We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. FairMOE: counterfactually-fair mixture of experts with levels of interpretability

    With the rise of artificial intelligence in our everyday lives, the need for human interpretation of machine learning models’ predictions emerges as...

    Joe Germino, Nuno Moniz, Nitesh V. Chawla in Machine Learning
    Article Open access 08 July 2024
  2. Fast linear model trees by PILOT

    Linear model trees are regression trees that incorporate linear models in the leaf nodes. This preserves the intuitive interpretation of decision...

    Jakob Raymaekers, Peter J. Rousseeuw, ... Ruicong Yao in Machine Learning
    Article Open access 08 July 2024
  3. A systematic approach for learning imbalanced data: enhancing zero-inflated models through boosting

    In this paper, we propose systematic approaches for learning imbalanced data based on a two-regime process: regime 0, which generates excess zeros...

    Yeasung Jeong, Kangbok Lee, ... Sumin Han in Machine Learning
    Article Open access 08 July 2024
  4. An uncertainty-aware domain adaptive semantic segmentation framework

    Semantic segmentation is significant to realize the scene understanding of autonomous driving. Due to the lack of annotated real-world data, the...

    Huilin Yin, Pengyu Wang, ... Jun Yan in Autonomous Intelligent Systems
    Article Open access 08 July 2024
  5. CSSLnO: Cat Swarm Sea Lion Optimization-based deep learning for fake news detection from social media

    Social media has effectively shortened the time for the distribution of information, which sometimes carry news when compared to traditional methods....

    Kanthi Kiran Sirra, Shashi Mogalla, Kandalam Basamma Madhuri in International Journal of Information Technology
    Article 07 July 2024
  6. A fast verifiable fully homomorphic encryption technique for secret computation on cloud data

    In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of...

    Ganesh Kumar Mahato, Swarnendu Kumar Chakraborty in International Journal of Information Technology
    Article 07 July 2024
  7. Multiple unmanned ship coverage and exploration in complex sea areas

    This study addresses the complexities of maritime area information collection, particularly in challenging sea environments, by introducing a...

    Feifei Chen, Qingyun Yu in Autonomous Intelligent Systems
    Article Open access 05 July 2024
  8. Integrated feature selection and ensemble learning for heart disease detection: a 2-tier approach with ALAN and ET-ABDF machine learning model

    The findings of this investigation give a novel approach to the forecasting of heart disease. For the purpose of determining significant features, it...

    Aruna Mandula, Baby Shalini Vijaya Kumar in International Journal of Information Technology
    Article 05 July 2024
  9. “Solar synergy: maximizing photovoltaic power with spotted hyena method in uniform and partial-shade environmental conditions”

    A novel bioinspired Spotted-Hyena Method (SH) is proposed to track the maximum power point of partially shaded photovoltaic arrays. The SH algorithm...

    Saurabh Pandey, Manish Kumar Srivastava in International Journal of Information Technology
    Article 05 July 2024
  10. Lattice-based device-to-device authentication and key exchange protocol for IoT system

    Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices...

    Article 05 July 2024
  11. Water-saving control system based on multiple intelligent algorithms

    Water conservation has become a global problem as the population increases. In many densely populated cities in China, leaks from century-old pipe...

    Fengnian Liu, **ang Yu, Junya Tang in Autonomous Intelligent Systems
    Article Open access 04 July 2024
  12. Nature inspired recommendation with path optimization for online social network communities

    Human sentiment prevalent in online dialogues largely governs the formation of communities in online social networks. These recommendation methods...

    Mansi Goel, Adwitiya Sinha in International Journal of Information Technology
    Article 04 July 2024
  13. Transfer learning for emotion detection in conversational text: a hybrid deep learning approach with pre-trained embeddings

    Understanding the emotions and sentiments from conversations has relevance in many application areas. Specifically, conversational agents,...

    Sheetal Kusal, Shruti Patil, ... Deepali Vora in International Journal of Information Technology
    Article 03 July 2024
  14. Rule learning by modularity

    In this paper, we present a modular methodology that combines state-of-the-art methods in (stochastic) machine learning with well-established methods...

    Albert Nössig, Tobias Hell, Georg Moser in Machine Learning
    Article Open access 03 July 2024
  15. Measure-operator convolutions and applications to mixed-state Gabor multipliers

    For the Weyl-Heisenberg group, convolutions between functions and operators were defined by Werner as a part of a framework called quantum harmonic...

    Hans G. Feichtinger, Simon Halvdansson, Franz Luef in Sampling Theory, Signal Processing, and Data Analysis
    Article Open access 03 July 2024
  16. Delineation of ECG waveform components using encoder-decoder architecture with Postprocess algorithm

    With the exponential increase in heart disease cases, it is essential to construct models (algorithms) that can be used to delineate...

    Deepti Sharma, Narendra Kohli in International Journal of Information Technology
    Article 02 July 2024
  17. Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm

    In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...

    Voore Subba Rao, G. Ravindra Babu in International Journal of Information Technology
    Article 02 July 2024
  18. PROUD: PaRetO-gUided diffusion model for multi-objective generation

    Recent advancements in the realm of deep generative models focus on generating samples that satisfy multiple desired properties. However, prevalent...

    Yinghua Yao, Yuangang Pan, ... **n Yao in Machine Learning
    Article 02 July 2024
  19. A novel approach to detect, analyze and block adversarial web pages

    The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with...

    M. Ranjith Kumar, Darshana A. Naik, ... C. V. Guru Rao in International Journal of Information Technology
    Article 02 July 2024
  20. Detecting review fraud using metaheuristic graph neural networks

    Although online reviews play a critical role in sha** consumer behavior and establishing institutional trust, this reliance on online reviews has...

    Article Open access 02 July 2024
Did you find what you were looking for? Share feedback.