We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Classification and Feature Selection of Alzheimer’s Disease for MRI Data Utilizing Convolutional Neural Network and Support Vector Machine

    Alzheimer's disease (AD) is a neurological disease that affect numerous people. According to the literature, forecasting this type of disease can be...

    Archana Yashodhar, Shashidhar Kini in SN Computer Science
    Article 10 July 2024
  2. Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph

    Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....

    Peng Su, **gyuan Hu in Multimedia Systems
    Article 10 July 2024
  3. New spence difference sets

    James A. Davis, John Polhill, ... Jordan Webster in Designs, Codes and Cryptography
    Article Open access 10 July 2024
  4. Signal processing implementation of low-cost target speed detection of CW radar using FPGA

    The low-cost Continuous Wave (CW) radar architecture for object speed detection is presented in this research. An FPGA (Field-Programmable Gate...

    Sameh G. Salem, Mohamed El Hosseny in International Journal of Information Technology
    Article Open access 10 July 2024
  5. Designing an Intelligent Contract with Communications and Risk Data

    Contract automation is a challenging topic within Artificial Intelligence and LegalTech. From digitised contracts via smart contracts, we are heading...

    Georgios Stathis, Athanasios Trantas, ... Jaap van den Herik in SN Computer Science
    Article Open access 10 July 2024
  6. Survey-based analysis of cybersecurity awareness of Turkish seafarers

    In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...

    Ivar Moen, Aybars Oruc, ... Georgios Kavallieratos in International Journal of Information Security
    Article Open access 10 July 2024
  7. TSDAnet: texture strip dual attention network for intraclass texture classification

    Intraclass texture classification is a challenging task due to the high similarity between subtypes within the same texture. The presence of...

    G. Sakthipriya, N. Padmapriya, N. Venkateswaran in Signal, Image and Video Processing
    Article 09 July 2024
  8. A robust method for malware analysis using stacking classifiers and dendrogram visualization

    Malware analysis is a vital and challenging task in the ever-changing cyber threat landscape. Traditional signature-based methods cannot keep up with...

    N. Naveen Kumar, S. Balamurugan, ... P. Seshu Kumar in International Journal of Information Technology
    Article 09 July 2024
  9. A Meta-learner approach to multistep-ahead time series prediction

    The utilization of machine learning has become ubiquitous in addressing contemporary challenges in data science. Moreover, there has been significant...

    Fouad Bahrpeyma, Vuong M. Ngo, ... Andrew McCarren in International Journal of Data Science and Analytics
    Article Open access 09 July 2024
  10. Dynamic event-triggered adaptive control for state-constrained strict-feedback nonlinear systems with guaranteed feasibility conditions

    In this paper, a new dynamic event-triggered control solution is presented for state-constrained strict-feedback nonlinear systems. The current...

    Yongchao Liu, Bowen Zeng, Haiyu Wang in Neural Computing and Applications
    Article 09 July 2024
  11. Electromagnetic properties of coal using microstrip and an algorithm based on the Nicolson-Ross-Weir method

    The work implements an experimental methodology to find the dielectric parameters: electrical permittivity, effective permittivity, magnetic...

    David Leonardo Mancipe-Huérfano, Rafael Guillermo García-Cáceres in International Journal of Information Technology
    Article Open access 09 July 2024
  12. Aggregating the response in time series lag models using quad weight kernel: impact of environmental factors on schizophrenia admissions

    There has been a growing apprehension in the past few years concerning the issue of pollution and climate change. Several articles have shown the...

    Jobin Thomas, Murali Parameswaran in International Journal of Information Technology
    Article 09 July 2024
  13. Decoding the black box: LIME-assisted understanding of Convolutional Neural Network (CNN) in classification of social media tweets

    The rise of social media has brought both opportunities and challenges to the digital age, including the proliferation of online trolls that have...

    Kashif Mazhar, Pragya Dwivedi in Social Network Analysis and Mining
    Article 09 July 2024
  14. Negative-sample-free knowledge graph embedding

    Recently, knowledge graphs (KGs) have been shown to benefit many machine learning applications in multiple domains (e.g. self-driving, agriculture,...

    Adil Bahaj, Mounir Ghogho in Data Mining and Knowledge Discovery
    Article 09 July 2024
  15. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  16. KHACDD: a knowledge-based hybrid method for multilabel sentiment analysis on complex sentences using attentive capsule and dual structured recurrent network

    Using a machine to mine public opinion saves money and time. Traditional sentiment analysis approaches are typically unable to handle multi-meaning...

    Md Shofiqul Islam, Ngahzaifa Ab Ghani, ... Abbas Saliimi Lokman in Neural Computing and Applications
    Article 09 July 2024
  17. Open benchmark for filtering techniques in entity resolution

    Entity Resolution identifies entity profiles that represent the same real-world object. A brute-force approach that considers all pairs of entities...

    Franziska Neuhof, Marco Fisichella, ... Manolis Koubarakis in The VLDB Journal
    Article 09 July 2024
  18. A robust hubness-based algorithm for image data stream classification

    Image data stream classification is in high demand and can be used in various contexts, such as public security, medicine, and remote sensing....

    Mateus C. de Lima, Elaine R. Faria, Maria Camila N. Barioni in International Journal of Data Science and Analytics
    Article 09 July 2024
  19. Video anomaly localization using modified faster RCNN with soft NMS algorithm

    Localization of anomalies in surveillance videos is a critical component of smart and intelligent surveillance systems. The goal of anomaly detection...

    S. Anoopa, A. Salim, S. Nadera Beevi in International Journal of Data Science and Analytics
    Article 08 July 2024
Did you find what you were looking for? Share feedback.