Skip to main content

previous disabled Page of 10
and
  1. No Access

    Chapter and Conference Paper

    Empowering Legal Citation Recommendation via Efficient Instruction-Tuning of Pre-trained Language Models

    The escalating volume of cases in legal adjudication has amplified the complexity of citing relevant regulations and authoritative cases, posing an increasing challenge for legal professionals. Current legal c...

    Jie Wang, Kanha Bansal, Ioannis Arapakis, Xuri Ge in Advances in Information Retrieval (2024)

  2. No Access

    Chapter and Conference Paper

    RF-Based Drone Detection with Deep Neural Network: Review and Case Study

    Drones have been widely used in many application scenarios, such as logistics and on-demand instant delivery, surveillance, traffic monitoring, firefighting, photography, and recreation. On the other hand, the...

    Norah A. Almubairik, El-Sayed M. El-Alfy in Neural Information Processing (2024)

  3. Chapter and Conference Paper

    The Death Process in Italy Before and During the Covid-19 Pandemic: A Functional Compositional Approach

    In this talk, based on [1], we propose a spatio-temporal analysis of daily death counts in Italy, collected by ISTAT (Italian Statistical Institute), in Italian provinces and municipalities. While in [1] the f...

    Riccardo Scimone, Alessandra Menafoglio in Classification and Data Science in the Dig… (2023)

  4. No Access

    Chapter and Conference Paper

    Ensuring Fairness of Human- and AI-Generated Test Items

    Large language models (LLMs) have been a catalyst for the increased use of AI for automatic item generation on high-stakes assessments. Standard human review processes applied to human-generated content are al...

    William C. M. Belzak, Ben Naismith in Artificial Intelligence in Education. Post… (2023)

  5. No Access

    Chapter and Conference Paper

    Towards a Cash-on-Delivery Management Solution Based on Blockchain, Smart Contracts, and NFT

    The demand for transporting goods is increasingly diversified, it is associated with the economic development needs of a country. For domestic (eg, Cash-on-delivery - CoD) or international (eg, Letter-of-Credi...

    Luong Hoang Huong, Bao Q. Tran, Hieu M. Doan in Database Systems for Advanced Applications… (2023)

  6. No Access

    Chapter and Conference Paper

    Help Seekers vs. Help Accepters: Understanding Student Engagement with a Mentor Agent

    Help from virtual pedagogical agents has the potential to improve student learning. Yet students often do not seek help when they need it, do not use help effectively, or ignore the agent’s help altogether. Th...

    Elena G. van Stee, Taylor Heath, Ryan S. Baker in Artificial Intelligence in Education (2023)

  7. No Access

    Chapter and Conference Paper

    Blood and Blood Products Management System Based on Blockchain, and NFT Technologies

    Nowadays, the need to use blood and its products for the treatment and diagnosis of diseases is increasing. At present, no method can replace blood and its products in the treatment method - the only solution ...

    Hong Khanh Vo, Bao Q. Tran, Hieu M. Doan in Database Systems for Advanced Applications… (2023)

  8. No Access

    Chapter and Conference Paper

    Enabling PII Discovery in Textual Data via Outlier Detection

    Discovering Personal Identifying Information (PII) in textual data is an important pre-processing step to enabling privacy preserving data analytics. One approach to PII discovery in textual data is to charact...

    Md. Rakibul Islam, Anne V. D. M. Kayem in Database and Expert Systems Applications (2023)

  9. No Access

    Chapter and Conference Paper

    Bookending ARFIS: The Development, Final Results, and Current State of the Academic Reading Format International Study

    The Academic Reading Format International Study (ARFIS) is the largest study conducted to date on tertiary students’ reading format preferences and behaviors

    Diane Mizrachi, Alicia M. Salaz in Information Literacy in a Post-Truth Era (2022)

  10. No Access

    Chapter and Conference Paper

    Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps

    Severe consequences in volume leakage (subject to the conditions required by specific attacks) stimulate a new research direction (Eurocrypt 2019) of volume-hiding structured encryption (

    Jiafan Wang, Sherman S. M. Chow in Data and Applications Security and Privacy XXXV (2021)

  11. No Access

    Chapter and Conference Paper

    Estimating the Effective Topics of Articles and Journals Abstract Using LDA and K-Means Clustering Algorithm

    Analyzing journals and articles abstract text or documents using topic modeling and text clustering becomes modern solutions for the increasing number of text documents. Topic modeling and text clustering are ...

    Shadikur Rahman, Umme Ayman Koana in Advances in Data Science and Information E… (2021)

  12. No Access

    Chapter and Conference Paper

    Stargazing in the Dark: Secure Skyline Queries with SGX

    Skylining for multi-criteria decision making is widely applicable and often involves sensitive data that should be encrypted, especially when the database and query engine are outsourced to an untrusted cloud ...

    Jiafan Wang, Minxin Du, Sherman S. M. Chow in Database Systems for Advanced Applications (2020)

  13. No Access

    Chapter and Conference Paper

    Biomedical Text Recognition Using Convolutional Neural Networks: Content Based Deep Learning

    Named Entity Recognition (NER) targets to automatically detect the drug and disease mentions from biomedical texts and is fundamental step in the biomedical text mining. Although deep learning has been success...

    Sisir Joshi, Abeer Alsadoon in Advances in Computational Collective Intel… (2020)

  14. No Access

    Chapter and Conference Paper

    Optimal Rating Prediction in Recommender Systems

    Recommendation systems are best choice to cope with the problem of information overload. These systems are commonly used in recent years help to match users with different items. The increasing amount of avai...

    Bilal Ahmed, Li Wang, Waqar Hussain, M. Abdul Qadoos, Zheng Tingyi in Data Science (2020)

  15. No Access

    Chapter and Conference Paper

    Increasing the Efficiency of GPU Bitmap Index Query Processing

    Once exotic, computational accelerators are now commonly available in many computing systems. Graphics processing units (GPUs) are perhaps the most frequently encountered computational accelerators. Recent wor...

    Brandon Tran, Brennan Schaffner, Jason Sawin in Database Systems for Advanced Applications (2020)

  16. No Access

    Chapter and Conference Paper

    Application of Convolutional Neural Network in Segmenting Brain Regions from MRI Data

    Extracting knowledge from digital images largely depends on how well the mining algorithms can focus on specific regions of the image. In multimodality image analysis, especially in multi-layer diagnostic imag...

    Hafsa Moontari Ali, M. Shamim Kaiser, Mufti Mahmud in Brain Informatics (2019)

  17. No Access

    Chapter and Conference Paper

    Automatically Generate Hymns Using Variational Attention Models

    Building an intelligent system for automatically composing music like human beings has been actively investigated during the last decade. In this work, we propose a new approach for automatically creating hymn...

    Han K. Cao, Duyen T. Ly, Duy M. Nguyen in Advances in Neural Networks – ISNN 2019 (2019)

  18. No Access

    Chapter and Conference Paper

    Detecting Neurodegenerative Disease from MRI: A Brief Review on a Deep Learning Perspective

    Rapid development of high speed computing devices and infrastructure along with improved understanding of deep machine learning techniques during the last decade have opened up possibilities for advanced analy...

    Manan Binth Taj Noor, Nusrat Zerin Zenia, M. Shamim Kaiser in Brain Informatics (2019)

  19. No Access

    Chapter and Conference Paper

    Emotion Recognition in a Conversational Context

    The recent trends in Artificial Intelligence (AI) are all pointing towards the singularity, i.e., the day the true AI is born, which can pass the Turing Test. However, to achieve singularity, AI needs to under...

    Binayaka Chakraborty, M. Geetha in Applications and Techniques in Information Security (2018)

  20. No Access

    Chapter and Conference Paper

    Evaluation Methods of Hierarchical Models

    In this paper, we consider the problem of evaluating the quality of hierarchical models. This task arises due to the current researchers use subjective evaluation, such as a survey to test the goodness of a hi...

    Abdulqader M. Almars, Ibrahim A. Ibrahim, **n Zhao in Advanced Data Mining and Applications (2018)

previous disabled Page of 10