Search Results - "Yash upadhyay"
-
1
Driver distraction detection using capsule network
Published in Neural computing & applications (01-06-2021)“…With the onset of the new technological age, the distractions caused due to handheld devices have been a major cause of traffic accidents as they affect the…”
Get full text
Journal Article -
2
Deep Refinement: capsule network with attention mechanism-based system for text classification
Published in Neural computing & applications (01-04-2020)“…Most of the text in the questions of community question–answering systems does not consist of a definite mechanism for the restriction of inappropriate and…”
Get full text
Journal Article -
3
The understanding and recall of school children in Mumbai in compression only life support cardiopulmonary resuscitation
Published in Indian journal of anaesthesia (01-06-2020)“…Background and Aims: Out of hospital cardiac arrest (OHCA) is a leading cause of mortality worldwide. Increased bystander cardiopulmonary resuscitation (CPR)…”
Get full text
Journal Article -
4
Intrathecal morphine (ITM) in Postoperative Pain Management of Open Donor Hepatectomy
Published in Journal of clinical and experimental hepatology (2023)Get full text
Journal Article -
5
Equivariance in GAN Critics
Published 01-01-2019“…Equivariance allows learning a representation that disentangles an entity or a feature from it's meta-properties. Spatially-equivariant representations lead to…”
Get full text
Dissertation -
6
Heart rate monitoring and user behavior anomaly detection using DynaSense
Published 01-01-2015“…There are a number of user centric applications that use data from sensors in the personal area network. The heavy dependence of such apps on sensors means…”
Get full text
Dissertation -
7
DeDrift: Robust Similarity Search under Content Drift
Published 04-08-2023“…The statistical distribution of content uploaded and searched on media sharing sites changes over time due to seasonal, sociological and technical factors. We…”
Get full text
Journal Article -
8
Generative Adversarial Network Architectures For Image Synthesis Using Capsule Networks
Published 10-06-2018“…In this paper, we propose Generative Adversarial Network (GAN) architectures that use Capsule Networks for image-synthesis. Based on the principal of…”
Get full text
Journal Article -
9
Object detection based approach for Automatic detection of Pneumonia
Published in 2020 International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems (icABCD) (01-08-2020)“…Pneumonia is a bacterial, viral, or fungal infection that causes swelling of the tissues in one or both lungs. Diagnosis for pneumonia requires an expert to…”
Get full text
Conference Proceeding -
10
A Dynamic Approach for Handling UAV in Crowded Environment Using Deep Q-Networks
Published in 2023 4th IEEE Global Conference for Advancement in Technology (GCAT) (06-10-2023)“…The demand for wireless connections is rising, and the advent of mobile internet has sparked a hunt for fresh, creative ways to expand the capacity and reach…”
Get full text
Conference Proceeding -
11
Relative Vehicle Velocity Estimation Using Monocular Video Stream
Published in 2020 International Joint Conference on Neural Networks (IJCNN) (01-07-2020)“…In the past few years, the intelligent driving systems have witnessed rapid development, either it is self-driving cars or driver assistant systems. All these…”
Get full text
Conference Proceeding -
12
Advanced Multi-Task Reinforcement Learning Utilising Task-Adaptive Episodic Memory with Hypernetwork Integration
Published in 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) (04-01-2024)“…In deep reinforcement learning, sampling ineffi-ciency is addressed by mimicking human learning which lever-ages past experiences stored in the hippocampus…”
Get full text
Conference Proceeding -
13
Optical Character Recognition using Convolutional Neural Network
Published in 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom) (01-03-2019)“…Optical Character Recognition is the process of translating images of handwritten, typewritten, or printed text into a format understood by machines. The…”
Get full text
Conference Proceeding -
14
New Simulation Model for Power Density of RF Waves and Its Field Verification
Published in 2014 Sixth International Conference on Computational Intelligence, Communication Systems and Networks (01-05-2014)“…Simulation Models for Power Density of Radio Frequency (RF) Waves are used to ascertain compliance to EMF Standards (Electromagnetic Fields). ITU T has…”
Get full text
Conference Proceeding -
15
Computational Analysis of EMF Standards for Cellular Networks
Published in 2014 International Conference on Electronics and Communication Systems (ICECS) (01-02-2014)“…Compliance to EMF Norms (Electromagnetic Field) is very critical for Cellular Networks. There is a need to compare the EMF standards and RF Energy with…”
Get full text
Conference Proceeding -
16
Analysis of compliance prediction models for Radio Frequency waves with measurement results
Published in 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA) (01-04-2014)“…Compliance to EMF Standards (Electromagnetic Fields) is usually ascertained using prediction models for power density of Radio Frequency (RF) Waves. In case…”
Get full text
Conference Proceeding -
17
Analysis of compliance prediction models for radio frequency waves with measurement results
Published in The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE) (01-03-2014)“…Compliance to EMF Standards (Electromagnetic Fields) is usually ascertained using prediction models for power density of Radio Frequency (RF) Waves. In case…”
Get full text
Conference Proceeding -
18
Developing Adaptive Quantified-Self Applications Using DynaSense
Published in 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI) (01-04-2016)“…There are a number of user-centric applications that use data from sensors in a personal area network. The heavy dependence of such applications on sensors…”
Get full text
Conference Proceeding