When using the PM10 adjoint assimilation transport model to process the control parameters in the model, the small number of available observations and the excessive number of control parameters can lead to an inappro...
详细信息
In today's era of big data, people need to extract valuable and nutritious information from these data, but for the huge database, manual browsing and manual retrieval by ordinary users are obviously inefficient. ...
详细信息
the achievements in modern unmanned systems technology are noteworthy, with Unmanned Ground Vehicles (UGVs) exemplifying exceptional payload capacity and endurance. the collaborative operation of UGV clusters has emer...
详细信息
the electric impulses of the heart are measured using a device called electrocardiogram (ECG), which is a graphical representation of heart signals for abnormality detection. the Electrocardiogram (ECG), which is noni...
详细信息
this work proposes a method for detecting Android malware by leveraging static permissions and machinelearning algorithms. A dataset of 398 Android applications was compiled, with potential malware behaviour identifi...
详细信息
In the field of machinelearning, we realize that success does not depend solely on the structure and number of parameters of the model, but also on model evaluation. In cla-ssification tasks, when faced with unlabele...
详细信息
the proceedings contain 81 papers. the topics discussed include: research on the dynamic application of trademark similarity determination based on dynamic time regularization and XGBoost;scaling machinelearning with...
ISBN:
(纸本)9798400708688
the proceedings contain 81 papers. the topics discussed include: research on the dynamic application of trademark similarity determination based on dynamic time regularization and XGBoost;scaling machinelearning with a ring-based distributed framework;detection of financial fraudulent activities withmachinelearning: a case study of detecting potential tax and invoice fraud;activation function: absolute function, one function behaves more individualized;improve the efficiency of deep reinforcement learningthrough semantic exploration guided by natural language;user entity alignment method based on cross-attribute knowledge association;research on the construction of smart community based on text mining;study on the impact of job embeddedness on employee’s innovative behavior in information technology industry;and VulPin: finer-grained slicing for pinpointing vulnerability in binary programs: precision in vulnerability detection: advanced slicing techniques for binary program analysis.
the fields of medicine and computer science have advanced in parallel, providing revolutionary techniques for the diagnosis and treatment of serious diseases. However, despite the accuracy of medical imaging devices, ...
详细信息
the enclosed environment of tunnels poses significant challenges to the effective implementation of firefighting strategies in the event of a fire. Due to the complex internal structure and narrow space of tunnels, tr...
详细信息
the proceedings contain 35 papers. the topics discussed include: towards explainable artificial intelligence for pneumonia and tuberculosis classification from chest x-ray;test case generation from quality attribute s...
ISBN:
(纸本)9798350328486
the proceedings contain 35 papers. the topics discussed include: towards explainable artificial intelligence for pneumonia and tuberculosis classification from chest x-ray;test case generation from quality attribute scenarios using machinelearning approach;Habesha women’s dress embroidery design identification using an ensemble feature extraction approach;Hadiyyissa automatic speech recognition using deep learning approach;application of machinelearning algorithms for pneumonia detection and classification;classification and prioritization of requirements smells using machinelearning techniques;Geez part of speech tagging using deep learning approaches;and machinelearning based soil-type classification.
暂无评论