We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. A Meta-learner approach to multistep-ahead time series prediction

    The utilization of machine learning has become ubiquitous in addressing contemporary challenges in data science. Moreover, there has been significant...

    Fouad Bahrpeyma, Vuong M. Ngo, ... Andrew McCarren in International Journal of Data Science and Analytics
    Article Open access 09 July 2024
  2. Negative-sample-free knowledge graph embedding

    Recently, knowledge graphs (KGs) have been shown to benefit many machine learning applications in multiple domains (e.g. self-driving, agriculture,...

    Adil Bahaj, Mounir Ghogho in Data Mining and Knowledge Discovery
    Article 09 July 2024
  3. Extract Implicit Semantic Friends and Their Influences from Bipartite Network for Social Recommendation

    Social recommendation often incorporates trusted social links with user-item interactions to enhance rating prediction. Although methods that...

    Zhigao Zhang, Fanfei Song, ... Chuansheng Dong in Data Science and Engineering
    Article Open access 09 July 2024
  4. Open benchmark for filtering techniques in entity resolution

    Entity Resolution identifies entity profiles that represent the same real-world object. A brute-force approach that considers all pairs of entities...

    Franziska Neuhof, Marco Fisichella, ... Manolis Koubarakis in The VLDB Journal
    Article 09 July 2024
  5. A robust hubness-based algorithm for image data stream classification

    Image data stream classification is in high demand and can be used in various contexts, such as public security, medicine, and remote sensing....

    Mateus C. de Lima, Elaine R. Faria, Maria Camila N. Barioni in International Journal of Data Science and Analytics
    Article 09 July 2024
  6. Video anomaly localization using modified faster RCNN with soft NMS algorithm

    Localization of anomalies in surveillance videos is a critical component of smart and intelligent surveillance systems. The goal of anomaly detection...

    S. Anoopa, A. Salim, S. Nadera Beevi in International Journal of Data Science and Analytics
    Article 08 July 2024
  7. Minimum motif-cut: a workload-aware RDF graph partitioning strategy

    In designing a distributed RDF system, it is quite common to divide an RDF graph into subgraphs, called partitions , which are then distributed. Graph...

    Peng Peng, Shengyi Ji, ... Lei Zou in The VLDB Journal
    Article 08 July 2024
  8. An efficient facial emotion recognition using convolutional neural network with local sorting binary pattern and whale optimization algorithm

    Facial emotion recognition is one of the fields of machine learning and pattern recognition. Facial expression recognition is used in a variety of...

    Fereshteh Aghabeigi, Sara Nazari, Nafiseh Osati Eraghi in International Journal of Data Science and Analytics
    Article 08 July 2024
  9. Similarity-based face image retrieval using sparsely embedded deep features and binary code learning

    Human face retrieval has long been established as one of the most interesting research topics in computer vision. With the recent development of deep...

    Abdessamad Elboushaki, Rachida Hannane, Karim Afdel in International Journal of Multimedia Information Retrieval
    Article 08 July 2024
  10. Research performance of higher education institutions in Türkiye: 1980–2022

    In recent years, there has been a growing interest in the measurement of research performance. These studies evaluate a country or groups of...

    Muammer Maral in Scientometrics
    Article Open access 08 July 2024
  11. Hyper-relational knowledge graph neural network for next POI recommendation

    With the advancement of mobile technology, Point of Interest (POI) recommendation systems in Location-based Social Networks (LBSN) have brought...

    Jixiao Zhang, Yongkang Li, ... Xuan Song in World Wide Web
    Article 06 July 2024
  12. Parallel continuous skyline query over high-dimensional data stream windows

    Real-time multi-criteria decision-making applications in fields like high-speed algorithmic trading, emergency response, and disaster management have...

    Walid Khames, Allel Hadjali, Mohand Lagha in Distributed and Parallel Databases
    Article 06 July 2024
  13. Which older publications are still highly cited in the field of bibliometrics? Contemporary bibliometric citation classics

    We find out which older publications (defined here as published before 1991) are nowadays, i.e. during the period [2013–2022], the most cited in...

    Li Li, Jiandong Zhang, ... Ronald Rousseau in Scientometrics
    Article 05 July 2024
  14. Storage of weights and retrieval method (SWARM) approach for neural networks hybridized with conformal prediction to construct the prediction intervals for energy system applications

    The prediction intervals represent the uncertainty associated with the model-predicted responses that impacts the sequential decision-making...

    Waqar Muhammad Ashraf, Vivek Dua in International Journal of Data Science and Analytics
    Article Open access 05 July 2024
  15. Journal self-citations trends in sport sciences: an analysis of disciplinary journals from 2013 to 2022

    This study reports on the yearly rate of journal self-citation (JSC) in sport sciences, how it changes over time, and its association with journal...

    Hunter Bennett, Ben Singh, Flynn Slattery in Scientometrics
    Article Open access 05 July 2024
  16. Exploring AI-driven approaches for unstructured document analysis and future horizons

    In the current industrial landscape, a significant number of sectors are grappling with the challenges posed by unstructured data, which incurs...

    Supriya V. Mahadevkar, Shruti Patil, ... Tanupriya Choudhury in Journal of Big Data
    Article Open access 05 July 2024
  17. Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review

    The Internet of Things (IoT) has been used in various aspects. Fundamental security issues must be addressed to accelerate and develop the Internet...

    Sepide Najafli, Abolrazl Toroghi Haghighat, Babak Karasfi in Knowledge and Information Systems
    Article 05 July 2024
  18. Deep learning and embeddings-based approaches for keyphrase extraction: a literature review

    Keyphrase extraction is a subtask of natural language processing referring to the automatic extraction of salient terms that semantically capture the...

    Nikolaos Giarelis, Nikos Karacapilidis in Knowledge and Information Systems
    Article Open access 05 July 2024
  19. Iterative missing value imputation based on feature importance

    Many datasets suffer from missing values due to various reasons, which not only increases the processing difficulty of related tasks but also reduces...

    Cong Guo, Wei Yang, ... Zheng Li in Knowledge and Information Systems
    Article 05 July 2024
Did you find what you were looking for? Share feedback.