Search
Search Results
-
Assessment of loss of life caused by dam failure based on fuzzy theory and hybrid random forest model
Dam failure may lead to significant casualties among downstream residents. Therefore, it is crucial to study a reliable method to quantitatively...
-
Data reduction in big data: a survey of methods, challenges and future directions
Data reduction plays a pivotal role in managing and analyzing big data, which is characterized by its volume, velocity, variety, veracity, value,...
-
Emotion AWARE: an artificial intelligence framework for adaptable, robust, explainable, and multi-granular emotion analysis
Emotions are fundamental to human behaviour. How we feel, individually and collectively, determines how humanity evolves and advances into our shared...
-
Evaluating groundwater storage variations in Afghanistan using GRACE, GLDAS, and in-situ measurements
Groundwater resources are essential for providing drinking water and irrigation in Afghanistan. However, the rising demand due to population growth...
-
Estimation and backtesting of risk measures with emphasis on distortion risk measures
Statistical methodology has an important role to play in risk measurement. In this paper, we will review and discuss some statistical issues on risk...
-
A Meta-learner approach to multistep-ahead time series prediction
The utilization of machine learning has become ubiquitous in addressing contemporary challenges in data science. Moreover, there has been significant...
-
Dynamic event-triggered adaptive control for state-constrained strict-feedback nonlinear systems with guaranteed feasibility conditions
In this paper, a new dynamic event-triggered control solution is presented for state-constrained strict-feedback nonlinear systems. The current...
-
Decoding the black box: LIME-assisted understanding of Convolutional Neural Network (CNN) in classification of social media tweets
The rise of social media has brought both opportunities and challenges to the digital age, including the proliferation of online trolls that have...
-
Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation
Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...
-
Projected changes in population exposure to extreme precipitation events over Central Africa under the global warming levels of 1.5 °C and 2 °C: insights from CMIP6 simulations
Assessing the impacts of limiting the Global Warming Level (GWL) of 1.5–2 °C is crucial for strengthening adaptation to climate change in Central...
-
KHACDD: a knowledge-based hybrid method for multilabel sentiment analysis on complex sentences using attentive capsule and dual structured recurrent network
Using a machine to mine public opinion saves money and time. Traditional sentiment analysis approaches are typically unable to handle multi-meaning...
-
Negative-sample-free knowledge graph embedding
Recently, knowledge graphs (KGs) have been shown to benefit many machine learning applications in multiple domains (e.g. self-driving, agriculture,...
-
A robust hubness-based algorithm for image data stream classification
Image data stream classification is in high demand and can be used in various contexts, such as public security, medicine, and remote sensing....
-
Joint identification of contaminant source and dispersion coefficients based on multi-observed reconstruction and ensemble Kalman filtering
Accurate and efficient identification of pollution sources is a key process that assists in the treatment of water pollution incidents. The ensemble...
-
Genesis Geological Model of Intracontinental Volcanism Contribution in Polymorphic Silica Geodes Formation, Northern Arabian Plate
The study aims to create a geological model of the role of intracontinental volcanism in the northern Arabian Plate and the formation of various...
-
Video anomaly localization using modified faster RCNN with soft NMS algorithm
Localization of anomalies in surveillance videos is a critical component of smart and intelligent surveillance systems. The goal of anomaly detection...