We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Dynamic event-triggered adaptive control for state-constrained strict-feedback nonlinear systems with guaranteed feasibility conditions

    In this paper, a new dynamic event-triggered control solution is presented for state-constrained strict-feedback nonlinear systems. The current...

    Yongchao Liu, Bowen Zeng, Haiyu Wang in Neural Computing and Applications
    Article 09 July 2024
  2. KHACDD: a knowledge-based hybrid method for multilabel sentiment analysis on complex sentences using attentive capsule and dual structured recurrent network

    Using a machine to mine public opinion saves money and time. Traditional sentiment analysis approaches are typically unable to handle multi-meaning...

    Md Shofiqul Islam, Ngahzaifa Ab Ghani, ... Abbas Saliimi Lokman in Neural Computing and Applications
    Article 09 July 2024
  3. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  4. Negative-sample-free knowledge graph embedding

    Recently, knowledge graphs (KGs) have been shown to benefit many machine learning applications in multiple domains (e.g. self-driving, agriculture,...

    Adil Bahaj, Mounir Ghogho in Data Mining and Knowledge Discovery
    Article 09 July 2024
  5. Principal components-based quantification of hierarchical k-core assortativity

    Hierarchical networks typically get rated to be not assortative on the basis of the degrees of the end vertices of the edges. However, degree...

    Natarajan Meghanathan in Social Network Analysis and Mining
    Article 08 July 2024
  6. Video anomaly localization using modified faster RCNN with soft NMS algorithm

    Localization of anomalies in surveillance videos is a critical component of smart and intelligent surveillance systems. The goal of anomaly detection...

    S. Anoopa, A. Salim, S. Nadera Beevi in International Journal of Data Science and Analytics
    Article 08 July 2024
  7. An efficient facial emotion recognition using convolutional neural network with local sorting binary pattern and whale optimization algorithm

    Facial emotion recognition is one of the fields of machine learning and pattern recognition. Facial expression recognition is used in a variety of...

    Fereshteh Aghabeigi, Sara Nazari, Nafiseh Osati Eraghi in International Journal of Data Science and Analytics
    Article 08 July 2024
  8. Similarity-based face image retrieval using sparsely embedded deep features and binary code learning

    Human face retrieval has long been established as one of the most interesting research topics in computer vision. With the recent development of deep...

    Abdessamad Elboushaki, Rachida Hannane, Karim Afdel in International Journal of Multimedia Information Retrieval
    Article 08 July 2024
  9. Storage of weights and retrieval method (SWARM) approach for neural networks hybridized with conformal prediction to construct the prediction intervals for energy system applications

    The prediction intervals represent the uncertainty associated with the model-predicted responses that impacts the sequential decision-making...

    Waqar Muhammad Ashraf, Vivek Dua in International Journal of Data Science and Analytics
    Article Open access 05 July 2024
  10. The “Non-Musk” effect at X (Twitter)

    Elon Musk, a notable entrepreneur, often influences Wall Street with his controversial social media presence. Drawing on Social Identity and Social...

    Dmitry Zinoviev, Arkapravo Sarkar, Pelin Bicen in Social Network Analysis and Mining
    Article 05 July 2024
  11. Deep learning and embeddings-based approaches for keyphrase extraction: a literature review

    Keyphrase extraction is a subtask of natural language processing referring to the automatic extraction of salient terms that semantically capture the...

    Nikolaos Giarelis, Nikos Karacapilidis in Knowledge and Information Systems
    Article Open access 05 July 2024
  12. Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review

    The Internet of Things (IoT) has been used in various aspects. Fundamental security issues must be addressed to accelerate and develop the Internet...

    Sepide Najafli, Abolrazl Toroghi Haghighat, Babak Karasfi in Knowledge and Information Systems
    Article 05 July 2024
  13. Exploring AI-driven approaches for unstructured document analysis and future horizons

    In the current industrial landscape, a significant number of sectors are grappling with the challenges posed by unstructured data, which incurs...

    Supriya V. Mahadevkar, Shruti Patil, ... Tanupriya Choudhury in Journal of Big Data
    Article Open access 05 July 2024
  14. Iterative missing value imputation based on feature importance

    Many datasets suffer from missing values due to various reasons, which not only increases the processing difficulty of related tasks but also reduces...

    Cong Guo, Wei Yang, ... Zheng Li in Knowledge and Information Systems
    Article 05 July 2024
  15. VAE-GNA: a variational autoencoder with Gaussian neurons in the latent space and attention mechanisms

    Variational autoencoders (VAEs) are generative models known for learning compact and continuous latent representations of data. While they have...

    Matheus B. Rocha, Renato A. Krohling in Knowledge and Information Systems
    Article 05 July 2024
  16. Low resource Twi-English parallel corpus for machine translation in multiple domains (Twi-2-ENG)

    Although Ghana does not have one unique language for its citizens, the Twi dialect stands a chance of fulfilling this purpose. Twi is among the...

    Emmanuel Agyei, **aoling Zhang, ... Victor Kwaku Agbesi in Discover Computing
    Article Open access 05 July 2024
  17. DQN-PACG: load regulation method based on DQN and multivariate prediction model

    Demand response plays a pivotal role in modern smart grid systems, aiding in balancing energy consumption. However, the increasing energy demands of...

    Rongheng Lin, Shuo Chen, ... Qiushuang Li in Knowledge and Information Systems
    Article 05 July 2024
  18. LightCapsGNN: light capsule graph neural network for graph classification

    Graph neural networks (GNNs) have achieved excellent performances in many graph-related tasks. However, they need appropriate pooling operations to...

    Yucheng Yan, ** Li, ... Yang-Geng Fu in Knowledge and Information Systems
    Article 04 July 2024
  19. An ensemble of self-supervised teachers for minimal student model with auto-tuned hyperparameters via improved Bayesian optimization

    Due to a growing demand for efficient deep learning models capable of both high performance and reduced costs in terms of computation, model...

    Jaydeep Kishore, Snehasis Mukherjee in Progress in Artificial Intelligence
    Article 04 July 2024
Did you find what you were looking for? Share feedback.