We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. SCL-SKG: software knowledge extraction with span-level contrastive learning

    The text of software knowledge community contains abundant knowledge of software engineering field. The software knowledge entity and relation can be...

    Ming**g Tang, Shu Zhang, ... Wei Gao in Artificial Intelligence Review
    Article 30 August 2023
  2. SV2-SQL: a text-to-SQL transformation mechanism based on BERT models for slot filling, value extraction, and verification

    Information retrieval from databases is challenging for a non-SQL-domain expert. Some previous studies have provided solutions for translating the...

    Chih-Yung Chang, Yuan-Lin Liang, ... Diptendu Sinha Roy in Multimedia Systems
    Article 16 January 2024
  3. Enhanced kinship verification analysis based on color and texture handcrafted techniques

    Nowadays, kinship verification is an attractive research area within computer vision. It significantly affects applications in the real world, such...

    Nermeen Nader, Fatma EL-Zahraa A. EL-Gamal, Mohammed Elmogy in The Visual Computer
    Article Open access 13 June 2023
  4. A multi-dimensional review on handwritten signature verification: strengths and gaps

    A handwritten signature is the most widely accepted method to authenticate an individual in banking, financial, business transactions, cheque...

    S. D. Bhavani, R. K. Bharathi in Multimedia Tools and Applications
    Article 13 May 2023
  5. Knowledge Graph of Urban Firefighting with Rule-Based Entity Extraction

    There is little research on entity extraction in constructing the knowledge graphs for urban firefighting. In this paper, we propose a rule-based...
    Xudong Wang, Slam Nady, ... **grong Wang in Engineering Applications of Neural Networks
    Conference paper 2023
  6. Enhanced user verification in IoT applications: a fusion-based multimodal cancelable biometric system with ECG and PPG signals

    The core premise of cancelable biometrics lies in the creation of a distinct biometric template for every individual, which can be either canceled or...

    Ali I. Siam, Walid El-Shafai, ... Ghada M. El-Banby in Neural Computing and Applications
    Article 01 February 2024
  7. Embedding and extraction of knowledge in tree ensemble classifiers

    The embedding and extraction of knowledge is a recent trend in machine learning applications, e.g., to supplement training datasets that are small....

    Wei Huang, **ngyu Zhao, **aowei Huang in Machine Learning
    Article Open access 24 November 2021
  8. A review on kinship verification from facial information

    Abstract

    Kinship verification is a challenging computer vision task that aims to mainly answer the question: “Are these two persons blood relatives?”....

    Mohamed Charfeddine Mzoughi, Najib Ben Aoun, Sami Naouali in The Visual Computer
    Article 14 June 2024
  9. Knowledge Sources

    Knowledge sources are essential components of many NLP tasks, such as question answering (Chen et al., Reading wikipedia to answer open-domain...
    Meng Jiang, Bill Yuchen Lin, ... Chenguang Zhu in Knowledge-augmented Methods for Natural Language Processing
    Chapter 2024
  10. The multiple relationships among knowledge heterogeneity, knowledge transfer and knowledge innovation as moderated by microstructure holes

    The positive relationship between knowledge transfer and knowledge innovation is recognized by most scholars, while knowledge heterogeneity, as a...

    Lubang Wang, Guohui Dong, ... **nming Zhang in Neural Computing and Applications
    Article 04 January 2024
  11. A survey of safety and trustworthiness of large language models through the lens of verification and validation

    Large language models (LLMs) have exploded a new heatwave of AI for their ability to engage end-users in human-level conversations with detailed and...

    **aowei Huang, Wenjie Ruan, ... Mustafa A. Mustafa in Artificial Intelligence Review
    Article Open access 17 June 2024
  12. Enhanced Named Entity Recognition algorithm for financial document verification

    Many enterprise systems are document-intensive and require extensive manual verification. The verification process has challenge in terms of time and...

    Ahmet Toprak, Metin Turan in The Journal of Supercomputing
    Article 28 May 2023
  13. CoolGust: knowledge representation learning with commonsense knowledge guidelines and constraints

    Representation learning serves as a crucial link between knowledge graphs and neural models. Knowledge graphs are typical symbolic models and require...

    Article 16 February 2024
  14. Multi-dilation Convolutional Neural Network for Automatic Handwritten Signature Verification

    With the recent advancements in deep learning techniques, the application areas of unstructured data analytics are emerging in multiple domains. One...

    Rashmi Rathi Upadhyay, Ravishankar Mehta, Koushlendra Kumar Singh in SN Computer Science
    Article 24 June 2023
  15. Synews: a synergy-based rumor verification system

    Online social networks (OSNs) are now implied as an important source of news and information besides establishing social connections. However, such...

    Amber Sarfraz, Adnan Ahmad, ... Hamid Turab Mirza in Social Network Analysis and Mining
    Article 15 March 2024
  16. Stationary wavelet transform features for kinship verification in childhood images

    Estimating blood relationships from facial images is a complex task in computer vision due to subtle differences. Existing models are facing...

    Madhu Oruganti, Toshanlal Meenpal, Saikat Majumder in Multimedia Tools and Applications
    Article 13 September 2023
  17. Real-time face verification on mobile devices using margin distillation

    Face verification is an attractive yet challenging research area in computer vision. To make an improvement in the existing models for face...

    Hosein Zaferani, Kourosh Kiani, Razieh Rastgoo in Multimedia Tools and Applications
    Article 29 April 2023
  18. Multi-scripted Writer Independent Off-line Signature Verification using Convolutional Neural Network

    Signature is a biometrics trait widely used for personal verification in financial and most other organizations where financial and relevant types of...

    Teressa Longjam, Dakshina Ranjan Kisku, Phalguni Gupta in Multimedia Tools and Applications
    Article 01 August 2022
  19. Attendance Monitoring System Using Facial and Geo-Location Verification

    Face verification is the most distinctive method used in the most effective image processing software, and it is essential in the technical world....
    Garima Singh, Monika kumari, ... Manoj Diwakar in Intelligent Human Computer Interaction
    Conference paper 2024
  20. Tooling and Knowledge Deployment

    We introduce example tooling to support the knowledge graph life cycle presented in the previous chapters in Part III. Additionally, we explain...
    Umutcan Serles, Dieter Fensel in An Introduction to Knowledge Graphs
    Chapter 2024
Did you find what you were looking for? Share feedback.