the OSELM model is one of many classifiers for software defect prediction that can detect the specific oversampled input problems (pattern). OSELM was a more suitable model for defect prediction when used withthe ext...
详细信息
In its 4th edition, the Diabetic Foot Ulcer Challenge (DFUC) 2024 focuses on the task of Diabetic Foot Ulcer (DFU) segmentation by involving aspects of self-supervised learning as contrast to the DFUC 2022. this paper...
详细信息
GPU is widely used in high-performance computing such as big data and artificial intelligence because of its high concurrency and high throughput. Withthe development of VLSI technology, more and more processing unit...
详细信息
In the current technology development scenario numerous data are handled by users for various purposes. data become an important asset of the company. data are utilized for various improvements of the organization ful...
详细信息
this paper firstly proposes a search engine matching model based on concept lattice, which constructs concept lattices from natural language user queries and web documents, and then performs matching. When carrying ou...
详细信息
Recognizing human action is an efficient method for identifying, deciphering, and identifying human patterns and activities. the hardest part is to obtain data about human activities. the ability to recognize another ...
详细信息
All these years, information or the data on the web has grown incredibly, guiding so many researchers at the sector of Machine Language and NLP concepts. Research papers regarding Sentiment Analysis has its own compul...
详细信息
the protection of aircraft or ships from strong electromagnetic radiation is a key issue during their navigation. Withthe repaid development of big data technology, it is possible now design the hardware under the gu...
详细信息
Today's society relies heavily on electronic mail as the primary method of exchanging essential information. Emails are a simple and quick way to share and receive electronic communication. Gmail, Hotmail, Yahoo! ...
详细信息
In today's world, securing data is becoming a very important issue for an individual. Some cryptographic techniques are already discovered and some are yet to be revealed. In this paper, we are surveying an advanc...
详细信息
暂无评论