News

A method is presented for automated segmentation of vessels in two-dimensional color images of the retina. This method can be used in computer analyses of retinal images, e.g., in automated screening ...
We define hybrid intelligence (HI) as the combination of human and machine intelligence, augmenting human intellect and capabilities instead of replacing them and achieving goals that were unreachable ...
This survey reviews the scientific literature on techniques for reducing interference in real-time multicore systems, focusing on the approaches proposed between 2015 and 2020. It also presents ...
In this article, we introduce an Internet of Things application, smart community, which refers to a paradigmatic class of cyber-physical systems with cooperating objects (i.e., networked smart homes).
In this paper, supereigenvalue and constrained supereigenvalue problems of an addition-min fuzzy matrix are investigated. In a peer-to-peer file sharing system, the download requirement of the ...
A novel ranging technique based on orthogonal frequency division multiplexing (OFDM) is proposed for the ranging systems in space by using the properties of OFDM in time and frequency domains. The ...
This note studies the global robust output regulation problem for a class of nonlinear systems by an output-based event-triggered control law. First, we convert the problem into the event-triggered ...
Object 3D reconstruction from a single-view image is an ill-posed problem. Inferring the self-occluded part of an object makes 3D reconstruction a challenging and ambiguous task. In this paper, we ...
This paper addresses the problem of predicting duration of unplanned power outages, using historical outage records to train a series of neural network predictors. The initial duration prediction is ...
This article proposes a Fast and Compact Ternary LSTM (FaCTLSTM), which bridges the accuracy gap between the full-precision and quantized neural networks.
String matching has sparked renewed research interest due to its usefulness for deep packet inspection in applications such as intrusion detection, virus scanning, and Internet content filtering.
A general formulation of the feeder reconfiguration problem for loss reduction and load balancing is given, and a novel solution method is presented. The solution uses a search over different radial ...