Loading [MathJax]/extensions/MathMenu.js
IEEE Xplore Search Results

Showing 1-25 of 6,339 resultsfor

Filter Results

Show

Results

Deepfake is the general expression of fake images or videos. Images and videos created with Deep Neural Networks (DNN) can cause both personal and national problems. Deepfake technology has been making progress day by day. Accordingly, both the detection methods and the diversity of the data sets to be trained are increasing. In this article, datasets created in deepfake technology and application...Show More
Automatic facial expression recognition is an important component for efficient human-computer interaction system, and over the past decades, it has become a highly active research area. Numerous algorithms have been proposed in the literature to cope with the problem of face expression recognition (FER). General speaking, current existing FER methods can be categorized into two main groups, i.e.,...Show More
Automatic facial expression recognition is an important component for efficient human-computer interaction system, and over the past decades, it has become a highly active research area. Numerous algorithms have been proposed in the literature to cope with the problem of face expression recognition (FER). General speaking, current existing FER methods can be categorized into two main groups, i.e.,...Show More
Electrical capacitance tomography exhibits great potentials in the visualization measurement of industrial processes, and high-precision images are of great significance for the reliability and usefulness of measurement results. In this paper, we propose a deep learning-based inversion method to ameliorate the reconstruction accuracy. With the aid of the deep learning methodology, the prior from t...Show More
SUMMARY & CONCLUSIONSBy pressurizing natural gas in pipelines, the compression system interlocks upstream gas production and downstream consumer use. Considering the installation cost of $1 to $2 million US dollars for a compressor, the failure of the component can be costly. Therefore, the anomaly detection for the compression system is essential. In this paper, a deep learning-based anomaly dete...Show More
3D formation drillability field is crucial for drilling optimization and control due to its vital role in describing the spatial formation environment. Conventional geostatistical and machine learning methods are introduced to establish the field. However, the modeling accuracy should be further improved to meet the high-level requirement of drilling engineering. In this paper, a novel deep learni...Show More
Segmentation plays an important role in imagebased plant phenotyping applications. Deep learning has led to a dramatic improvement in segmentation performance. Most deep learning-based methods are supervised and require abundant application-specific training data. Considering the wide range of plant phenotyping applications, such data may not be always available. To mitigate this problem, we intro...Show More
Traffic plays an important role in our society as its state can affect individuals and industries in various ways. Traffic congestion can bring negative impacts to the society and can lead to bigger problems if let be without a solution to mitigate it. Thus, traffic prediction serves as a solution to said problem. In this systematic literature review, AI-based traffic prediction methods are compar...Show More
In the last few years, carbon emissions and energy demand have increased dramatically around the globe due to a surge in population and energy-consuming devices. The integration of renewable energy resources (RERs) in a power supply system provides an efficient solution in terms of low energy cost with lower carbon emissions. However, renewable sources like solar panels have irregular nature of po...Show More
The application of deep learning approaches in medical image registration has decreased the registration time and increased registration accuracy. Most of the learning-based registration approaches considers this task as a one directional problem. As a result, only correspondence from the moving image to the target image is considered. However, in some medical procedures bidirectional registration...Show More
In this paper, we propose a deep algorithm unrolling (DAU) based on a variant of the alternating direction method of multiplier (ADMM) called Plug-and-Play ADMM (PnP-ADMM) for denoising of signals on graphs. DAU is a trainable deep architecture realized by unrolling iterations of an existing optimization algorithm which contains trainable parameters at each layer. We also propose a nested-structur...Show More
With the rapid development of information technology, various software applications are flooding our daily lives. The development of these application software inevitably generates a lot of source code. How to detect and analyze various defects in the source code, such as API/Function call errors, array misuse, and expression syntax error, etc., which is known as source code defect analysis (SCDA)...Show More
The problem of offloading policy is addressed for mobile edge computing (MEC) in this paper. We proposed a deep learning-based partial offloading method to reduce user equipment’s energy consumption and service delay. The proposed method consists of two deep neural networks (DNNs) to find the best partitioning of a single task and their offloading policy, respectively. Multiclass classification is...Show More
The Chinese character generation with specific style is the key of personal calligraphy font generation. In recent years, with the development of artificial intelligence, researchers have used deep learning to solve the calligraphy generation problem, which can automatically generate personal calligraphy fonts. However, the end-to-end approaches possibly generate wrong results in terms of glyph st...Show More
Brachiation is a common way for primates to move between treetops. This movement has the characteristics of adapting to complex, discontinuous environment and low energy consumption. However, traditional control methods are often difficult to complete such tasks where the support is point-contact and discrete. Reinforcement learning (RL) gives a solution to such tasks due to its strong ability to ...Show More
Electromyography (EMG) shows excellent potential for human-machine interaction (HMI) tasks. It reflects the physiological intention of human beings, which contributes to a more intuitive human-machine interface. The sequence of EMG signals acquiring during a period is most commonly used for feature extraction and gesture recognition. The instant EMG graph, which is always thought to be useless due...Show More
Detecting hate speech on social media poses a significant challenge, especially in distinguishing it from offensive language, as learning-based models often struggle due to nuanced differences between them, which leads to frequent misclassifications of hate speech instances, with most research focusing on refining hate speech detection methods. Thus, this paper seeks to know if traditional learnin...Show More
This paper proposes a new deep learning-based framework for fault detection, classification, and location identification simultaneously in shipboard power systems (SPS). Specifically, three different neural networks based fault detection methods, including deep neural network, gated recurrent unit, and long short-term memory, are developed and compared to detect different faults in SPS. The develo...Show More
In the era of big data, text sentiment analysis is of great significance to the analysis of public opinion. In general, there are two broad approaches on sentiment analysis, lexicon-based and machine learning-based method. In fact, sentiment analysis belongs to the classification technique as well. Therefore, this paper also studied the method based on deep learning. This paper implemented three a...Show More
Alzheimer's disease (AD) detection corresponds one of the most powerful and challenging tasks in medical imaging processing. This paper describes the survey of recent AD detection techniques in the last ten years. The process of AD detection can include different stages such as preprocessing, feature extraction, feature selection, dimensionality reduction, segmentation and classification. In this ...Show More
In a multi-robot system, situation assessment evaluates the current situation quantitatively to help decision-makers make the best decision. Conventional situation assessment methods ignore the initiative of each robot, so it often encounters bottlenecks. Collaborative intelligence shows better performance than a single global decision. To address this problem, this work introduces a deep learning...Show More
Fourier Phase retrieval (PR), aiming at recovering a complex-valued signal from its Fourier intensity measurements, has attracted widespread attention due to its importance in many optical imaging applications. Recently, deep learning-based approaches were developed that achieved some success. These approaches require only a single Fourier intensity measurement without the need to impose any addit...Show More
Hashing has been widely used in approximate nearest neighbor search recently. Deep supervised hashing methods are not widely-used because of the lack of labeled data, especially when the domain is transferred. Meanwhile, unsupervised deep hashing models can hardly achieve satisfactory performance due to the lack of reliable similarity signals. Here, we propose a novel deep unsupervised hashing met...Show More
Image registration is a widely-used technique in analysing large scale datasets that are captured through various imaging modalities and techniques in biomedical imaging such as MRI, X-Rays, etc. These datasets are typically collected from various sites and under different imaging protocols using a variety of scanners. Such heterogeneity in the data collection process causes inhomogeneity or varia...Show More
Over the last few decades, rapid progress in AI, machine learning, and deep learning has resulted in new techniques and various tools for manipulating multimedia. Though the technology has been mostly used in legitimate applications such as for entertainment and education, etc., malicious users have also exploited them for unlawful or nefarious purposes. For example, high-quality and realistic fak...Show More