Recent advancements in Smart Assistants (SAs) as well as home automation have captured the attention of both researchers and consumers. Virtual Assistants (VAs) that are speech-enabled are commonly referred to as smar...
详细信息
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st...
详细信息
In this paper, we study the problem of distributed learning (DL) with devices transmitting sign information of the local gradients to the server under communication constraints, where the devices are susceptible to By...
详细信息
This paper presents a new IoT-based approach for agricultural pest control, incorporating machine learning techniques. Traditional pest monitoring methods are labor-intensive and often result in the overuse of pestici...
详细信息
Graph neural networks have been widely used in various fields, but their security has always been of concern. Graph node injection attacks can efficiently attack and evaluate the robustness of graph neural networks. H...
详细信息
A respiratory infection like pneumonia faces a serious health challenge across the globe, especially in the poor and underdeveloped countries. The pneumonia is affected by various factors like bacteria or viruses. The...
详细信息
This research offers a comparative analysis of Qual-ity of Service (QoS) within Software Defined Networks (SDN) by assessing the POX and OpenDaylight controllers across various network topologies. The results show tha...
详细信息
Cybersecurity safeguards computer systems, net- works, and digital information from a wide variety of cyber-attacks. Its major purpose is to protect the privacy of users' data and resources while maintaining their...
详细信息
Cloud computing is an on-demand service resource that includes applications to data centres on a pay-per-use basis. While allocating resources, the node failure causes the cloud service failures. This reduces the qual...
详细信息
The volume of academic literature,such as academic conference papers and journals,has increased rapidly worldwide,and research on metadata extraction is ***,high-performing metadata extraction is still challenging due...
详细信息
The volume of academic literature,such as academic conference papers and journals,has increased rapidly worldwide,and research on metadata extraction is ***,high-performing metadata extraction is still challenging due to diverse layout formats according to journal *** accommodate the diversity of the layouts of academic journals,we propose a novel LAyout-aware Metadata Extraction(LAME)framework equipped with the three characteristics(e.g.,design of automatic layout analysis,construction of a large meta-data training set,and implementation of metadata extractor).In the framework,we designed an automatic layout analysis using PDF *** on the layout analysis,a large volume of metadata-separated training data,including the title,abstract,author name,author affiliated organization,and keywords,were automatically ***,we constructed a pre-trainedmodel,Layout-Meta BERT,to extract the metadata from academic journals with varying layout *** experimental results with our metadata extractor exhibited robust performance(Macro-F1,93.27%)in metadata extraction for unseen journals with different layout formats.
暂无评论