SILVIA: An explainable framework to map bark beetle infestation in sentinel-2 images
Recent long spells of high temperatures and drought-hit summers have fostered the
conditions for an unprecedented outbreak of bark beetles in Europe. This phenomenon has …
conditions for an unprecedented outbreak of bark beetles in Europe. This phenomenon has …
Integration of machine learning and hydrodynamic modeling to solve the extrapolation problem in flood depth estimation
Flood prediction is an important task, which helps local decision-makers in taking effective
measures to reduce damage to the people and economy. Currently, most studies use …
measures to reduce damage to the people and economy. Currently, most studies use …
A lightweight feature extraction technique for deepfake audio detection
N Chakravarty, M Dua - Multimedia Tools and Applications, 2024 - Springer
The emergence of audio deepfakes has prompted concerns over reputational integrity and
dependability. Deepfakes with audio can now be produced more easily, which makes it …
dependability. Deepfakes with audio can now be produced more easily, which makes it …
An Introduction to Machine and Deep Learning Methods for Cloud Masking Applications
A Anzalone, A Pagliaro, A Tutone - Applied Sciences, 2024 - mdpi.com
Cloud cover assessment is crucial for meteorology, Earth observation, and environmental
monitoring, providing valuable data for weather forecasting, climate modeling, and remote …
monitoring, providing valuable data for weather forecasting, climate modeling, and remote …
Cropping intensity mapping in Sentinel-2 and Landsat-8/9 remote sensing data using temporal transfer of a stacked ensemble machine learning model within google …
M Majnoun Hosseini, MJ Valadan Zoej… - Geocarto …, 2024 - Taylor & Francis
This article aimed to map Cropping Intensity Patterns (CIPs) in the southwest region of Iran
using Google Earth Engine and monthly composites of Sentinel-2 and Landsat-8/9 data. To …
using Google Earth Engine and monthly composites of Sentinel-2 and Landsat-8/9 data. To …
A transformer-based cloud detection approach using Sentinel 2 imageries
Presence of clouds blocks the view of Earth's surface objects in optical imageries, thus
compromising their application and usability. Identifying and removing the clouds become a …
compromising their application and usability. Identifying and removing the clouds become a …
An improved feature extraction for Hindi language audio impersonation attack detection
N Chakravarty, M Dua - Multimedia Tools and Applications, 2024 - Springer
Audio impersonation attacks offer a substantial risk to voice-based authentication systems
and various speech recognition applications. Hence, there is a requirement for robust …
and various speech recognition applications. Hence, there is a requirement for robust …
[HTML][HTML] Five-Year Evaluation of Sentinel-2 Cloud-Free Mosaic Generation Under Varied Cloud Cover Conditions in Hawai'i
The generation of cloud-free satellite mosaics is essential for a range of remote sensing
applications, including land use mapping, ecosystem monitoring, and resource …
applications, including land use mapping, ecosystem monitoring, and resource …
A Multi-Source Data-Driven Analysis of Building Functional Classification and Its Relationship with Population Distribution.
D Ren, X Qiu, Z An - Remote Sensing, 2024 - search.ebscohost.com
Buildings, as key factors influencing population distribution, have various functional
attributes. Existing research mainly focuses on the relationship between land functions and …
attributes. Existing research mainly focuses on the relationship between land functions and …
Publicly available datasets analysis and spectrogram-ResNet41 based improved features extraction for audio spoof attack detection
N Chakravarty, M Dua - … Journal of System Assurance Engineering and …, 2024 - Springer
The rapid expansion of voice-based technologies across diverse applications underscores
the critical need for robust security measures against audio spoofing attacks. This paper …
the critical need for robust security measures against audio spoofing attacks. This paper …