Search
Search Results
-
Similarity-based face image retrieval using sparsely embedded deep features and binary code learning
Human face retrieval has long been established as one of the most interesting research topics in computer vision. With the recent development of deep...
-
Minimum motif-cut: a workload-aware RDF graph partitioning strategy
In designing a distributed RDF system, it is quite common to divide an RDF graph into subgraphs, called partitions , which are then distributed. Graph...
-
Video anomaly localization using modified faster RCNN with soft NMS algorithm
Localization of anomalies in surveillance videos is a critical component of smart and intelligent surveillance systems. The goal of anomaly detection...
-
An efficient facial emotion recognition using convolutional neural network with local sorting binary pattern and whale optimization algorithm
Facial emotion recognition is one of the fields of machine learning and pattern recognition. Facial expression recognition is used in a variety of...
-
Hyper-relational knowledge graph neural network for next POI recommendation
With the advancement of mobile technology, Point of Interest (POI) recommendation systems in Location-based Social Networks (LBSN) have brought...
-
Parallel continuous skyline query over high-dimensional data stream windows
Real-time multi-criteria decision-making applications in fields like high-speed algorithmic trading, emergency response, and disaster management have...
-
Storage of weights and retrieval method (SWARM) approach for neural networks hybridized with conformal prediction to construct the prediction intervals for energy system applications
The prediction intervals represent the uncertainty associated with the model-predicted responses that impacts the sequential decision-making...
-
Exploring AI-driven approaches for unstructured document analysis and future horizons
In the current industrial landscape, a significant number of sectors are grappling with the challenges posed by unstructured data, which incurs...
-
Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review
The Internet of Things (IoT) has been used in various aspects. Fundamental security issues must be addressed to accelerate and develop the Internet...
-
Deep learning and embeddings-based approaches for keyphrase extraction: a literature review
Keyphrase extraction is a subtask of natural language processing referring to the automatic extraction of salient terms that semantically capture the...
-
DQN-PACG: load regulation method based on DQN and multivariate prediction model
Demand response plays a pivotal role in modern smart grid systems, aiding in balancing energy consumption. However, the increasing energy demands of...
-
Iterative missing value imputation based on feature importance
Many datasets suffer from missing values due to various reasons, which not only increases the processing difficulty of related tasks but also reduces...
-
VAE-GNA: a variational autoencoder with Gaussian neurons in the latent space and attention mechanisms
Variational autoencoders (VAEs) are generative models known for learning compact and continuous latent representations of data. While they have...
-
LightCapsGNN: light capsule graph neural network for graph classification
Graph neural networks (GNNs) have achieved excellent performances in many graph-related tasks. However, they need appropriate pooling operations to...
-
Cybersecurity Regulation—Types, Principles, and Country Deep Dives in Asia
Cybersecurity regulation is growing in number, teeth, and enforcement. The ever-increasing reliance on computers and the internet by our societies...
-
Temporal analysis of topic modeling output by machine learning techniques
Topic modeling is widely recognized as one of the most effective and significant methods of unsupervised text analysis. This method facilitates...
-
Efficient base station deployment in specialized regions with splitting particle swarm optimization algorithm
Signal coverage quality and intensity distribution in complex environments pose a critical challenge, particularly evident in high-density personnel...
-
A novel discrete slash family of distributions with application to epidemiology informatics data
This study puts forward a new class of discrete distribution that can be used by the epidemiologists and medical scientists to model data relating to...
-
VAT/GST harmonisation challenges for digital assets such as bitcoin and NFTs in the EU following Case C-264/14 (Skatteverket v David Hedqist)
The verdict in the case of Skatteverket v. David Hedqvist (Kokott, Advocate General (2015) Opinion delivered on 16 July 2015, Case C-264/14....