You're using an outdated browser. Please upgrade to a modern browser for the best experience.
Subject:
All Disciplines Arts & Humanities Biology & Life Sciences Business & Economics Chemistry & Materials Science Computer Science & Mathematics Engineering Environmental & Earth Sciences Medicine & Pharmacology Physical Sciences Public Health & Healthcare Social Sciences
Sort by:
Most Viewed Latest Alphabetical (A-Z) Alphabetical (Z-A)
Filter:
All Topic Review Biography Peer Reviewed Entry Video Entry
Topic Review
Deep Learning Based Speech Synthesis
Speech synthesis, also known as text-to-speech (TTS), has attracted increasingly more attention. Recent advances on speech synthesis are overwhelmingly contributed by deep learning or even end-to-end techniques which have been utilized to enhance a wide range of application scenarios such as intelligent speech interaction, chatbot or conversational artificial intelligence (AI). For speech synthesis, deep learning based techniques can leverage a large scale of <text, speech> pairs to learn effective feature representations to bridge the gap between text and speech, thus better characterizing the properties of events.
  • 5.7K
  • 08 Apr 2021
Topic Review
Formal Methods for Artificial Intelligence: Opportunities and Challenges
The use of formal approaches in machine learning is becoming increasingly crucial as ML systems are utilized in more critical applications such as autonomous driving and medical diagnosis. Formal methods give a rigorous approach to evaluating the accuracy and reliability of ML systems, which is critical for ensuring their safety and efficacy. Formal approaches, which use mathematical models and logic-based reasoning, can assist discover and eliminate flaws and vulnerabilities in ML systems, lowering the risk of unintended effects and boosting overall performance. As a result, using formal approaches is vital for developing trustworthy ML systems that can be depended on in safety-sensitive applications.
  • 5.3K
  • 22 May 2023
Topic Review
Spiking Neural Networks
Spiking neural networks (SNNs) are artificial neural network models that more closely mimic natural neural networks. In addition to neuronal and synaptic state, SNNs also incorporate the concept of time into their operating model. The idea is that neurons in the SNN do not fire at each propagation cycle (as it happens with typical multi-layer perceptron networks), but rather fire only when a membrane potential – an intrinsic quality of the neuron related to its membrane electrical charge – reaches a specific value. When a neuron fires, it generates a signal which travels to other neurons which, in turn, increase or decrease their potentials in accordance with this signal (ref).
  • 5.3K
  • 13 Oct 2021
Topic Review
Interaction
When people communicate, information is sent, received, and interpreted between the sender  and the receiver. The information exchange often results in a closed loop, where a back and forth information transfer happens between sender and receiver . This, we refer to as an “interaction”. Rather than over a single, sequential channel, this information is often transmitted using multiple channels at once. The multiplicity of channels reduces the risk of interruptions, more so since the information channels are used in parallel, thereby increasing the seamlessness of the process. The redundancy afforded by multichannel communication increases the overall reliability of the communication, and because the decoding is distributed over a larger number of modalities and decoding modules such as sight, sound, and touch, the overall effort is reduced, even though in physical interaction there is a greater number of channels to decode.
  • 5.0K
  • 06 Feb 2022
Topic Review
Deepfake Detection Datasets
Deepfakes are notorious for their unethical and malicious applications to achieve economic, political, and social reputation goals. Although deepfakes were initially associated with entertainment such as movie visual effects, camera filters, and digital avatars, they are defined as “believable generated media by Deep Neural Network” and have evolved into a mainstream tool for facial forgery. With the development of multiple forgery methods, deepfake data are increasing at a annual rate of ~300%. However, the data published online have different forgery qualities. 
  • 4.9K
  • 28 Feb 2024
Topic Review
Intelligent Road Defects Detection Technology
Road defects are important factors affecting traffic safety. In order to improve the identification efficiency of road diseases and the pertinence of maintenance and management, intelligent detection technologies of road diseases have been developed. The problems of high cost and low efficiency of artificial inspection of road diseases are solved efficiently, and the quality of road construction is improved availably. This is not only the guarantee of highway quality but also the guarantee of people’s lives and safety.
  • 4.7K
  • 15 Jun 2022
Topic Review
Recognition Technologies of Hand Gesture
Hand gesture recognition plays a significant part in delivering diverse messages using hand gestures in the digital domain. Real-time hand gesture identification is now possible because of advancements in both imaging technology and image processing algorithmic frameworks.
  • 4.6K
  • 17 Jun 2022
Topic Review
Android Malware Detection Using ML
This systematic review discussed ML-based Android malware detection techniques. It critically evaluated 106 carefully selected articles and highlighted their strengths and weaknesses as well as potential improvements. The ML-based methods for detecting source code vulnerabilities were also discussed, because it might be more difficult to add security after the app is deployed. Therefore, this paper aimed to enable researchers to acquire in-depth knowledge in the field and to identify potential future research and development directions.
  • 4.5K
  • 19 Aug 2021
Topic Review
Distributed Machine Learning in Edge Computing
Distributed edge intelligence is a disruptive research area that enables the execution of machine learning and deep learning (ML/DL) algorithms close to where data are generated. Since edge devices are more limited and heterogeneous than typical cloud devices, many hindrances have to be overcome to fully extract the potential benefits of such an approach (such as data-in-motion analytics).
  • 4.5K
  • 20 Apr 2022
Topic Review
Building Domain-Specific Search Engines
With advances in machine learning, knowledge discovery systems have become very complicated to set up, requiring extensive tuning and programming effort. Democratizing such technology so that non-technical domain experts can avail themselves of these advances in an interactive and personalized way is an important problem. myDIG is a highly modular, open source pipeline-construction system that is specifically geared towards investigative users (e.g., law enforcement) with no programming abilities. The myDIG system allows users both to build a knowledge graph of entities, relationships, and attributes for illicit domains from a raw HTML corpus and also to set up a personalized search interface for analyzing the structured knowledge. Both qualitative and quantitative data from five case studies involving investigative experts from illicit domains, such as securities fraud and illegal firearms sales, have been used to illustrate the potential of myDIG.
  • 4.4K
  • 10 Feb 2021
Topic Review
Damaged QR Code Reconstruction
QR codes often become difficult to recognize due to damage. Traditional restoration methods exhibit a limited effectiveness for severely damaged or densely encoded QR codes, are time-consuming, and have limitations in addressing extensive information loss.
  • 4.4K
  • 02 Nov 2023
Topic Review
Augmented Humanity
Augmented humanity is a human–computer integration technology that proposes to improve capacity and productivity by changing or increasing the normal ranges of human function, through the restoration or extension of human physical, intellectual and social capabilities.
  • 4.4K
  • 07 Feb 2022
Topic Review
Human-Centered Machine Learning
Human-centered Machine Learning (HCML) is about developing adaptable and usable Machine Learning systems for human needs while keeping the human/user at the center of the entire product/service development cycle.
  • 4.4K
  • 06 Oct 2021
Topic Review
Datasets in the Field of Click Fraud Detection
Researchers go over the most relevant datasets to detect and prevent ad click fraud using AI techniques. Private/non-open-source datasets, as well as those related to other fraud types, such as ad or impression fraud, are excluded. 
  • 4.3K
  • 13 Feb 2023
Topic Review
Smart Libraries
With the rapid development of artificial intelligence (AI) and Internet-of-Things (IoT), thousands of smart devices can be interconnected with each other. A series of innovative concepts have emerged and penetrated into all aspects of human life, e.g., “Smarter Planet”, “Smart City”, “Smart Community”, and “Smart Campus”. As a key and indispensable field, librarianship has become a convenient scenario aided by AI and IoT. Distinctive advanced AI-based approaches applied in libraries include, but are not limited to, natural language processing (NLP), deep learning (DL), recommender systems, machine vision, and smart acquisition.
  • 4.3K
  • 19 Apr 2022
Topic Review
DEFLATE
In computing, Deflate is a lossless data compression file format that uses a combination of LZSS and Huffman coding. It was designed by Phil Katz, for version 2 of his PKZIP archiving tool. Deflate was later specified in RFC 1951 (1996). Katz also designed the original algorithm used to construct Deflate streams. This algorithm was patented as U.S. Patent 5,051,745, and assigned to PKWARE, Inc. As stated in the RFC document, an algorithm producing Deflate files was widely thought to be implementable in a manner not covered by patents. This led to its widespread use, for example in gzip compressed files and PNG image files, in addition to the ZIP file format for which Katz originally designed it. The patent has since expired.
  • 4.3K
  • 11 Oct 2022
Topic Review
Battery Modelling Techniques
The battery modelling (BM) problem is a constrained, multi-dimensional, mixed variable, non-convex, non-linear optimisation problem. Many bio-inspired techniques have been successfully employed to estimate the battery parameters. When bio-inspired algorithms are implemented for COM to extract parameters in real time, then they are called grey box models.
  • 4.2K
  • 28 Oct 2021
Topic Review
Driving Mechanisms/Motion of Screw Drive
In recent years, interest in in-pipe robot research has been steadily increasing. This phenomenon reflects the necessity and urgency of pipe inspection and rehabilitation as several pipe networks have become outdated around the globe. In-pipe robots can be divided into several groups in accordance with their locomotion principles, each with its own advantages and best suited application scope. Research on the screw drive in-pipe robot (SDIR) has had a rising trend due to the robot’s simple driving mechanism design and numerous advantages. 
  • 4.2K
  • 09 Nov 2020
Topic Review
YOLOv5-AC
Attention Mechanism-Based Lightweight YOLOv5 for Track Pedestrian Detection. In response to the dangerous behavior of pedestrians roaming freely on unsupervised train tracks, the real-time detection of pedestrians is urgently required to ensure the safety of trains and people. Aiming to improve the low accuracy of railway pedestrian detection, the high missed-detection rate of target pedestrians, and the poor retention of non-redundant boxes, YOLOv5 is adopted as the baseline to improve the effectiveness of pedestrian detection by model pruning, improving attention mechanism, etc.
  • 4.2K
  • 15 Sep 2022
Topic Review
Artificial Intelligence Applications and Self-Learning 6G Networks
Artificial Intelligence (AI), federated and distributed learning, big data analytics, blockchain, and edge-cloud computing has urged the design of the upcoming 6G network generation, due to their stringent requirements in terms of the quality of services (QoS), availability, and dependability to satisfy a Service-Level-Agreement (SLA) for the end users. Industries and academia have started to design 6G networks and propose the use of AI in its protocols and operations. 
  • 4.1K
  • 02 Sep 2022
  • Page
  • of
  • 59
Academic Video Service