Search
Search Results
-
-
Explicit constructions of NMDS self-dual codes
Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...
-
Hierarchical adaptive evolution framework for privacy-preserving data publishing
The growing need for data publication and the escalating concerns regarding data privacy have led to a surge in interest in Privacy-Preserving Data...
-
HyperMatch: long-form text matching via hypergraph convolutional networks
Semantic text matching plays a vital role in diverse domains, such as information retrieval, question answering, and recommendation. However, longer...
-
Anomaly analytics in data-driven machine learning applications
Machine learning is used widely to create a range of prediction or classification models. The quality of the machine learning (ML) models depends not...
-
Progress on half a century of process modelling research in steelmaking: a review
Process modelling in steelmaking started from mid-sixties and witnessed rapid growth and wide spread applications during the last fifty years or so....
-
M2AST:MLP-mixer-based adaptive spatial-temporal graph learning for human motion prediction
Human motion prediction is a challenging task in human-centric computer vision, involving forecasting future poses based on historical sequences....
-
Temporal analysis of computational economics: a topic modeling approach
This study offers a comprehensive investigation into the thematic evolution within computational economics over the past two decades, leveraging...
-
Global adaptive histogram feature network for automatic segmentation of infection regions in CT images
Accurate and timely diagnosis of COVID-like virus is of paramount importance for lifesaving. In this work, deep learning techniques are applied to...
-
Assessing the cooling impact of the urban park during pre- and post-cyclone using Landsat images
Cities are far warmer than their surroundings. Using vegetation is one of the best techniques to mitigate the effects of urban heat islands (UHI)....
-
Examining ALS: reformed PCA and random forest for effective detection of ALS
ALS (Amyotrophic Lateral Sclerosis) is a fatal neurodegenerative disease of the human motor system. It is a group of progressive diseases that...
-
Data reduction in big data: a survey of methods, challenges and future directions
Data reduction plays a pivotal role in managing and analyzing big data, which is characterized by its volume, velocity, variety, veracity, value,...
-
Unveiling the impact of employee-customer familiarity on customer purchase intentions: an empirical investigation within the realm of web-based date analytics
This research delves into the intricate dynamics of employee-customer familiarity and its profound influence on customer purchase intentions within...
-
FlexpushdownDB: rethinking computation pushdown for cloud OLAP DBMSs
Modern cloud-native OLAP databases adopt a storage-disaggregation architecture that separates the management of computation and storage. A major...
-
MIM: A multiple integration model for intrusion detection on imbalanced samples
The quantity of normal samples is commonly significantly greater than that of malicious samples, resulting in an imbalance in network security data....
-
Emotion AWARE: an artificial intelligence framework for adaptable, robust, explainable, and multi-granular emotion analysis
Emotions are fundamental to human behaviour. How we feel, individually and collectively, determines how humanity evolves and advances into our shared...
-
Survey-based analysis of cybersecurity awareness of Turkish seafarers
In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an...
-
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used....
-
-
Performance comparison of quantum-safe multivariate polynomial public key encapsulation algorithm
A novel quantum-safe key encapsulation algorithm, called Multivariate Polynomial Public Key (MPPK), was recently proposed by Kuang, Perepechaenko,...