Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Deep learning

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 57

Full-Text Articles in Artificial Intelligence and Robotics

Action Recognition Model Of Directed Attention Based On Cosine Similarity, Chen Li, Ming He, Chen Dong, Wei Li Jan 2024

Action Recognition Model Of Directed Attention Based On Cosine Similarity, Chen Li, Ming He, Chen Dong, Wei Li

Journal of System Simulation

Abstract: Aiming at the lack of directionality of traditional dot product attention, this paper proposes a directed attention model (DAM) based on cosine similarity. To effectively represent the direction relationship between the spatial and temporal features of video frames, the paper defines the relationship function in the attention mechanism using the cosine similarity theory, which can remove the absolute value of the relationship between features. To reduce the computational burden of the attention mechanism, the operation is decomposed from two dimensions of time and space. The computational complexity is further optimized by combining linear attention operation. The experiment is divided …


Style Transfer Network For Generating Opera Makeup Details, Fengquan Zhang, Duo Cao, Xiaohan Ma, Baijun Chen, Jiangxiao Zhang Sep 2023

Style Transfer Network For Generating Opera Makeup Details, Fengquan Zhang, Duo Cao, Xiaohan Ma, Baijun Chen, Jiangxiao Zhang

Journal of System Simulation

Abstract: To address the problem of the loss of local style details in cross-domain image simulation, a ChinOperaGAN network framework suitable for opera makeup is designed from the perspective of protecting the excellent traditional culture. In order to solve the style translation of differences in two image domains, multiple overlapping local adversarial discriminators are proposed in the generative adversarial network. Since paired opera makeup data are difficult to obtain, a synthetic image is generated by combining the source image makeup mapping to effectively guide the transfer of local makeup details between images. In view of the characteristics of opera makeup …


Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego May 2023

Wearable Sensor Gait Analysis For Fall Detection Using Deep Learning Methods, Haben Girmay Yhdego

Electrical & Computer Engineering Theses & Dissertations

World Health Organization (WHO) data show that around 684,000 people die from falls yearly, making it the second-highest mortality rate after traffic accidents [1]. Early detection of falls, followed by pneumatic protection, is one of the most effective means of ensuring the safety of the elderly. In light of the recent widespread adoption of wearable sensors, it has become increasingly critical that fall detection models are developed that can effectively process large and sequential sensor signal data. Several researchers have recently developed fall detection algorithms based on wearable sensor data. However, real-time fall detection remains challenging because of the wide …


Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni May 2023

Enhanced Iot-Based Electrocardiogram Monitoring System With Deep Learning, Jian Ni

UNLV Theses, Dissertations, Professional Papers, and Capstones

Due to the rapid development of computing and sensing technologies, Internet of Things (IoT)-based cardiac monitoring plays a crucial role in providing patients with cost-efficient solutions for long-term, continuous, and pervasive electrocardiogram (ECG) monitoring outside a hospital setting. In a typical IoT-based ECG monitoring system, ECG signals are picked up by sensors located on the edge, and then uploaded to the remote cloud servers. ECG interpretation is performed for the collected ECGs in the cloud servers and the analysis results can be made instantly available to the patients as well as their healthcare providers.In this dissertation, we first examine the …


Modulation Recognition Method Of Mixed Signal Based On Intelligent Analysis Of Cyclic Spectrum Section, Yu Du, Xinquan Yang, Jianhua Zhang, Suchun Yuan, Huachao Xiao, Jingjing Yuan Jan 2023

Modulation Recognition Method Of Mixed Signal Based On Intelligent Analysis Of Cyclic Spectrum Section, Yu Du, Xinquan Yang, Jianhua Zhang, Suchun Yuan, Huachao Xiao, Jingjing Yuan

Journal of System Simulation

Abstract: Aiming at the problems of low intelligence and poor adaptability for the existing mixed signal recognition methods, an intelligent recognition method based on cyclic spectral cross section and deep learning is proposed. For common mixed communication signals, the characteristics of zero frequency cross section of cyclic spectrum are theoretically deduced and analyzed. Two new pre-processing methods, nonlinear segmental mapping and directional pseudo-clustering are proposed, which can effectively improve the adaptability and consistency of cross section features. The pre-processed feature graph is combined with the residual network (ResNet), and the deep learning network is used to mine and analyze the …


Research On Intelligent Prediction Method Of Wargaming Air Mission, Dayong Zhang, Jingyu Yang, Xi Wu Jan 2023

Research On Intelligent Prediction Method Of Wargaming Air Mission, Dayong Zhang, Jingyu Yang, Xi Wu

Journal of System Simulation

Abstract: The efficient, accurate and automatic judgment of the combat mission or intention of the enemy's air targets in the battlefield is the basis of situation awareness and the key to the allocation of auxiliary combat resources. Combined with the calculation characteristics of feed forward deep neural network and long-term and short-term memory network model, two targeted basic index learners are designed, and then the weighted combination is carried out according to the cross entropy of the basic index, which can be used to further train the evaluation index of the learner. It can not only effectively prevent the model …


Adversarial Training Of Deep Neural Networks, Anabetsy Termini Jan 2023

Adversarial Training Of Deep Neural Networks, Anabetsy Termini

CCE Theses and Dissertations

Deep neural networks used for image classification are highly susceptible to adversarial attacks. The de facto method to increase adversarial robustness is to train neural networks with a mixture of adversarial images and unperturbed images. However, this method leads to robust overfitting, where the network primarily learns to recognize one specific type of attack used to generate the images while remaining vulnerable to others after training. In this dissertation, we performed a rigorous study to understand whether combinations of state of the art data augmentation methods with Stochastic Weight Averaging improve adversarial robustness and diminish adversarial overfitting across a wide …


Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty Jan 2023

Security Of Internet Of Things (Iot) Using Federated Learning And Deep Learning — Recent Advancements, Issues And Prospects, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty

Electrical & Computer Engineering Faculty Publications

There is a great demand for an efficient security framework which can secure IoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IoT considering the dynamic and distributed nature of IoT. This motivates the researchers to focus more on investigating the role of machine learning (ML) in the designing of security models. A brief analysis of different ML algorithms for IoT security is discussed along with the advantages and limitations of ML algorithms. Existing studies state that ML algorithms suffer from the problem of high computational overhead and risk of privacy leakage. …


A Wind Turbine Fault Diagnosis Method Based On Siamese Deep Neural Network, Jiarui Liu, Guotian Yang, Xiaowei Wang Nov 2022

A Wind Turbine Fault Diagnosis Method Based On Siamese Deep Neural Network, Jiarui Liu, Guotian Yang, Xiaowei Wang

Journal of System Simulation

Abstract: In order to effectively extract the fault features of time series data in supervisory control and data acquisition (SCADA), considering the advantages of one-dimensional convolutional neural network (1-D CNN) for extracting local time series features and the advantages of long-term memory (LSTM) which can extract long-term dependent features, a method for fault diagnosis of wind turbines based on 1-D CNN-LSTM is proposed. To solve the problem of the scarcity of fault samples of wind turbines based on the siamese network architecture, a wind fault diagnosis method based on siamese 1-D CNN-LSTM is proposed. The proposed siamese 1-D CNN-LSTM …


Fatigue Detection Method Based On Facial Features And Head Posture, Rongxiu Lu, Bihao Zhang, Zhenlong Mo Oct 2022

Fatigue Detection Method Based On Facial Features And Head Posture, Rongxiu Lu, Bihao Zhang, Zhenlong Mo

Journal of System Simulation

Abstract: Aiming at the of the single fatigue characteristics, low robustness and inability to customize fatigue thresholds for different drivers of fatigue detection methods, a method based on facial features and head posture is proposed. In face detection and face key point positioning HOG feature operator and regression tree algorithm are used. In head posture estimation, head posture Euler angle is estimated by combining the face key points with the coordinate system transformation. In fatigue feature extraction, a deep residual neural network model is established to extract the eye fatigue features, which the eye, mouth aspect ratio and head posture …


Electrical Resistance Tomography And Flow Pattern Identification Method Based On Deep Residual Neural Network, Weiguo Tong, Shichao Zeng, Lifeng Zhang, Zhe Hou, Jiayue Guo Sep 2022

Electrical Resistance Tomography And Flow Pattern Identification Method Based On Deep Residual Neural Network, Weiguo Tong, Shichao Zeng, Lifeng Zhang, Zhe Hou, Jiayue Guo

Journal of System Simulation

Abstract: Aiming at the low accuracy of inverse problem imaging and flow pattern recognition in electrical resistance tomography (ERT), a two-phase flow electrical resistance tomography and flow pattern recognition method based on the deep residual neural network is proposed. The finite element method is used to model the ERT forward problem to construct the "boundary voltage-conductivity distribution-flow pattern category" dataset of various gas-liquid two-phase flow distributions. The residual neural network for ERT image reconstruction and flow pattern identification of gas-liquid two-phase flow is built and trained. The two outputs of the residual neural network are processed respectively to obtain …


Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche Aug 2022

Computer Aided Diagnosis System For Breast Cancer Using Deep Learning., Asma Baccouche

Electronic Theses and Dissertations

The recent rise of big data technology surrounding the electronic systems and developed toolkits gave birth to new promises for Artificial Intelligence (AI). With the continuous use of data-centric systems and machines in our lives, such as social media, surveys, emails, reports, etc., there is no doubt that data has gained the center of attention by scientists and motivated them to provide more decision-making and operational support systems across multiple domains. With the recent breakthroughs in artificial intelligence, the use of machine learning and deep learning models have achieved remarkable advances in computer vision, ecommerce, cybersecurity, and healthcare. Particularly, numerous …


Aerial Target Threat Assessment Method Based On Deep Learning, Huimin Chai, Yong Zhang, Xinyue Li, Yanan Song Jul 2022

Aerial Target Threat Assessment Method Based On Deep Learning, Huimin Chai, Yong Zhang, Xinyue Li, Yanan Song

Journal of System Simulation

Abstract: Due to many factors of aerial target threat assessment and the lack of self-learning ability of current assessment methods, a deep neural network model for aerial target threat assessment is established using deep learning theory. In order to improve the fitting effect of the model training, a symmetric pre-training method is given. The hidden layers of the model are pre-trained layer by layer, and finally the whole model is trained. Sample data and air to air simulation scene experiments are carried out respectively. The experiments results show that the accuracy of the model using the symmetric pre-training method is …


Radar Remote Sensing Data Augmentation Method Based On Generative Adversarial Network, Xu Kang, Xiaofeng Zhang Apr 2022

Radar Remote Sensing Data Augmentation Method Based On Generative Adversarial Network, Xu Kang, Xiaofeng Zhang

Journal of System Simulation

Abstract: In the research field of radar remote sensing, both the completeness and diversity of radar data samples cannot meet the requirement of effective training of deep learning models, and the models are prone to over-fitting, which significantly limits the wide application of deep learning techniques in this field. Targeting on the needs of intelligent application in radar remote sensing, a microwave imaging radar suited data augmentation method is proposed to solve the issue of insufficient radar data samples by leveraging the general framework of generative adversarial network. Aiming at the features of radar samples being not obvious, the label …


Brief Review On Applying Reinforcement Learning To Job Shop Scheduling Problems, Xiaohan Wang, Zhang Lin, Ren Lei, Kunyu Xie, Kunyu Wang, Ye Fei, Chen Zhen Jan 2022

Brief Review On Applying Reinforcement Learning To Job Shop Scheduling Problems, Xiaohan Wang, Zhang Lin, Ren Lei, Kunyu Xie, Kunyu Wang, Ye Fei, Chen Zhen

Journal of System Simulation

Abstract: Reinforcement Learning (RL) achieves lower time response and better model generalization in Job Shop Scheduling Problem (JSSP). To explain the current overall research status of JSSP based on RL, summarize the current scheduling framework based on RL, and lay the foundation for follow-up research, the backgrounds of JSSP and RL are introduced. Two simulation techniques commonly used in JSSP are analyzed and two commonly used frameworks for RL to solve JSSP are given. In addition, some existing challenges are pointed out, and related research progress is introduced from three aspects: direct scheduling, feature representation-based scheduling, and parameter search-based scheduling.


Variety Recognition Based On Deep Learning And Double-Sided Characteristics Of Maize Kernel, Feng Xiao, Zhang Hui, Zhou Rui, Qiao Lu, Wei Dong, Dandan Li, Yuyao Zhang, Guoqing Zheng Jan 2022

Variety Recognition Based On Deep Learning And Double-Sided Characteristics Of Maize Kernel, Feng Xiao, Zhang Hui, Zhou Rui, Qiao Lu, Wei Dong, Dandan Li, Yuyao Zhang, Guoqing Zheng

Journal of System Simulation

Abstract: In order to construct a maize kernel variety recognition model with high recognition accuracy and suitable for mobile phone application, a mobile phone is used to obtain maize kernel double-sided (embryonic and non-embryonic) images. Based on the lightweight convolutional neural network MobileNetV2 and transfer learning, a maize kernel image variety recognition model is constructed. In view of the existing research methods are mainly for single-sided recognition of maize kernel variety, the performance of single-sided and double-sided characteristics modeling and recognition is compared. The results show that the double-sided recognition accuracy of maize kernel double-sided characteristics modeling is 99.83%, which …


Study On Prediction Of Crystal Properties Based On Deep Learning, Buwei Wang, Wang Min, Fan Qian, Ya'nan Wang, Hanwen Zhang, Yunliang Yue Jan 2022

Study On Prediction Of Crystal Properties Based On Deep Learning, Buwei Wang, Wang Min, Fan Qian, Ya'nan Wang, Hanwen Zhang, Yunliang Yue

Journal of System Simulation

Abstract: Predicting crystal properties using traditional machine learning methods requires complex feature engineering. In order to bypass time-consuming feature engineering, element network (ElemNet), representation learning from stoichiometry (Roost), compositionally-restricted attention-based network (CrabNet) and crystal graph convolution neural network (CGCNN) based on deep learning technology are used to simulate the formation energy, total energy per atom, band gap, and Fermi energy of crystal. The residual learning is introduced into CGCNN, and a crystal graph convolution residual neural network (CGCRN) is proposed. In the CGCRN, the number of hidden layers and the number of nodes in the hidden layers are increased, …


Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu Jan 2022

Bfv-Based Homomorphic Encryption For Privacy-Preserving Cnn Models, Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu

Engineering Technology Faculty Publications

Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated across numerous machines in federated learning, and the learning process is collaborative. There are numerous privacy attacks on deep learning (DL) models that attackers can use to obtain sensitive information. As a result, the DL model should be safeguarded from adversarial attacks, particularly in medical data applications. Homomorphic encryption-based model security from the adversarial collaborator is one of the answers …


Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler Dec 2021

Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler

Computer Science and Computer Engineering Undergraduate Honors Theses

Sounds with a high level of stationarity, also known as sound textures, have perceptually relevant features which can be captured by stimulus-computable models. This makes texture-like sounds, such as those made by rain, wind, and fire, an appealing test case for understanding the underlying mechanisms of auditory recognition. Previous auditory texture models typically measured statistics from auditory filter bank representations, and the statistics they used were somewhat ad-hoc, hand-engineered through a process of trial and error. Here, we investigate whether a better auditory texture representation can be obtained via contrastive learning, taking advantage of the stationarity of auditory textures to …


Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang Dec 2021

Joint Linear And Nonlinear Computation With Data Encryption For Efficient Privacy-Preserving Deep Learning, Qiao Zhang

Electrical & Computer Engineering Theses & Dissertations

Deep Learning (DL) has shown unrivalled performance in many applications such as image classification, speech recognition, anomalous detection, and business analytics. While end users and enterprises own enormous data, DL talents and computing power are mostly gathered in technology giants having cloud servers. Thus, data owners, i.e., the clients, are motivated to outsource their data, along with computationally-intensive tasks, to the server in order to leverage the server’s abundant computation resources and DL talents for developing cost-effective DL solutions. However, trust is required between the server and the client to finish the computation tasks (e.g., conducting inference for the newly-input …


Research On The Network Of 3d Smoke Flow Super-Resolution Data Generation, Jinlian Du, Shufei Li, Xueyun Jin Oct 2021

Research On The Network Of 3d Smoke Flow Super-Resolution Data Generation, Jinlian Du, Shufei Li, Xueyun Jin

Journal of System Simulation

Abstract: Aiming at the problem of low data generation efficiency due to the high complexity of solving the N-S equation of smoke flow field, a deep learning model which can generate high-resolution smoke flow data based on low-resolution smoke flow data solved by N-S equation is explored and designed. Based on the Generative Adversarial Network, the smoke data reconstruction network based on the sub voxel convolution layer is constructed. Considering the fluidity of smoke, time loss based on advection step is introduced into the loss function to realize high-precision smoke simulation. By extending the image super-resolution quality evaluation index, the …


Research On Intrusion Detection Based On Stacked Autoencoder And Long-Short Memory, Lin Shuo, An Lei, Zhijun Gao, Shan Dan, Wenli Shang Jun 2021

Research On Intrusion Detection Based On Stacked Autoencoder And Long-Short Memory, Lin Shuo, An Lei, Zhijun Gao, Shan Dan, Wenli Shang

Journal of System Simulation

Abstract: As network attacks increasingly hidden, intelligent and complex. Simple machine learning cannot deal with attacks timely. A deep learning method based on the combination of SDAE and LSTM is proposed. Firstly, the distribution rules of network data are extracted intelligently layer by layer by SDAE, and the diverse anomaly features of high-dimensional data ate extracted by using coefficient penalty and reconstruction error of each coding layer. Then, LSTM’ s memory function and the powerful learning ability of sequence data are used to classify learning depth. Finally, the experiments are carried out with the UNSW-NB15 data set, which is analyzed …


Creating Synthetic Satellite Cloud Data Based On Gan Method, Wencong Cheng, Xiaokang Shi, Zhigang Wang Jun 2021

Creating Synthetic Satellite Cloud Data Based On Gan Method, Wencong Cheng, Xiaokang Shi, Zhigang Wang

Journal of System Simulation

Abstract: To create the synthetic satellite cloud data in the domain of Meteorology, a method based on Generative Adversarial Networks (GAN) is proposed. Depending on ability of the nonlinear mapping and the information extraction of raster data with the deep learning network, a deep generative adversarial network model is proposed to extract the corresponding information between the numerical weather prediction(NWP) products and the satellite cloud data, and then the appropriate elements of the NWP product are chosen as the input to synthesize the corresponding satellite cloud data. The experiments are conducted on the re-analysis products of the European Centre …


Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen May 2021

Deep Learning On Image Forensics And Anti-Forensics, Zhangyi Shen

Dissertations

Image forensics protect the authenticity and integrity of digital images. On the contrary, as the countermeasures of digital forensics, anti-forensics is applied to expose the vulnerability of forensics tools. Consequently, forensics researchers could develop forensics tools against possible new attacks. This dissertation investigation demonstrates two image forensics methods based on convolutional neural network (CNN) and two image anti-forensics methods based on generative adversarial network (GAN).

Detecting unsharp masking (USM) sharpened image is the first study in this dissertation. A CNN architecture comprises four convolutional layers and a classification module is proposed to discriminate sharpened images and unsharpened images. The results …


A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi May 2021

A Deep Learning-Based Automatic Object Detection Method For Autonomous Driving Ships, Ojonoka Erika Atawodi

Master's Theses

An important feature of an Autonomous Surface Vehicles (ASV) is its capability of automatic object detection to avoid collisions, obstacles and navigate on their own.

Deep learning has made some significant headway in solving fundamental challenges associated with object detection and computer vision. With tremendous demand and advancement in the technologies associated with ASVs, a growing interest in applying deep learning techniques in handling challenges pertaining to autonomous ship driving has substantially increased over the years.

In this thesis, we study, design, and implement an object recognition framework that detects and recognizes objects found in the sea. We first curated …


Improving Treatment Of Local Liver Ablation Therapy With Deep Learning And Biomechanical Modeling, Brian Anderson, Kristy Brock, Laurence Court, Carlos Eduardo Cardenas, Erik Cressman, Ankit Patel May 2021

Improving Treatment Of Local Liver Ablation Therapy With Deep Learning And Biomechanical Modeling, Brian Anderson, Kristy Brock, Laurence Court, Carlos Eduardo Cardenas, Erik Cressman, Ankit Patel

Dissertations & Theses (Open Access)

In the United States, colorectal cancer is the third most diagnosed cancer, and 60-70% of patients will develop liver metastasis. While surgical liver resection of metastasis is the standard of care for treatment with curative intent, it is only avai lable to about 20% of patients. For patients who are not surgical candidates, local percutaneous ablation therapy (PTA) has been shown to have a similar 5-year overall survival rate. However, PTA can be a challenging procedure, largely due to spatial uncertainties in the localization of the ablation probe, and in measuring the delivered ablation margin.

For this work, we hypothesized …


Network Traffic Anomaly Detection Method For Imbalanced Data, Shuqin Dong, Bin Zhang Mar 2021

Network Traffic Anomaly Detection Method For Imbalanced Data, Shuqin Dong, Bin Zhang

Journal of System Simulation

Abstract: Aiming at the poor detection performances caused by the low feature extraction accuracy of rare traffic attacks from scarce samples, a network traffic anomaly detection method for imbalanced data is proposed. A traffic anomaly detection model is designed, in which the traffic features in different feature spaces are learned by alternating activation functions, architectures, corrupted rates and dropout rates of stacked denoising autoencoder (SDA), and the low accuracy in extracting features of rare traffic attacks in a single space is solved. A batch normalization algorithm is designed, and the Adam algorithm is adopted to train parameters of …


Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler Mar 2021

Wg2An: Synthetic Wound Image Generation Using Generative Adversarial Network, Salih Sarp, Murat Kuzlu, Emmanuel Wilson, Ozgur Guler

Engineering Technology Faculty Publications

In part due to its ability to mimic any data distribution, Generative Adversarial Network (GAN) algorithms have been successfully applied to many applications, such as data augmentation, text-to-image translation, image-to-image translation, and image inpainting. Learning from data without crafting loss functions for each application provides broader applicability of the GAN algorithm. Medical image synthesis is also another field that the GAN algorithm has great potential to assist clinician training. This paper proposes a synthetic wound image generation model based on GAN architecture to increase the quality of clinical training. The proposed model is trained on chronic wound datasets with various …


Converting Optical Videos To Infrared Videos Using Attention Gan And Its Impact On Target Detection And Classification Performance, Mohammad Shahab Uddin, Reshad Hoque, Kazi Aminul Islam, Chiman Kwan, David Gribben, Jiang Li Jan 2021

Converting Optical Videos To Infrared Videos Using Attention Gan And Its Impact On Target Detection And Classification Performance, Mohammad Shahab Uddin, Reshad Hoque, Kazi Aminul Islam, Chiman Kwan, David Gribben, Jiang Li

Electrical & Computer Engineering Faculty Publications

To apply powerful deep-learning-based algorithms for object detection and classification in infrared videos, it is necessary to have more training data in order to build high-performance models. However, in many surveillance applications, one can have a lot more optical videos than infrared videos. This lack of IR video datasets can be mitigated if optical-to-infrared video conversion is possible. In this paper, we present a new approach for converting optical videos to infrared videos using deep learning. The basic idea is to focus on target areas using attention generative adversarial network (attention GAN), which will preserve the fidelity of target areas. …


Survey On Deep Neural Networks In Speech And Vision Systems, M. Alam, Manar D. Samad, Lasitha Vidyaratne, ‪Alexander Glandon, Khan M. Iftekharuddin Dec 2020

Survey On Deep Neural Networks In Speech And Vision Systems, M. Alam, Manar D. Samad, Lasitha Vidyaratne, ‪Alexander Glandon, Khan M. Iftekharuddin

Computer Science Faculty Research

This survey presents a review of state-of-the-art deep neural network architectures, algorithms, and systems in speech and vision applications. Recent advances in deep artificial neural network algorithms and architectures have spurred rapid innovation and development of intelligent speech and vision systems. With availability of vast amounts of sensor data and cloud computing for processing and training of deep neural networks, and with increased sophistication in mobile and embedded technology, the next-generation intelligent systems are poised to revolutionize personal and commercial computing. This survey begins by providing background and evolution of some of the most successful deep learning models for intelligent …