Linked e-resources

Details

Intro
Organization
Preface
Contents
Deep Learning Based Automated Chest X-ray Abnormalities Detection
1 Introduction
2 Related Works
3 Dataset Specifics
4 Approach
4.1 Exploratory Data Analysis
4.2 Data Pre-processing
4.3 Proposed CNN Architectures
4.4 2-Class Classifier Pipeline
5 Results
6 Conclusion
References
Acquisition and Synchronisation of Multi-source Physiological Data Using Microservices and Event-Driven Architecture
1 Introduction
2 Related Works
3 Design of the Architecture
3.1 Acquisition Devices

3.2 Microservices and Event-Driven-Based Architecture
3.3 Synchronisation Strategy
4 Results
5 Conclusions
References
Percutaneous Electrolysis (EPI®), a Promising Technology in the Treatment of Insertional Patellar Tendinopathy in Soccer Players
1 Introduction
2 Material and Methods
3 Results
4 Discussion and Conclusions
References
Ability-Centered Examination of People with Motor Impairments' Interaction with Television Towards More Accessible Smart Home Entertainment Environments
1 Introduction
2 Related Work
3 Study
3.1 Participants

3.2 Motor Abilities
3.3 Measures
4 Results
5 Discussion
6 Conclusion
References
Discovery of Profitable Stock Price Movement Patterns from Various High Utility Pattern Mining
1 Introduction
2 Past Works
3 Methodology
3.1 Definitions
3.2 The Focused High Utility Mining Methods
4 Experiments
4.1 Data and Pre-processing
4.2 Discussions
5 Conclusions
References
Automatic Detection of Oil Spills from SAR Images Using Deep Learning
1 Introduction
2 Dataset and Methods
2.1 Oil Spill Dataset Description
2.2 Semantic Segmentation

2.3 Evaluation Metrics
3 Results
4 Discussion
5 Conclusion
References
Intelligent Appliances for AAL Environments
1 Introduction
1.1 VirtualECare and VirtualECare2
2 Intelligent Appliances
2.1 Virtual Appliance
2.2 Physical Appliance Requirements
3 Conclusions and Future Work
References
Time Series Forecasting for Improving Quality of Life and Ecosystem Services in Smart Cities
1 Introduction
2 Related Works
3 Forecasting Methods for Climate Data
3.1 Description of the Dataset
3.2 Algorithms for Time Series Prediction

4 Experiment and Results
5 Conclusions and Future Work Lines
References
Security of IoT Application Layer: Requirements, Threats, and Solutions
1 Introduction
2 Background and Motivation
2.1 Motivation
3 Security Requirements in IoT Application Layer
3.1 Confidentiality
3.2 Integrity
3.3 Availability
3.4 Authentication and Authorization
4 Security Threats and Solutions in IoT Application Layer
4.1 Focus on IoT Use Cases
5 Open Issues and Future Directions
5.1 The Lack of Comprehensive Security- and/or Privacy-Protecting Frameworks

Browse Subjects

Show more subjects...

Statistics

from
to
Export