Recent advances in flotation froth image analysis

C Aldrich, E Avelar, X Liu - Minerals Engineering, 2022 - Elsevier
Abstract Machine vision is widely used in the monitoring of froth flotation plants as a means
to assist control operators on the plant. While these systems have a mature ability to analyse …

Scope of machine learning applications for addressing the challenges in next‐generation wireless networks

RK Samanta, B Sadhukhan… - CAAI Transactions …, 2022 - Wiley Online Library
The convenience of availing quality services at affordable costs anytime and anywhere
makes mobile technology very popular among users. Due to this popularity, there has been …

HashFormer: Vision transformer based deep hashing for image retrieval

T Li, Z Zhang, L Pei, Y Gan - IEEE Signal Processing Letters, 2022 - ieeexplore.ieee.org
Deep image hashing aims to map an input image to compact binary codes by deep neural
network, to enable efficient image retrieval across large-scale dataset. Due to the explosive …

Understand-before-talk (UBT): A semantic communication approach to 6G networks

SR Pokhrel, J Choi - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
In Shannon theory, semantic aspects of communication were identified but considered
irrelevant to the technical communication problems. Semantic communication (SC) …

A deep learning based hybrid framework for day-ahead electricity price forecasting

R Zhang, G Li, Z Ma - IEEE Access, 2020 - ieeexplore.ieee.org
With the deregulation of the electric energy industry, accurate electricity price forecasting
(EPF) is increasingly significant to market participants' bidding strategies and uncertainty risk …

Deep collaborative graph hashing for discriminative image retrieval

Z Zhang, J Wang, L Zhu, Y Luo, G Lu - Pattern Recognition, 2023 - Elsevier
The most striking success of deep hashing for large-scale image retrieval benefits from its
powerful discriminative representation of deep learning and the attractive computational …

Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …

A Mehmood, A Shafique, M Alawida, AN Khan - IEEE Access, 2024 - ieeexplore.ieee.org
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …

Cognitive conformal antenna array exploiting deep reinforcement learning method

B Zhang, C Jin, K Cao, Q Lv… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
A cognitive antenna array, which is designed by using deep reinforcement learning (DRL) is
proposed in this article to adapt to the complex electromagnetic environment. Specifically …

Correlation filtering-based hashing for fine-grained image retrieval

L Ma, X Li, Y Shi, J Wu, Y Zhang - IEEE Signal Processing …, 2020 - ieeexplore.ieee.org
The low storage and strong representation capabilities of hash codes for image retrievalhas
made hashing technologies very popular. Several existing deep hashing methods focuson …

Discrete robust matrix factorization hashing for large-scale cross-media retrieval

T Yao, Y Li, W Guan, G Wang, Y Li… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Cross-media hashing, which encodes data points from different modalities into a common
Hamming space, has been successfully applied to solve large-scale multimedia retrieval …