We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Dynamic event-triggered adaptive control for state-constrained strict-feedback nonlinear systems with guaranteed feasibility conditions

    In this paper, a new dynamic event-triggered control solution is presented for state-constrained strict-feedback nonlinear systems. The current...

    Yongchao Liu, Bowen Zeng, Haiyu Wang in Neural Computing and Applications
    Article 09 July 2024
  2. KHACDD: a knowledge-based hybrid method for multilabel sentiment analysis on complex sentences using attentive capsule and dual structured recurrent network

    Using a machine to mine public opinion saves money and time. Traditional sentiment analysis approaches are typically unable to handle multi-meaning...

    Md Shofiqul Islam, Ngahzaifa Ab Ghani, ... Abbas Saliimi Lokman in Neural Computing and Applications
    Article 09 July 2024
  3. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  4. Negative-sample-free knowledge graph embedding

    Recently, knowledge graphs (KGs) have been shown to benefit many machine learning applications in multiple domains (e.g. self-driving, agriculture,...

    Adil Bahaj, Mounir Ghogho in Data Mining and Knowledge Discovery
    Article 09 July 2024
  5. Principal components-based quantification of hierarchical k-core assortativity

    Hierarchical networks typically get rated to be not assortative on the basis of the degrees of the end vertices of the edges. However, degree...

    Natarajan Meghanathan in Social Network Analysis and Mining
    Article 08 July 2024
  6. Video anomaly localization using modified faster RCNN with soft NMS algorithm

    Localization of anomalies in surveillance videos is a critical component of smart and intelligent surveillance systems. The goal of anomaly detection...

    S. Anoopa, A. Salim, S. Nadera Beevi in International Journal of Data Science and Analytics
    Article 08 July 2024
  7. An efficient facial emotion recognition using convolutional neural network with local sorting binary pattern and whale optimization algorithm

    Facial emotion recognition is one of the fields of machine learning and pattern recognition. Facial expression recognition is used in a variety of...

    Fereshteh Aghabeigi, Sara Nazari, Nafiseh Osati Eraghi in International Journal of Data Science and Analytics
    Article 08 July 2024
  8. Similarity-based face image retrieval using sparsely embedded deep features and binary code learning

    Human face retrieval has long been established as one of the most interesting research topics in computer vision. With the recent development of deep...

    Abdessamad Elboushaki, Rachida Hannane, Karim Afdel in International Journal of Multimedia Information Retrieval
    Article 08 July 2024
  9. Granular Syntax Processing with Multi-Task and Curriculum Learning

    Syntactic processing techniques are the foundation of natural language processing (NLP), supporting many downstream NLP tasks. In this paper, we...

    Xulang Zhang, Rui Mao, Erik Cambria in Cognitive Computation
    Article 08 July 2024
  10. Twin Bounded Support Vector Machine with Capped Pinball Loss

    In order to obtain a more robust and sparse classifier, in this paper, we propose a novel classifier termed as twin bounded support vector machine...

    Huiru Wang, **aoqing Hong, Siyuan Zhang in Cognitive Computation
    Article 06 July 2024
  11. Prescribed-Time Sampled-Data Control for the Bipartite Consensus of Linear Multi-Agent Systems in Singed Networks

    This article examines the prescribed-time sampled-data control problem for multi-agent systems in signed networks. A time-varying high gain-based...

    Mengke Liu, Wenbing Zhang, Guanglei Wu in Cognitive Computation
    Article 06 July 2024
  12. TUMDOT–MUC: Data Collection and Processing of Multimodal Trajectories Collected by Aerial Drones

    Currently available trajectory data sets undoubtedly provide valuable insights into traffic events, the behavior of road users and traffic flow...

    Alexander Kutsch, Martin Margreiter, Klaus Bogenberger in Data Science for Transportation
    Article Open access 06 July 2024
  13. Storage of weights and retrieval method (SWARM) approach for neural networks hybridized with conformal prediction to construct the prediction intervals for energy system applications

    The prediction intervals represent the uncertainty associated with the model-predicted responses that impacts the sequential decision-making...

    Waqar Muhammad Ashraf, Vivek Dua in International Journal of Data Science and Analytics
    Article Open access 05 July 2024
  14. The “Non-Musk” effect at X (Twitter)

    Elon Musk, a notable entrepreneur, often influences Wall Street with his controversial social media presence. Drawing on Social Identity and Social...

    Dmitry Zinoviev, Arkapravo Sarkar, Pelin Bicen in Social Network Analysis and Mining
    Article 05 July 2024
  15. Deep learning and embeddings-based approaches for keyphrase extraction: a literature review

    Keyphrase extraction is a subtask of natural language processing referring to the automatic extraction of salient terms that semantically capture the...

    Nikolaos Giarelis, Nikos Karacapilidis in Knowledge and Information Systems
    Article Open access 05 July 2024
  16. Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review

    The Internet of Things (IoT) has been used in various aspects. Fundamental security issues must be addressed to accelerate and develop the Internet...

    Sepide Najafli, Abolrazl Toroghi Haghighat, Babak Karasfi in Knowledge and Information Systems
    Article 05 July 2024
  17. Pruning Deep Neural Networks for Green Energy-Efficient Models: A Survey

    Over the past few years, larger and deeper neural network models, particularly convolutional neural networks (CNNs), have consistently advanced...

    Jihene Tmamna, Emna Ben Ayed, ... Mounir Ben Ayed in Cognitive Computation
    Article 05 July 2024
  18. Exploring AI-driven approaches for unstructured document analysis and future horizons

    In the current industrial landscape, a significant number of sectors are grappling with the challenges posed by unstructured data, which incurs...

    Supriya V. Mahadevkar, Shruti Patil, ... Tanupriya Choudhury in Journal of Big Data
    Article Open access 05 July 2024
  19. Iterative missing value imputation based on feature importance

    Many datasets suffer from missing values due to various reasons, which not only increases the processing difficulty of related tasks but also reduces...

    Cong Guo, Wei Yang, ... Zheng Li in Knowledge and Information Systems
    Article 05 July 2024
Did you find what you were looking for? Share feedback.