Search
Search Results
-
Classification and Feature Selection of Alzheimer’s Disease for MRI Data Utilizing Convolutional Neural Network and Support Vector Machine
Alzheimer's disease (AD) is a neurological disease that affect numerous people. According to the literature, forecasting this type of disease can be...
-
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....
-
-
Signal processing implementation of low-cost target speed detection of CW radar using FPGA
The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...
-
Designing an Intelligent Contract with Communications and Risk Data
Contract automation is a challenging topic within Artificial Intelligence and LegalTech. From digitised contracts via smart contracts, we are heading...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
TSDAnet: texture strip dual attention network for intraclass texture classification
Intraclass texture classification is a challenging task due to the high similarity between subtypes within the same texture. The presence of...
-
A robust method for malware analysis using stacking classifiers and dendrogram visualization
Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...
-
A Meta-learner approach to multistep-ahead time series prediction
The utilization of machine learning has become ubiquitous in addressing contemporary challenges in data science. Moreover, there has been significant...
-
Dynamic event-triggered adaptive control for state-constrained strict-feedback nonlinear systems with guaranteed feasibility conditions
In this paper, a new dynamic event-triggered control solution is presented for state-constrained strict-feedback nonlinear systems. The current...
-
Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method
The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...
-
Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions
There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...
-
Decoding the black box: LIME-assisted understanding of Convolutional Neural Network (CNN) in classification of social media tweets
The rise of social media has brought both opportunities and challenges to the digital age, including the proliferation of online trolls that have...
-
Negative-sample-free knowledge graph embedding
Recently, knowledge graphs (KGs) have been shown to benefit many machine learning applications in multiple domains (e.g. self-driving, agriculture,...
-
Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation
Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...
-
KHACDD: a knowledge-based hybrid method for multilabel sentiment analysis on complex sentences using attentive capsule and dual structured recurrent network
Using a machine to mine public opinion saves money and time. Traditional sentiment analysis approaches are typically unable to handle multi-meaning...
-
Open benchmark for filtering techniques in entity resolution
Entity Resolution identifies entity profiles that represent the same real-world object. A brute-force approach that considers all pairs of entities...
-
A robust hubness-based algorithm for image data stream classification
Image data stream classification is in high demand and can be used in various contexts, such as public security, medicine, and remote sensing....
-
Video anomaly localization using modified faster RCNN with soft NMS algorithm
Localization of anomalies in surveillance videos is a critical component of smart and intelligent surveillance systems. The goal of anomaly detection...