Search
Search Results
-
A deep learning-based approach for the identification of selected species of genus Euphorbia L.
The classification of Euphorbia species is a challenging task due to their diverse growth forms and morphological features. In this paper, we have...
-
On Symmetry and Differential Properties of Generalized Boolean Functions
In this paper we investigate various differential properties of generalized Boolean functions defined on... -
Active Transfer Learning for Handwriting Recognition
With the advent of deep neural networks, handwriting recognition systems have recently achieved remarkable performance. Unfortunately, to achieve... -
A Novel Integrating Approach Between Graph Neural Network and Complex Representation for Link Prediction in Knowledge Graph
Deep learning brings high results in many problems, including Link Prediction on Knowledge Graphs (KGs). Although there are many techniques to... -
A transfer learning enabled approach for ocular disease detection and classification
Ocular diseases pose significant challenges in timely diagnosis and effective treatment. Deep learning has emerged as a promising technique in...
-
Deep Machine Learning Investigation of Phase Transitions
We explore the possibilities of using neural networks to study phase transitions. The main question is the level of accuracy which can be achieved... -
What Is Long Covid?
Long COVID, also known as Post-Acute Sequelae of COVID-19 (PASC), is a post-infectious condition characterized by a range of persistent symptoms and... -
Robust Data-Driven Region of Interest Segmentation for Breast Thermography
In recent years, there has been considerable developments in infrared imaging technology, and thermography is emerging as a promising modality for... -
A novel facial emotion recognition model using segmentation VGG-19 architecture
Facial Emotion Recognition (FER) has gained popularity in recent years due to its many applications, including biometrics, detection of mental...
-
PLE-MobileBERT: enhancing call content classification during emergencies using the ECP dataset
Researchers have been concentrating on categorizing text into several categories during the past few years based on tweets, SMS messages, etc. This...
-
Poisoning attacks on face authentication systems by using the generative deformation model
Various studies have revealed the vulnerabilities of machine learning algorithms. For example, a hacker can poison a deep learning facial recognition...
-
Alternate inference-decision reinforcement learning with generative adversarial inferring for bridge bidding
Contract bridge is a competitive-cooperative multiplayer game. In the bidding phase, the decision-making process is complex, given the extensive...
-
Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks
Powered by data-driven technologies, precision agriculture offers immense productivity and sustainability benefits. However, fragmentation across...
-
Data Augmentation and Loss Normalization for Deep Noise Suppression
Speech enhancement using neural networks is recently receiving large attention in research and being integrated in commercial devices and... -
An empirical investigation of organic software product lines
Software product line engineering is a best practice for managing reuse in families of software systems that is increasingly being applied to novel...
-
A qualitative and quantitative analysis of open citations to retracted articles: the Wakefield 1998 et al.'s case
In this article, we show the results of a quantitative and qualitative analysis of open citations on a popular and highly cited retracted paper:...
-
Background & Foundations
The following chapter gives a brief introduction on the background of the past developments of the research field of AI and its major milestones that... -
Discrete-Constrained Regression for Local Counting Models
Local counts, or the number of objects in a local area, is a continuous value by nature. Yet recent state-of-the-art methods show that formulating... -
Dilated Transformer with Feature Aggregation Module for Action Segmentation
Segmenting human actions in long untrimmed videos is challenging due to the complicated temporal correlations between actions and over-segmentation...
-
A Geometric Approach to Linear Cryptanalysis
A new interpretation of linear cryptanalysis is proposed. This ‘geometric approach’ unifies all common variants of linear cryptanalysis, reveals...