Linked e-resources

Details

Image, Video Processing and Analysis. Classification and Segmentation Models for Hyperspectral Imaging: An Overview
Exploring Circular Hough Transforms for Detecting Hand Feature Points in Noisy Images from Ghost-Circle Patterns
Occupancy Flow Control: Case Study: Elevator Cabin
Security and IoT. Protecting IoT Devices with Software-defined Networks
Digital Forensic Readiness in IoT: a risk assessment model
System Requirements of Software-defined IoT Networks for Critical Infrastructure
An Optimized IoT-based Waste Collection and Transportation Solution: A Case Study of a Norwegian Municipality
Health and AI. Machine Learning based methodology for Depressive Sentiment Analysis
Simultaneous Artefact-Lesion Extraction for Skin Cancer Diagnosis
A Statistical Study to Analyze the Impact of External Weather on Chronic Pulmonary Infection in South Norway with Machine Learning Algorithms
Deep Learning. Interpretable Option Discovery using Deep Q-Learning and Variational Autoencoders
Evaluating Predictive Deep Learning Models
Pre-trained CNN based deep features with hand-crafted features and patient data for skin lesion classification
Data-Driven Machine Learning Approach for Human Action Recognition Using Skeleton and Optical Flow
Biometrics. Multilingual Voice Impersonation Dataset and Evaluation
A Survey on Unknown Presentation Attack Detection for Fingerprint
Hierarchical Interpolation of Imagenet features for Cross-dataset Presentation Attack Detection
Cross-lingual Speaker Verification: Evaluation On X-Vector Method
Fusion of Texture and Optical Flow using Convolutional Neural Networks for Gender Classification in Videos
Intelligent Environments. A PM 2.5 Forecasting Model Based on Air Pollution and Meteorological Conditions in Neighboring Areas
The Aquatic Surface Robot (AnSweR), a lightweight, low cost, multipurpose unmanned research vessel
Intrusion and Malware Detection. Empirical Analysis of Data Mining Techniques in Network Intrusion Detection Systems
Deep Neural Network based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks
Towards Low Cost and Smart Load Testing as a Service using Containers
Security Guard: An Automated Secure Coding Framework
The multi-objective feature selection in Android malware detection system
AIRLEAs. Border Management Systems: How can they help against pandemics
Translating Ethical Theory into Ethical Action: An Ethic of Responsibility Approach to Value-Oriented Design
An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE
Unsupervised Single Image Super-Resolution using Cycle Generative Adversarial Network
Criminal Network Community Detection in Social Media Forensics
Data Privacy in IoT Equipped Future Smart Homes
Machine Learning and the Legal Framework for the Use of Passenger Name Record Data
Migration-Related Semantic Concepts for the Retrieval of Relevant Video Content.

Browse Subjects

Show more subjects...

Statistics

from
to
Export