We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Multi-scale information fusion generative adversarial network for real-world noisy image denoising

    Image denoising is crucial for enhancing image quality, improving visual effects, and boosting the accuracy of image analysis and recognition. Most...

    Xuegang Hu, Wei Zhao in Machine Vision and Applications
    Article 18 June 2024
  2. Feature reduction for hepatocellular carcinoma prediction using machine learning algorithms

    Hepatocellular carcinoma (HCC) is a highly prevalent form of liver cancer that necessitates accurate prediction models for early diagnosis and...

    Ghada Mostafa, Hamdi Mahmoud, ... Mohamed E. ElAraby in Journal of Big Data
    Article Open access 18 June 2024
  3. MemPol: polling-based microsecond-scale per-core memory bandwidth regulation

    In today’s multiprocessor systems-on-a-chip, the shared memory subsystem is a known source of temporal interference. The problem causes logically...

    Alexander Zuepke, Andrea Bastoni, ... Renato Mancuso in Real-Time Systems
    Article Open access 17 June 2024
  4. Data oversampling and imbalanced datasets: an investigation of performance for machine learning and feature engineering

    The classification of imbalanced datasets is a prominent task in text mining and machine learning. The number of samples in each class is not...

    Muhammad Mujahid, EROL Kına, ... Imran Ashraf in Journal of Big Data
    Article Open access 17 June 2024
  5. MFMANet: a multispectral pedestrian detection network using multi-resolution RGB feature reuse with multi-scale FIR attentions

    In the realm of multispectral pedestrian detection, especially under challenging low-illumination, the existing methods, characterized by...

    Jiaren Guo, Yuzhen Zhang, ... Yanyun Tao in Machine Vision and Applications
    Article 14 June 2024
  6. Algebraically Structured LWE, Revisited

    In recent years, there has been a proliferation of algebraically structured Learning With Errors (LWE) variants, including Ring-LWE, Module-LWE,...

    Chris Peikert, Zachary Pepin in Journal of Cryptology
    Article 13 June 2024
  7. Benchmarking Large Language Models for Log Analysis, Security, and Interpretation

    Large Language Models (LLM) continue to demonstrate their utility in a variety of emergent capabilities in different fields. An area that could...

    Egil Karlsen, **ao Luo, ... Malcolm Heywood in Journal of Network and Systems Management
    Article 13 June 2024
  8. Further improvements of the estimation of key enumeration with applications to solving LWE

    In post-quantum cryptography, Learning With Errors (LWE) is one of the dominant underlying mathematical problems. The dual attack is one of the main...

    Alessandro Budroni, Erik Mårtensson in Cryptography and Communications
    Article Open access 13 June 2024
  9. Advancing machine learning with OCR2SEQ: an innovative approach to multi-modal data augmentation

    OCR2SEQ represents an innovative advancement in Optical Character Recognition (OCR) technology, leveraging a multi-modal generative augmentation...

    Michael Lowe, Joseph D. Prusa, ... Taghi M. Khoshgoftaar in Journal of Big Data
    Article Open access 13 June 2024
  10. Correlation-based outlier detection for ships’ in-service datasets

    With the advent of big data, it has become increasingly difficult to obtain high-quality data. Solutions are required to remove undesired outlier...

    Prateek Gupta, Adil Rasheed, Sverre Steen in Journal of Big Data
    Article Open access 13 June 2024
  11. Email bombing attack detection and mitigation using machine learning

    Email bombing, a growingly prevalent and destructive cyber attack, involves inundating a target’s email inbox with subscription confirmation messages...

    Sanjeev Shukla, Manoj Misra, Gaurav Varshney in International Journal of Information Security
    Article 13 June 2024
  12. A systematic data characteristic understanding framework towards physical-sensor big data challenges

    Big data present new opportunities for modern society while posing challenges for data scientists. Recent advancements in sensor networks and the...

    Zhipeng Ma, Bo Nørregaard Jørgensen, Zheng Grace Ma in Journal of Big Data
    Article Open access 12 June 2024
  13. Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution

    Network Function Virtualization (NFV) is a new technology that allows service providers to improve the cost efficiency of network service...

    Hanan Suwi, Nadjia Kara, ... Yves Lemieux in Journal of Network and Systems Management
    Article 12 June 2024
  14. Enhancing Cloud Gaming QoE Estimation by Stacking Learning

    The Cloud Gaming sector is burgeoning with an estimated annual growth of more than 50%, poised to reach a market value of $22 billion by 2030, and...

    Daniel Soares, Marcos Carvalho, Daniel F. Macedo in Journal of Network and Systems Management
    Article 12 June 2024
  15. Data pipeline approaches in serverless computing: a taxonomy, review, and research trends

    Serverless computing has gained significant popularity due to its scalability, cost-effectiveness, and ease of deployment. With the exponential...

    Zahra Shojaee Rad, Mostafa Ghobaei-Arani in Journal of Big Data
    Article Open access 11 June 2024
  16. On data efficiency of univariate time series anomaly detection models

    In machine learning (ML) problems, it is widely believed that more training samples lead to improved predictive accuracy but incur higher...

    Wu Sun, Hui Li, ... Yanhao Wang in Journal of Big Data
    Article Open access 11 June 2024
  17. AI-Based Intrusion Detection for a Secure Internet of Things (IoT)

    The increasing use of intelligent devices connected to the internet has contributed to the introduction of a new paradigm: the Internet of Things...

    Reham Aljohani, Anas Bushnag, Ali Alessa in Journal of Network and Systems Management
    Article 09 June 2024
  18. Hypoxia within tumor microenvironment characterizes distinct genomic patterns and aids molecular subty** for guiding individualized immunotherapy

    Assessing the hypoxic status within the tumor microenvironment (TME) is crucial for its significant clinical relevance in evaluating drug resistance...

    Run Shi, **g Sun, ... Yongqian Shu in Journal of Big Data
    Article Open access 07 June 2024
  19. Multimodal fine-grained grocery product recognition using image and OCR text

    Automatic recognition of grocery products can be used to improve customer flow at checkouts and reduce labor costs and store losses. Product...

    Tobias Pettersson, Maria Riveiro, Tuwe Löfström in Machine Vision and Applications
    Article Open access 07 June 2024
  20. Chfnet: a coarse-to-fine hierarchical refinement model for monocular depth estimation

    In recent years, many researchers have exploited multiple depth estimation architectures to produce high-quality depth maps from a single image. For...

    Han Chen, Yongxiong Wang in Machine Vision and Applications
    Article 06 June 2024
Did you find what you were looking for? Share feedback.