Infrared Image Fault Identification of Power Equipment Based on Residual Network (Englisch)
- Neue Suche nach: Zhou, Fangrong
- Neue Suche nach: Ma, Yi
- Neue Suche nach: Ma, Yutang
- Neue Suche nach: Pan, Hao
- Neue Suche nach: Barolli, Leonard
- Neue Suche nach: Amato, Flora
- Neue Suche nach: Moscato, Francesco
- Neue Suche nach: Enokido, Tomoya
- Neue Suche nach: Takizawa, Makoto
- Neue Suche nach: Zhou, Fangrong
- Neue Suche nach: Ma, Yi
- Neue Suche nach: Ma, Yutang
- Neue Suche nach: Pan, Hao
In:
Web, Artificial Intelligence and Network Applications
: Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020)
;
Kapitel: 1
;
3-13
;
2020
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Infrared Image Fault Identification of Power Equipment Based on Residual Network
-
Weitere Titelangaben:Advs in Intelligent Syst., Computing
-
Beteiligte:Barolli, Leonard ( Herausgeber:in ) / Amato, Flora ( Herausgeber:in ) / Moscato, Francesco ( Herausgeber:in ) / Enokido, Tomoya ( Herausgeber:in ) / Takizawa, Makoto ( Herausgeber:in ) / Zhou, Fangrong ( Autor:in ) / Ma, Yi ( Autor:in ) / Ma, Yutang ( Autor:in ) / Pan, Hao ( Autor:in )
-
Kongress:Workshops of the International Conference on Advanced Information Networking and Applications ; 2020 ; Caserta, Italy
-
Erschienen in:Web, Artificial Intelligence and Network Applications : Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020) ; Kapitel: 1 ; 3-13Advances in Intelligent Systems and Computing ; 1150 ; 3-13
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:31.03.2020
-
Format / Umfang:11 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Infrared Image Fault Identification of Power Equipment Based on Residual NetworkZhou, Fangrong / Ma, Yi / Ma, Yutang / Pan, Hao et al. | 2020
- 2
-
Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole InternetOdagiri, Kazuya / Shimizu, Shogo / Ishii, Naohiro et al. | 2020
- 3
-
Educational Microclimate Mesonet System DesignRobertson, James / Yang, Jianhua / Scott Gunter, W. / Keres, Peter / Wingate, Thomas / Obando, Anthony et al. | 2020
- 4
-
A Machine to Machine Framework for the Charging of Electric Autonomous VehiclesElbanna, Ziyad / Afanasyev, Ilya / de Araújo, Luiz Jonatã Pires / Hussain, Rasheed / Khazeev, Mansur / Lamptey, Joseph / Mazzara, Manuel / Megha, Swati / Moolchandani, Diksha / Strugar, Dragos et al. | 2020
- 5
-
Atomicity in the Internet of Transactional Things (Io2T)Maamar, Zakaria / Sellami, Mohamed / Baker, Thar / Elnaffar, Said / Alshibly, Maj et al. | 2020
- 6
-
Intrusion Detection Based on Cluster Analysis and Nonsymmetric AutoencoderNie, Junke / An, Wang Xu / Su, Yang / Wang, Bo et al. | 2020
- 7
-
A Taxonomy of Trust Models for Attribute Assurance in Identity ManagementGrüner, Andreas / Mühle, Alexander / Meinig, Michael / Meinel, Christoph et al. | 2020
- 8
-
Design and Development of a New Tea-Making EcosystemDu, Qian / Zhang, Bo / Wang, Jiuru / Zhang, Wenyin / Liu, Weifa et al. | 2020
- 9
-
SDN-Based Replication Management Framework for CCN NetworksFekih, Amna / Fantar, Sonia Gaied / Youssef, Habib et al. | 2020
- 10
-
ConForm: In-Band Control Flows Self-establishment with Integrated Topology Discovery to SDN-Based NetworksFreitas, Marcelo Silva / Rosa, Pedro Frosi / de Oliveira Silva, Flavio et al. | 2020
- 11
-
Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data SetsVäänänen, Olli / Zolotukhin, Mikhail / Hämäläinen, Timo et al. | 2020
- 12
-
Community Detection Based on Social Influence in Large Scale NetworksAmin, Farhan / Choi, Jin-Ghoo / Choi, Gyu Sang et al. | 2020
- 13
-
Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud ComputingZhao, Kaiyang / Wang, Xu An / Liu, Yao / Liu, Jiasen / Zhao, Songyin et al. | 2020
- 14
-
Toward Enforcing Security in Smart Homes Using a Trust-Based SchemeMbarek, Bacem / Jabeur, Nafaa / Pitner, Tomás et al. | 2020
- 15
-
A Survey on Vehicular Fog Computing: Motivation, Architectures, Taxonomy, and IssuesMekki, Tesnim / Jabri, Issam / Chaari, Lamia / Rachedi, Abderrezak et al. | 2020
- 16
-
Design of an Ontology-Oriented Hand Rehabilitation Service Platform for Rheumatoid Arthritis PatientsKu, Hao-Hsiang et al. | 2020
- 17
-
Bitcoin Data Analytics: Exploring Research Avenues and Implementing a Hadoop-Based Analytics FrameworkShah, Raj Sanjay / Bhatia, Ashutosh et al. | 2020
- 18
-
Analysis and Performance Evaluation of Different Methods to Achieve Way-Point Enforcement in Hybrid SDNRathee, Sandhya / Haribabu, K. / Patel, Parth / Bhatia, Ashutosh / Gandhi, Ujjwal et al. | 2020
- 19
-
Deployment of NRF in the Docker and Kubernetes - Based NFV PlatformHuang, Di / Xu, Zhan / Tian, Zhigang et al. | 2020
- 20
-
Textual Statistics and Named Entity Recognition Applied to Game of Thrones NovelsElia, Annibale / Maisto, Alessandro / Martorelli, Giandomenico / Pelosi, Serena / Vitale, Pierluigi et al. | 2020
- 21
-
A Review Towards the Development of Ontology Based Identity and Access Management MetamodelNahar, Kamrun / Gill, Asif Qumer et al. | 2020
- 22
-
Toward Scalable Blockchain for Data Management in VANETsDiallo, El-hacen / Al Agha, Khaldoun / Dib, Omar / Laube, Alexandre / Mohamed-Babou, Hafedh et al. | 2020
- 23
-
A New SDN Architecture Based on Trust Management and Access Control for IoTKammoun, Nadia / Abassi, Ryma / Guemara El Fatmi, Sihem / Mosbah, Mohamed et al. | 2020
- 24
-
Efficient Method for Link Protection Under Multiple Constraints Using ZDDAkasaka, Masataka / Miwa, Hiroyoshi et al. | 2020
- 25
-
Blockchain in WSNs, VANets, IoTs and Healthcare: A SurveyTariq, Fatima / Anwar, Maria / Janjua, Abdul Rehman / Khan, Muhammad Haseeb / Khan, Asad Ullah / Javaid, Nadeem et al. | 2020
- 26
-
A Constructive Review Regarding the Significance of 5G Networks for the Internet of ThingsBocu, Razvan et al. | 2020
- 27
-
Routing Protocol LEACH-K Using K-Means Algorithm in Wireless Sensor NetworkGantassi, Rahma / Gouissem, Bechir Ben / Othmen, Jalel Ben et al. | 2020
- 28
-
Efficient Mechanism of eNB Bandwidth in D2D Communication in 5GBarri, Eirini / Bouras, Christos et al. | 2020
- 29
-
A Blockchain Based Distributed Vehicular Network Architecture for Smart CitiesRehman, Mubariz / Khan, Zahoor Ali / Javed, Muhammad Umar / Iftikhar, Muhammad Zohaib / Majeed, Usman / Bux, Imam / Javaid, Nadeem et al. | 2020
- 30
-
Performance Evaluation of a Message Relaying Method with Enhanced Dynamic Timer in Vehicular DTNIkeda, Makoto / Nakasaki, Shogo / Tada, Yoshiki / Barolli, Leonard et al. | 2020
- 31
-
Indoor Mobile Localization Using Wireless Sensor Networks (WSNs)Bin Waheed, M. Hamza / Rais, Rao Naveed Bin / Khan, Hassan / Bano, Mukhtiar / Gilani, Syed Sherjeel A. et al. | 2020
- 32
-
Performance Evaluation of Routing Protocols for Vehicular AD-HOC Networks Using NS2/SUMOSoumaya, Dardouri / Dardouri, Samia / Ridha, Bouallegue et al. | 2020
- 33
-
SDNHybridMesh: A Hybrid Routing Architecture for SDN Based Wireless Mesh NetworksBano, Mukhtiar / Rais, Rao Naveed Bin / Gilani, Syed Sherjeel A. / Qayyum, Amir et al. | 2020
- 34
-
DSSS Transmission Technique to Joint Radar Sensing and Wireless Communications in V2V SystemAmmar, Khaoula / Ben Haj Belkacem, Oussama / Bouallegue, Ridha et al. | 2020
- 35
-
Classification of Web Applications Using AiFlow FeaturesMercaldo, Nathanael / Lu, Wei et al. | 2020
- 36
-
Proximity-Based Context Information Retrieval for Bluetooth Enabled DevicesKoziakov, Sergey / Mazzara, Manuel et al. | 2020
- 37
-
Cybersecurity Text Data Classification and Optimization for CTI SystemsRodriguez, Ariel / Okamura, Koji et al. | 2020
- 38
-
LG-Starship: A Framework for Text AnalysisMaisto, Alessandro et al. | 2020
- 39
-
Shilling Attacks Detection in Collaborative Recommender System: Challenges and PromiseZayed, Reda A. / Ibrahim, Lamiaa F. / Hefny, Hesham A. / Salman, Hesham A. et al. | 2020
- 40
-
A Face and Posture Recognition Model Using CNN for Adapting Different Resolution ImagesFuma, Hiroakik / Takano, Kosuke et al. | 2020
- 41
-
Factors for Academic Performance PredictionZhang, Linlin / Li, Kin Fun et al. | 2020
- 42
-
Infrared Image Fault Identification Method Based on YOLO Target Detection AlgorithmZhou, Fangrong / Ma, Yi / Ma, Yutang / Pan, Hao et al. | 2020
- 43
-
Electricity Load and Price Forecasting Using Machine Learning Algorithms in Smart Grid: A SurveyArif, Arooj / Javaid, Nadeem / Anwar, Mubbashra / Naeem, Afrah / Gul, Hira / Fareed, Sahiba et al. | 2020
- 44
-
Recurrent Neural Networks Analysis Application Effect of Economy Sentiment on Car ManufacturingMansourbeigi, Seyed M.-H. et al. | 2020
- 45
-
Person Re-identification Based on Camera Style AdaptationZhang, Tong / Xiong, Caiquan et al. | 2020
- 46
-
A Comparison Study of Constriction and Random Inertia Weight Router Replacement Methods for WMNs Using WMN-PSODGA Hybrid Intelligent SystemOhara, Seiji / Barolli, Admir / Ampririt, Phudit / Sakamoto, Shinji / Barolli, Leonard / Takizawa, Makoto et al. | 2020
- 47
-
An Automatic Software Quality and Function Assurance Case Study for AgileHsu, Wei / Lin, Jung-Shan / Chen, Yi-Chi / Wang, Chun-Yen / Huang, Chun-Tuan et al. | 2020
- 48
-
Your Neighbor Knows What You’re Doing: Defending Smart Home IoT Device Traffic from Privacy LAN AttacksDziubinski, Kiana / Bandai, Masaki et al. | 2020
- 49
-
Tile Quality Selection Method in 360-Degree Tile-Based Video StreamingSekine, Arisa / Bandai, Masaki et al. | 2020
- 50
-
DDoS Attacks in Experimental LTE NetworksFeng, Jan / Hong, Bing-Kai / Cheng, Shin-Ming et al. | 2020
- 51
-
Hash Flow: An Access Control Mechanism for Software Defined NetworkChang, Shih-Hao / Pei, Yan / Chung, Ping-Tsai et al. | 2020
- 52
-
Method by Protection to Reduce Probability of Cascade FailureMorino, Yuma / Miwa, Hiroyoshi et al. | 2020
- 53
-
Proposal of a Self-help Support System in a Mega DisasterTaniguchi, Yudai / Ishida, Tomoyuki / Uchida, Noriki / Shibata, Yoshitaka et al. | 2020
- 54
-
Road State Information Platform for Automotive EV in Snow CountryShibata, Yoshitaka / Sakuraba, Akira / Arai, Yoshikazu / Saito, Yoshia / Hakura, Jun et al. | 2020
- 55
-
Social Experimental Evaluation of Road State Information System in Snow CountrySakuraba, Akira / Shibata, Yoshitaka / Sato, Goshi / Uchida, Noriki / Tamura, Toshihiro et al. | 2020
- 56
-
Static Body Detecting Methods by Locational and Rotational Sensors on Smartphone for DTN Based Disaster Information SystemUchida, Noriki / Fukumoto, Misaki / Ishida, Tomoyuki / Shibata, Yoshitaka et al. | 2020
- 57
-
Research on EVM-Based Smart Contract Runtime Self-protection Technology FrameworkYang, WenChuan / Peng, Jing et al. | 2020
- 58
-
Document Business Process Model Extension for Modeling Secure Ubiquitous DocumentsMaroua, Nouioua / Adel, Alti / Belhassen, Zouari et al. | 2020
- 59
-
A Semantic Model Toward Smart IoT Device ManagementAïssaoui, François / Berlemont, Samuel / Douet, Marc / Mezghani, Emna et al. | 2020
- 60
-
A Comparison Study of Control Devices for an Omnidirectional WheelchairMitsugi, Kenshiro / Matsuo, Keita / Barolli, Leonard et al. | 2020
- 61
-
Implementation and Evaluation on Automated E-Learning Contents Creation Based on Natural Language Processing TechniquesWang, Yiyi / Okamura, Koji et al. | 2020
- 62
-
IoT Enabled E-Business via Blockchain Technology Using Ethereum PlatformShehzad, Faisal / Javaid, Nadeem / Farooq, Usman / Tariq, Hamza / Ahmad, Israr / Jabeen, Sadia et al. | 2020
- 63
-
2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack ClassesCatillo, Marta / Rak, Massimiliano / Villano, Umberto et al. | 2020
- 64
-
Digital Divide vs e-Government: Analyzing Italian Public ServiceMarino, Alfonso / Pariso, Paolo et al. | 2020
- 65
-
An Ontology for OASIS TOSCADi Martino, Beniamino / Esposito, Antonio / Nacchia, Stefania / Maisto, Salvatore Augusto / Breitenbücher, Uwe et al. | 2020
- 66
-
Unconventional Usage of a Web-Based Survey: Gathering Quality Data for Green Awareness in LawmakingFerretti, Giuseppe / Renzi, Gianluigi et al. | 2020
- 67
-
A Security-Oriented Architecture for Federated Learning in Cloud EnvironmentsMarulli, Fiammetta / Bellini, Emanuele / Marrone, Stefano et al. | 2020
- 68
-
Examination of Defense Method for Tor User Specific Purpose Attacks by Dummy User Attached CommunicationTakahashi, Motoharu / Narita, Masaki / Inomata, Toshimitsu / Sugino, Eiji et al. | 2020
- 69
-
On Security Information Interaction Model of Smart Grid Emergency SystemDing, Linhua / Wang, Jiuru / Li, Yingkui / Zhang, Wenyin et al. | 2020
- 70
-
An Enhanced Blockchain-Based Data Management Scheme for MicrogridsMbarek, Bacem / Chren, Stanislav / Rossi, Bruno / Pitner, Tomás et al. | 2020
- 71
-
Colluding Android Apps Detection via Model CheckingCasolare, Rosangela / Martinelli, Fabio / Mercaldo, Francesco / Nardone, Vittoria / Santone, Antonella et al. | 2020
- 72
-
A Survey of Blockchain-Based Solutions for Energy IndustryMegha, Swati / Lamptey, Joseph / Salem, Hamza Mohamed / Mazzara, Manuel et al. | 2020
- 73
-
A2ISDIoT: Artificial Intelligent Intrusion Detection System for Software Defined IoT NetworksBen Elhadj, Hadda / Jmal, Rihab / Chelligue, Hajer / Fourati, Lamia Chaari et al. | 2020
- 74
-
A Searchable Encryption Scheme Based on Elliptic CurvesNita, Stefania Loredana / Mihailescu, Marius Iulian et al. | 2020
- 75
-
Control of DoS Attacks During Merging Process Over the Internet of ThingsAlsumayt, Albandari et al. | 2020
- 76
-
Evaluation of Yubimoji Based Gestures for Realizing User Authentication Method Using s-EMGYamaba, Hisaaki / Nagatomo, Yuki / Usuzaki, Shotaro / Takatsuka, Kayoko / Aburada, Kentaro / Katayama, Tetsuro / Park, Mirang / Okazaki, Naonobu et al. | 2020
- 77
-
Comparing API Call Sequence Algorithms for Malware DetectionFicco, Massimo et al. | 2020
- 78
-
Towards a SIP-based DDoS Attack to the 4G NetworkCibin, Nicola / Guerar, Meriem / Merlo, Alessio / Migliardi, Mauro / Verderame, Luca et al. | 2020
- 79
-
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT EcosystemsVerderame, Luca / Caputo, Davide / Migliardi, Mauro / Merlo, Alessio et al. | 2020
- 80
-
ÂB: An Energy Aware Communications Protocol (EACP) for the Internet of Things (IoT)Shaghaghi, Navid / Cameron, Zach / Kniveton, Nicholas / Mayer, Jesse / Tuttle, Will / Ferguson, Peter et al. | 2020
- 81
-
Towards the Use of Generative Adversarial Neural Networks to Attack Online ResourcesCampanile, Lelio / Iacono, Mauro / Martinelli, Fabio / Marulli, Fiammetta / Mastroianni, Michele / Mercaldo, Francesco / Santone, Antonella et al. | 2020
- 82
-
Network Lifetime Efficiency Based on Equal and Unequal Size Clustering StrategiesUllah, Zaib / Gagliardi, Roberto / Gemikonakli, Orhan / Al-Turjman, Fadi et al. | 2020
- 83
-
Unequal Rotating Energy Efficient Clustering for Heterogeneous Devices (UREECHD)Micheletti, Matteo / Gagliardi, Roberto / Marcantoni, Fausto / Aloisio, Alessandro et al. | 2020
- 84
-
On Building Networks with Limited Stretch FactorCicerone, Serafino et al. | 2020
- 85
-
Coverage Subject to a Budget on Multi-Interface Networks with Bounded Carving-WidthAloisio, Alessandro et al. | 2020
- 86
-
Optimal Cluster Head Rotation for Heterogeneous WSNsDe Leone, Renato / Mostarda, Leonardo et al. | 2020
- 87
-
Predicting Probability of Default Under IFRS 9 Through Data Mining TechniquesMartinelli, Fabio / Mercaldo, Francesco / Raucci, Domenico / Santone, Antonella et al. | 2020
- 88
-
Analysis of Data for SCAN ProjectAmato, Alessandra / Giacalone, Marco et al. | 2020
- 89
-
Data Management in the European Project SCANAmato, Alessandra / Giacalone, Marco et al. | 2020
- 90
-
Representing Knowledge on the European Small Claims ProcedureFerraro, Antonino / Giacalone, Marco et al. | 2020
- 91
-
Quality Control in the Process of Data ExtractionAmato, Alessandra / Giacalone, Marco et al. | 2020
- 92
-
A Smart ChatBot for Specialist DomainsCanonico, Roberto / Cozzolino, Giovanni / Ferraro, Antonino / Moscato, Vincenzo / Picariello, Antonio / Sorrentino, Fabio Raimondo / Sperlì, Giancarlo et al. | 2020
- 93
-
Experiencing Museums A Qualitative and Quantitative Description About Igers’ Narration of an Exhibit SpaceEsposito, Francesca / Falco, Mariacristina / Vitale, Pierluigi et al. | 2020
- 94
-
Smart Destination-Based Parking for the Optimization of Waiting TimeBalzano, Marco / Balzano, Walter / Sorrentino, Loredana / Stranieri, Silvia et al. | 2020
- 95
-
Lectures Retrieval: Improving Students’ E-learning Process with a Search Engine Based on ASR ModelBalzano, Walter / Pellecchia, Chiara / Balzano, Marco et al. | 2020
- 96
-
Survey of Educational Cyber RangesDarwish, Omar / Stone, Christopher M. / Karajeh, Ola / Alsinglawi, Belal et al. | 2020
- 97
-
Efficient App Based Smart Door Lock System Using Bluetoothde Lima, Anderson B. / Gurung, Bibek / Farhad, Sardar M. et al. | 2020
- 98
-
Reliable and Convenient Smart Light Control System Using Mobile AppMalik, Hamza / Sapkota, Sabin / Farhad, Sardar M. et al. | 2020
- 99
-
A Survey on Privacy and Security in Mobile Cloud ComputingRana, Anju / Hajati, Farshid et al. | 2020
- 100
-
Prevention of Cross-Site Scripting Attacks in Web ApplicationsElkhodr, Mahmoud / Patel, Jay K. / Mahdavi, Mehregan / Gide, Ergun et al. | 2020
- 101
-
Detection and Mitigation of LFA Attack in SDN-IoT NetworkAllakany, Alaa / Yadav, Geeta / Paul, Kolin / Okamura, Koji et al. | 2020
- 102
-
A Survey on VANETs Routing Protocols for IoT Intelligent Transportation SystemsFotros, Maede / Rezazadeh, Javad / Ameri Sianaki, Omid et al. | 2020
- 103
-
A Security and Privacy-Preserving Path for Enhancing Information Systems that Manage Cross-Cloud ApplicationsVerginadis, Yiannis / Patiniotakis, Ioannis / Prusinski, Marcin / Rozanska, Marta / Schork, Sebastian / Mentzas, Gregoris et al. | 2020
- 104
-
A Context-Aware Security Model for a Combination of Attribute-Based Access Control and Attribute-Based Encryption in the Healthcare DomainPsarra, Evgenia / Verginadis, Yiannis / Patiniotakis, Ioannis / Apostolou, Dimitris / Mentzas, Gregoris et al. | 2020
- 105
-
Flexible 4G/5G Testbed Setup for Mobile Edge Computing Using OpenAirInterface and Open Source MANODreibholz, Thomas et al. | 2020
- 106
-
Spreading the Heat: Multi-cloud Controller for Failover and Cross-Site OffloadingKollberg, Simon / Lakew, Ewnetu Bayuh / Svärd, Petter / Elmroth, Erik / Tordsson, Johan et al. | 2020
- 107
-
Short-Term Load Forecasting Using EEMD-DAE with Enhanced CNN in Smart GridNaeem, Afrah / Gul, Hira / Arif, Arooj / Fareed, Sahiba / Anwar, Mubbashra / Javaid, Nadeem et al. | 2020
- 108
-
Short Term Electricity Price Forecasting Through Convolutional Neural Network (CNN)Khan, Zahoor Ali / Fareed, Sahiba / Anwar, Mubbashra / Naeem, Afrah / Gul, Hira / Arif, Arooj / Javaid, Nadeem et al. | 2020
- 109
-
Big Data Based Electricity Price Forecasting Using Enhanced Convolutional Neural Network in the Smart GridAdil, Muhammad / Javaid, Nadeem / Daood, Nazia / Asim, Muhammad / Ullah, Irfan / Bilal, Muhammad et al. | 2020
- 110
-
Personalized Recommendation Algorithm Based on User Preference and User ProfileZhou, Lei / Xiong, Caiquan / Deng, Na / Shen, Li et al. | 2020
- 111
-
Electricity Price Forecasting Based on Enhanced Convolutional Neural Network in Smart GridDaood, Nazia / Khan, Zahoor Ali / Ashrafullah / Khan, Muhammad Jaffar / Adil, Muhammad / Javaid, Nadeem et al. | 2020
- 112
-
Research on Friend Recommendation Based on Topic Model and Association RulesChen, Xi / Xiong, Caiquan / Deng, Na et al. | 2020
- 113
-
Citrus Brand Classification by CNN Considering Load and SoundKato, Shigeru / Kagawa, Tomomichi / Wada, Naoki / Hino, Takanori / Nobuhara, Hajime et al. | 2020
- 114
-
Design of Optimal PI Controllers Using the Chemical Reaction Optimization Algorithm for Indirect Power Control of a DFIG Model with MPPTCong, Cuong Nguyen / Rodriguez-Jorge, Ricardo / Ba, Nghien Nguyen / Trong, Chuong Trinh / Anh, Nghia Nguyen et al. | 2020
- 115
-
Intelligent HTTP Request Distribution Strategies in One and Two-Layer Architectures of Cloud-Based Web SystemsZatwarnicki, Krzysztof et al. | 2020
- 116
-
Classification of Skin Lesions Shape Asymmetry Using Machine Learning MethodsMilczarski, Piotr / Stawska, Zofia et al. | 2020
- 117
-
Robot Eye Perspective in Perceiving Facial Expressions in Interaction with Children with AutismLandowska, Agnieszka / Robins, Ben et al. | 2020
- 118
-
Prediction of Load Time for Different Agent Locations and BrowsersWrzuszczak-Noga, Jolanta / Borzemski, Leszek et al. | 2020
- 119
-
Rough Set Theory for Optimization of Packet Management Mechanism in IP RoutersMizera-Pietraszko, Jolanta / Tancula, Jolanta / Jozwiak, Ireneusz et al. | 2020
- 120
-
Android Hook Detection Based on Machine Learning and Dynamic AnalysisSzczepanik, Michał / Jóźwiak, Ireneusz J. / Jóźwiak, Piotr P. / Kędziora, Michał / Mizera-Pietraszko, Jolanta et al. | 2020
- 121
-
A New Region Growing Medical Image Segmentation Algorithm Based on Interval Type-2 Fuzzy SetsTabakov, Martin / Jablonski, Bartosz et al. | 2020
- 122
-
GreenCharge Simulation ToolAversa, Rocco / Branco, Dario / Di Martino, Beniamino / Venticinque, Salvatore et al. | 2020
- 123
-
Infrastructure Access Policies to Promote Sustainable Driving Behaviours in Railway ContextsBotte, Marilisa / Tufano, Ilaria / D’Acierno, Luca et al. | 2020
- 124
-
The Effects of Accessibility on the Location of Manufacturing Companies: The Italian Case StudyGallo, Mariano / Marinelli, Mario / Cavaiuolo, Ivan et al. | 2020
- 125
-
An Event-Driven Multi Agent System for Scalable Traffic OptimizationHorn, Geir / Przeźdiȩk, Tomasz / Büscher, Monika / Venticinque, Salvatore / Aversa, Rocco / Martino, Beniamino Di / Esposito, Antonio / Skrzypek, Paweł / Leznik, Mark et al. | 2020
- 126
-
Towards E-mobility: Strengths and Weaknesses of Electric VehiclesCarteni, Armando / Henke, Ilaria / Molitierno, Clorinda / Errico, Assunta et al. | 2020
- 127
-
Stakeholder Motivation Analysis for Smart and Green Charging for Electric MobilityNatvig, Marit / Jiang, Shanshan / Hallsteinsen, Svein et al. | 2020
- 128
-
Simulation Experiments for an Approximate Definition of the Macroscopic Fundamental DiagramPariota, Luigi / Di Costanzo, Luca / Spera, Francesco / Bifulco, Gennaro Nicola et al. | 2020
- 129
-
Behavioral Clustering: A New Approach for Traffic Congestion EvaluationBalzano, Walter / Murano, Aniello / Sorrentino, Loredana / Stranieri, Silvia et al. | 2020
- 130
-
Correction to: An Event-Driven Multi Agent System for Scalable Traffic OptimizationHorn, Geir / Przeźdiȩk, Tomasz / Büscher, Monika / Venticinque, Salvatore / Aversa, Rocco / Martino, Beniamino Di / Esposito, Antonio / Skrzypek, Paweł / Leznik, Mark et al. | 2022