless communications. Conventional beamforming methods, such as Matched ...
Abstract: Timely identification of Autism Spectrum Disorder (ASD) is essential for successful intervention, but current diagnostic methods often depend on subjective observations, potentially missing ...
Abstract: The popularity of ride-hailing has grown significantly, making it one of the mainstream modes of transportation. Its core value and competitive advantage largely lie in the precise and ...
Abstract: Early detection of tsunamis is essential for disaster risk reduction and minimizing loss of life. This research introduces an advanced deep learning-based tsunami detection model that ...
The affiliation for Ali R. Abdellah was erroneously given as (5) Department of Electrical Engineering, Faculty of Engineering, Al-Azhar University, Qena/Aswan, Egypt. This affiliation has been removed ...
Abstract: To maintain high standards and efficiency in the age of Industry 4.0, automated production lines must have real-time quality monitoring. Using deep learning techniques to improve real-time ...
Abstract: The city of Palembang is facing a significant increase in traffic density, causing various problems such as congestion. Research was conducted to overcome this problem by using various ...
Abstract: Cybersecurity risks have evolved in the linked digital terrain of today into more complex, frequent, and varied forms. Conventional intrusion detection systems sometimes find it difficult to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results