Share This Author
Deep Learning for Medical Image Analysis
Different novel methods based on deep learning for brain abnormality detection, recognition, and segmentation for analyzing medical images using deep learning algorithm are explored.
Web Search Personalization Via Social Bookmarking and Tagging
The proposed personalization technique separates data collection and user profiling from the information system whose contents and indexed documents are being searched for, i.e. the search engines, and uses social bookmarking and tagging to re-rank web search results.
Image Captioning with Deep Bidirectional LSTMs
This work presents an end-to-end trainable deep bidirectional LSTM (Long-Short Term Memory) model for image captioning that builds on a deep convolutional neural network and two separate L STM networks and qualitatively analyzes how the models "translate" image to sentence.
A Survey on Essential Components of a Self-Sovereign Identity
Design Thinking: Understand - Improve - Apply
Everybody loves an innovation, an idea that sells. But how do we arrive at such ideas that sell? And is it possible to learn how to become an innovator? Over the years Design Thinking a program…
Punctuation Prediction for Unsegmented Transcript Based on Word Vector
The proposed approach to predict punctuation marks for unsegmented speech transcript is purely lexical, with pre-trained Word Vectors as the only input, and shows its effectiveness by achieving better result than the state-of-the-art lexical solution which works with same type of data, especially when predicting puncuation position only.
Infrastructure as a service security: Challenges and solutions
- W. Dawoud, I. Takouna, C. Meinel
- Computer ScienceThe 7th International Conference on Informatics…
- 28 March 2010
This paper presents an elaborated study of IaaS components' security and determines vulnerabilities and countermeasures, and proposes a Security Model for IAAS (SMI) to guide security assessment and enhancement in IaaA layer.
Algorithms and Data Structures in VLSI Design: OBDD - Foundations and Applications
Intrusion Detection in the Cloud
- S. Roschke, Feng Cheng, C. Meinel
- Computer ScienceEighth IEEE International Conference on…
- 12 December 2009
Several requirements for deploying IDS in the Cloud are summarized and an extensible IDS architecture for being easily used in a distributed cloud infrastructure is proposed.