We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 121-140 of 10,000 results
  1. Review of few-shot learning application in CSI human sensing

    Wi-Fi sensing has garnered increasing interest for its significant advantages, primarily leveraging Wi-Fi signal fluctuations induced by human...

    Zhengjie Wang, Jianhang Li, ... Yin**g Guo in Artificial Intelligence Review
    Article Open access 05 July 2024
  2. State-of-the-art review on the use of AI-enhanced computational mechanics in geotechnical engineering

    Significant uncertainties can be found in the modelling of geotechnical materials. This can be attributed to the complex behaviour of soils and rocks...

    Hongchen Liu, Huaizhi Su, ... Daniel Dias-da-Costa in Artificial Intelligence Review
    Article Open access 05 July 2024
  3. Augmenting Cervical Cancer Analysis with Deep Learning Classification and Topography Selection Using Artificial Bee Colony Optimization

    According to the research and study, cervical cancer has risen to develop the fourth most communal malignancy to strike women. Five different forms...

    K. Ramu, Arun Ananthanarayanan, ... Sanjay Kumar Suman in SN Computer Science
    Article 05 July 2024
  4. “Solar synergy: maximizing photovoltaic power with spotted hyena method in uniform and partial-shade environmental conditions”

    A novel bioinspired Spotted-Hyena Method (SH) is proposed to track the maximum power point of partially shaded photovoltaic arrays. The SH algorithm...

    Saurabh Pandey, Manish Kumar Srivastava in International Journal of Information Technology
    Article 05 July 2024
  5. Enhancing Forecasting Accuracy with a Moving Average-Integrated Hybrid ARIMA-LSTM Model

    This research provides a time series forecasting model that is hybrid which combines Long Short-Term Memory (LSTM) and Autoregressive Integrated...

    Sumalatha Saleti, Lovely Yeswanth Panchumarthi, ... Shilpa Jitte in SN Computer Science
    Article 05 July 2024
  6. Performance of the pre-trained large language model GPT-4 on automated short answer grading

    Automated Short Answer Grading (ASAG) has been an active area of machine-learning research for over a decade. It promises to let educators grade and...

    Article Open access 05 July 2024
  7. Integration of facility manager in planning, design, and execution of construction projects

    Construction projects typically progress through four primary phases, namely planning, design, implementation, and operation. This study discusses...

    Yasir A. Jari, Abdulrazak B. Abdulghafour in Journal of Umm Al-Qura University for Engineering and Architecture
    Article Open access 05 July 2024
  8. Improved V-detector algorithm based on bagging for earthquake prediction with faults

    With the highly nonlinear relationship between various seismic feature indicators and earthquakes, the researchers can hardly construct an earthquake...

    Lu Peng, Yiwen Liang, He Yang in The Journal of Supercomputing
    Article 05 July 2024
  9. Evolution of Information Infrastructures in Healthcare as Convergence of Digital Trajectories

    In information infrastructures at hospitals, various stakeholders are responsible for specific information and communications technology (ICT)...

    Kristian Malm-Nicolaisen, Gunnar Ellingsen, ... Gro-Hilde Severinsen in Computer Supported Cooperative Work (CSCW)
    Article Open access 05 July 2024
  10. Multimedia Educational System and its Improvement Using AI Model for a Higher Education Platform

    In the world of technology today, the hardware, applications, and online computing service have transformed instructional approaches and classroom...

    Abdullah Bajahzar in SN Computer Science
    Article 05 July 2024
  11. Graph foundation model

    Graph Foundation Models represent an evolving direction in graph machine learning. Drawing inspiration from the success of Large Language Models in...

    Chuan Shi, Junze Chen, ... Cheng Yang in Frontiers of Computer Science
    Article 05 July 2024
  12. CT-MFENet: Context Transformer and Multi-Scale Feature Extraction Network via Global-Local Features Fusion for Retinal Vessels Segmentation

    Segmentation of the retinal vessels in the fundus is crucial for diagnosing ocular diseases. Retinal vessel images often suffer from category...

    Dangguo Shao, Yuanbiao Yang, ... Sanli Yi in Journal of Shanghai Jiaotong University (Science)
    Article 05 July 2024
  13. Conversing with AI chatbots: examining what OpenAI ChatGPT-4, Microsoft Bing Chatbot, and google bard know, think they know, do not know, and would like to know about engineering

    Over the past few weeks, chatbots have become increasingly popular, and these are likely to revolutionize our lives. While the most common three...

    M. Z. Naser, Saleh AlOgla, ... Gang Zhang in Journal of Umm Al-Qura University for Engineering and Architecture
    Article Open access 05 July 2024
  14. Robust consistency learning for facial expression recognition under label noise

    Label noise is inevitable in facial expression recognition (FER) datasets, especially for datasets that collected by web crawling, crowd sourcing in...

    Yumei Tan, Haiying **a, Shuxiang Song in The Visual Computer
    Article 05 July 2024
  15. ‘Worldview’ of the AIGC systems: stability, tendency and polarization

    This study aims to investigate the worldview characteristics of current systems of artificial intelligence generated content (AIGC). Eight...

    Hexiang Liu in AI & SOCIETY
    Article 05 July 2024
  16. Optimizing U-Net CNN performance: a comparative study of noise filtering techniques for enhanced thermal image analysis

    Infrared thermal imaging presents a promising avenue for detecting physiological phenomena such as hot flushes in animals, presenting a non-invasive...

    Hamid Hoorfar, Istvan Merchenthaler, Adam C. Puche in The Journal of Supercomputing
    Article 05 July 2024
  17. Lattice-based device-to-device authentication and key exchange protocol for IoT system

    Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices...

    Article 05 July 2024
  18. FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption

    Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate...

    Yao Pan, Zheng Chao, ... Wang Liming in Cybersecurity
    Article Open access 04 July 2024
  19. Business Unit Development: Vorteile und Herausforderungen für beteiligte Mitarbeiter

    The ongoing shortage of skilled workers in the IT sector is a key challenge for companies and is hampering progress in the digital transformation. As...

    Dominik Scharpf, Altus Viljoen, ... Helmut Krcmar in HMD Praxis der Wirtschaftsinformatik
    Article Open access 04 July 2024
Did you find what you were looking for? Share feedback.