We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Unveiling the impact of employee-customer familiarity on customer purchase intentions: an empirical investigation within the realm of web-based date analytics

    This research delves into the intricate dynamics of employee-customer familiarity and its profound influence on customer purchase intentions within...

    Bingfeng Li, **aoting **e, ... Shilei Tan in World Wide Web
    Article 10 July 2024
  2. Emotion AWARE: an artificial intelligence framework for adaptable, robust, explainable, and multi-granular emotion analysis

    Emotions are fundamental to human behaviour. How we feel, individually and collectively, determines how humanity evolves and advances into our shared...

    Gihan Gamage, Daswin De Silva, ... Milos Manic in Journal of Big Data
    Article Open access 10 July 2024
  3. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  4. Continual learning approaches to hand–eye calibration in robots

    This study addresses the problem of hand–eye calibration in robotic systems by develo** Continual Learning (CL)-based approaches. Traditionally,...

    Ozan Bahadir, Jan Paul Siebert, Gerardo Aragon-Camarasa in Machine Vision and Applications
    Article Open access 10 July 2024
  5. The Price of Active Security in Cryptographic Protocols

    We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting,...

    Carmit Hazay, Muthuramakrishnan Venkitasubramaniam, Mor Weiss in Journal of Cryptology
    Article Open access 10 July 2024
  6. MDUNet: deep-prior unrolling network with multi-parameter data integration for low-dose computed tomography reconstruction

    The goal of this study is to reconstruct a high-quality computed tomography (CT) image from low-dose acquisition using an unrolling deep...

    Temitope Emmanuel Komolafe, Nizhuan Wang, ... Liang Zhou in Machine Vision and Applications
    Article 09 July 2024
  7. A Meta-learner approach to multistep-ahead time series prediction

    The utilization of machine learning has become ubiquitous in addressing contemporary challenges in data science. Moreover, there has been significant...

    Fouad Bahrpeyma, Vuong M. Ngo, ... Andrew McCarren in International Journal of Data Science and Analytics
    Article Open access 09 July 2024
  8. Dynamic event-triggered adaptive control for state-constrained strict-feedback nonlinear systems with guaranteed feasibility conditions

    In this paper, a new dynamic event-triggered control solution is presented for state-constrained strict-feedback nonlinear systems. The current...

    Yongchao Liu, Bowen Zeng, Haiyu Wang in Neural Computing and Applications
    Article 09 July 2024
  9. An adversarial sample detection method based on heterogeneous denoising

    Deep learning has been used in many computer-vision-based applications. However, deep neural networks are vulnerable to adversarial examples that...

    Lifang Zhu, Chao Liu, ... **ntao Ding in Machine Vision and Applications
    Article 09 July 2024
  10. Decoding the black box: LIME-assisted understanding of Convolutional Neural Network (CNN) in classification of social media tweets

    The rise of social media has brought both opportunities and challenges to the digital age, including the proliferation of online trolls that have...

    Kashif Mazhar, Pragya Dwivedi in Social Network Analysis and Mining
    Article 09 July 2024
  11. Negative-sample-free knowledge graph embedding

    Recently, knowledge graphs (KGs) have been shown to benefit many machine learning applications in multiple domains (e.g. self-driving, agriculture,...

    Adil Bahaj, Mounir Ghogho in Data Mining and Knowledge Discovery
    Article 09 July 2024
  12. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  13. KHACDD: a knowledge-based hybrid method for multilabel sentiment analysis on complex sentences using attentive capsule and dual structured recurrent network

    Using a machine to mine public opinion saves money and time. Traditional sentiment analysis approaches are typically unable to handle multi-meaning...

    Md Shofiqul Islam, Ngahzaifa Ab Ghani, ... Abbas Saliimi Lokman in Neural Computing and Applications
    Article 09 July 2024
  14. Open benchmark for filtering techniques in entity resolution

    Entity Resolution identifies entity profiles that represent the same real-world object. A brute-force approach that considers all pairs of entities...

    Franziska Neuhof, Marco Fisichella, ... Manolis Koubarakis in The VLDB Journal
    Article 09 July 2024
  15. A framework of specialized knowledge distillation for Siamese tracker on challenging attributes

    In recent years, Siamese network-based trackers have achieved significant improvements in real-time tracking. Despite their success, performance...

    Yiding Li, Atsushi Shimada, ... Cheng Tang in Machine Vision and Applications
    Article 09 July 2024
Did you find what you were looking for? Share feedback.