We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 598 results
  1. Evaluation and Measurement

    In this section, we introduce some of the evaluation metrics and the evaluation setups for language identification. Unsurprisingly, these metrics and...
    Tommi Jauhiainen, Marcos Zampieri, ... Krister Lindén in Automatic Language Identification in Texts
    Chapter 2024
  2. The effect of amount, type and reoccurrence of interactions in electronic books on word learning and story comprehension by kindergartners

    Numerous studies have examined the positive and negative effects of various types of interactions that occur while children view electronic book...

    Menahem Yeari, Adi Hadad, Ofra Korat in Education and Information Technologies
    Article 09 August 2023
  3. Enhancing Security and Ownership Protection of Neural Networks Using Watermarking Techniques: A Systematic Literature Review Using PRISMA

    The rise of artificial intelligence (AI) and machine learning (ML) has prompted concerns regarding the intellectual property (IP) protection of...
    Roseline Oluwaseun Ogundokun, Christiana Oluwakemi Abikoye, ... Omosola Jacob Olabode in Multimedia Watermarking
    Chapter 2024
  4. Introduction to Language Identification

    Language identification (LI) is the task of predicting the language(s) in a text or speech input. The main difference between LI of text and speech...
    Tommi Jauhiainen, Marcos Zampieri, ... Krister Lindén in Automatic Language Identification in Texts
    Chapter 2024
  5. Design and Implementation of Land Area Calculation for Maps Using Mask Region Based Convolutional Neural Networks Deep Neural Network

    Abstract

    Maps of the land are developed by the surveyor, map developer according to survey of land. In such maps land boundaries are shown using...

    Akram A. Pathan, Nagaraj V. Dharwadkar in Pattern Recognition and Image Analysis
    Article 01 March 2023
  6. 6DOF pose estimation of a 3D rigid object based on edge-enhanced point pair features

    The point pair feature (PPF) is widely used for 6D pose estimation. In this paper, we propose an efficient 6D pose estimation method based on the PPF...

    Chenyi Liu, Fei Chen, ... Kai Xu in Computational Visual Media
    Article Open access 30 November 2023
  7. Specific Challenges of Variation and Text Types

    One fascinating aspect of language identification which makes it difficult is the similarity between languages. Some languages seem to be extremely...
    Tommi Jauhiainen, Marcos Zampieri, ... Krister Lindén in Automatic Language Identification in Texts
    Chapter 2024
  8. Automatic Assessment of Motor Impairments in Autism Spectrum Disorders: A Systematic Review

    Autism spectrum disorder (ASD) is mainly described as a disorder of communication and socialization. However, motor abnormalities are also common in...

    Thomas Gargot, Dominique Archambault, ... Salvatore Maria Anzalone in Cognitive Computation
    Article 10 January 2022
  9. A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain

    In this research work, a secured watermarking method has been proposed using Chinese Remainder Theorem (CRT) in combination with Integer Wavelet...
    Santa Singh, Partha Chowdhuri, ... Biswapati Jana in Computational Intelligence in Communications and Business Analytics
    Conference paper 2022
  10. Unpacking smart education’s soft smartness variables: Leadership and human resources capacities as key participatory actors

    The education system has been radically transformed by technological impetuses owed to the Fourth Industrial Revolution (4.0). Most recently,...

    Jonela Carmada Marisa Wilson, Patrick Kandege, ... Mussie Tesfay Teklu in Education and Information Technologies
    Article 18 June 2021
  11. Public Data Auditing Scheme Using RSA and Blockchain for Cloud Storage

    With the widespread cloud storage devices, most users store their data over cloud storage. A dishonest user might raise a false claim about the...
    A. Vamshi, R. Eswari, Shivam Dubey in Security, Privacy and Data Analytics
    Conference paper 2023
  12. Searching for Satoshi

    In modern times the identity of few people has been the object of more significant inquiry and mystery than the inventor of Bitcoin, Satoshi...
    Anders Lisdorf in Still Searching for Satoshi
    Chapter 2023
  13. Exploring the active constituents of Oroxylum indicum in intervention of novel coronavirus (COVID-19) based on molecular docking method

    The severe acute respiratory syndrome COVID-19 declared a global pandemic by WHO has become the present wellbeing worry to the whole world. There is...

    Sapan Shah, Dinesh Chaple, ... Govind Lohiya in Network Modeling Analysis in Health Informatics and Bioinformatics
    Article 06 February 2021
  14. Forecast Aggregation and Error Comparison: An Empirical Study

    The aim of this paper is to present empirical results associated with forecast performance. It is known that common measures of error fail to be...
    German Wehinger, Josh Beal in Data Science – Analytics and Applications
    Conference paper 2021
  15. Comparison of Encryption Techniques to Encrypt Private Parts of an Image

    This article compares two methods for encrypting private information of the image and to make the image data highly secure. One method implements the...
    Nisha P. Shetty, Balachandra Muniyal, ... Sarath Chandra Reddy Yemma in Advances in Electrical and Computer Technologies
    Conference paper 2022
  16. Motion Analysis

    With image sequences, one can analyze change information or moving objects in the image (Bovik 2005; Davies 2005; Hartley and Zisserman 2004;...
    Chapter 2021
  17. Constructing a Violence Recognition Technique for Elderly Patients with Lower Limb Disability

    Elder abuse has been recognized as an important public health problem, and will become increasingly serious as the world's population ages....
    Lun-** Hung, Chih-Wei Yang, ... Chien-Liang Chen in Smart Grid and Internet of Things
    Conference paper 2022
  18. Hyperparameter autotuning of programs with HybridTuner

    Algorithms must often be tailored to a specific architecture and application in order to fully harness the capabilities of sophisticated computer...

    Benjamin Sauk, Nikolaos V. Sahinidis in Annals of Mathematics and Artificial Intelligence
    Article 18 May 2022
  19. Certificateless network coding proxy signatures from lattice

    Network coding can improve the information transmission efficiency and reduces the network resource consumption, so it is a very good platform for...

    Huifang Yu, Ning Wang in Frontiers of Computer Science
    Article 13 December 2022
Did you find what you were looking for? Share feedback.