Understanding the relationship between emerging technology and research and development has long been of interest to companies, policy makers and researchers. In this paper new sources of data and tools are combined w...
详细信息
Many detailed data on past geological hazard events are buried in geological hazard reports and have not been fully utilized. The growing developments in geographic information retrieval and temporal information retri...
详细信息
Many detailed data on past geological hazard events are buried in geological hazard reports and have not been fully utilized. The growing developments in geographic information retrieval and temporal information retrieval offer opportunities to analyse this wealth of data to mine the spatiotemporal evolution of geological disaster occurrence and enhance risk decision making. This study presents a combined NLP and ontology matching information extraction framework for automatically recognizing semantic and spatiotemporal information from geological hazard reports. This framework mainly extracts unstructured information from geological disaster reports through named entity recognition, ontology matching and gazetteer matching to identify and annotate elements, thus enabling users to quickly obtain key information and understand the general content of disaster reports. In addition, we present the final results obtained from the experiments through a reasonable visualization and analyse the visual results. The extraction and retrieval of semantic information related to the dynamics of geohazard events are performed from both natural and human perspectives to provide information on the progress of events.
In this letter, a triple-mode wideband filtering antenna with planar configuration is presented. The designed antenna has a single substrate layer, which consists of one half-mode circular patch resonator, one half-mo...
详细信息
This study aims at designing an efficient combinatorial classifier, which fuses linear discriminant analysis (LDA) and kernel support vector machine (SVM) classifiers. The proposed method is called kernel SVM-LDA whic...
详细信息
This study aims at designing an efficient combinatorial classifier, which fuses linear discriminant analysis (LDA) and kernel support vector machine (SVM) classifiers. The proposed method is called kernel SVM-LDA which benefits from global property of LDA, simultaneous with localized capability of SVM along with mapping ability of RBF kernel to project input data into a more separable high dimensional space. To assess the proposed scheme, Kernel SVM-LDA was applied to some standard datasets derived from UCI database and then compared to standard LDA and kernel SVM classifiers. Kernel SVM-LDA was also employed in cue-based brain computer interface to classify the left and right imagery movements. The results indicate that the introduced method is more superior to that of LDA and kernel SVM because it surpasses the counterparts in terms of robustness, complexity and performance.
This paper presents a novel approach, based on the whale optimization algorithm (WOA), for channel estimation in wireless communication systems. The proposed method provides a means to accurately estimate the wireless...
详细信息
With the rapid growth of internet connected devices and the tremendous amount of data that could be generated and exchanged in IoT environment, we need to reconsider in the current IoT architecture that based on Cloud...
详细信息
In the current social media landscape, cyberbullying and online harassment remain pressing issues. Therefore, we planned a cyberbullying detection system for social media platforms. It can protect online communities f...
In the current social media landscape, cyberbullying and online harassment remain pressing issues. Therefore, we planned a cyberbullying detection system for social media platforms. It can protect online communities from toxic behaviors and make a global impact by fostering a safer and more constructive online environment. We are mainly focused on developing an improved technique to detect bot profiles on social media, developing a mechanism to detect abusive content and sarcasm, developing a mechanism to detect defamatory comments on social media, and developing an effective method for detecting offensive and abusive content in image-format reviews on social media using machine learning algorithms.
With the rapid development of the Internet of Things(IoT),all kinds of data are increasing *** storage and computing on cloud servers are increasingly restricted by *** has prompted the development of fog *** computin...
详细信息
With the rapid development of the Internet of Things(IoT),all kinds of data are increasing *** storage and computing on cloud servers are increasingly restricted by *** has prompted the development of fog *** computing is to place the calculation and storage of data at the edge of the network,so that the entire Internet of Things system can run more *** main function of fog computing is to reduce the burden of cloud *** placing fog nodes in the IoT network,the data in the IoT devices can be transferred to the fog nodes for storage and *** of the information collected by IoT devices are malicious traffic,which contains a large number of malicious *** IoT devices do not have strong computing power and the ability to detect malicious traffic,we need to deploy a system to detect malicious attacks on the fog *** response to this situation,we propose an intrusion detection system based on distributed ensemble *** system mainly uses Convolutional Neural Network(CNN)as the first-level *** the second level,the random forest will finally classify the prediction results obtained in the first *** paper uses the UNSW-NB15 dataset to evaluate the performance of the *** results show that the model has good detection performance for most attacks.
This paper re-examines the relationship between the Knowledge Transfer (KT) and the project management process groups. Knowledge Transfer as one of the knowledge management life-cycle is supposed to have a remarkable ...
详细信息
People re-identification is a fundamental stage in video surveillance systems. This stage is used for determining the labels of the people's images usually based on their visual similarities. The appearance salien...
详细信息
暂无评论