The development of Automatic Speech Recognition (ASR) systems has varied significantly across the roughly 6500 languages that make up the world's spoken languages. There is a lack of effective ASR systems due to t...
详细信息
Medical image classification tasks frequently encounter challenges associated with class imbalance, resulting in biased model training and suboptimal classification performance. To address this issue, the combination ...
详细信息
Several data mining techniques, such as classification, clustering, regression, etc., are used to determine the purchasing behaviour of customers to create value for money in businesses. In this paper, clustering is i...
详细信息
This paper analyses current best practices for using security mechanisms in extract, transform, and load (ETL) tools. The results of the analysis are visually represented in a form of an optimal security model used in...
详细信息
Scripted event prediction is the automatic learning of knowledge from unstructured text to predict subsequent events based on a given sequence of events. Existing work has mainly been based on event pairs or entire ev...
详细信息
Dementia can occur in various forms;some types of dementia are curable and some are not. Among the non-curable forms, Alzheimer’s disease (AD) is the prominent one. There is no effective treatment to cure it but it m...
详细信息
The Internet of Things (IoT) is spreading quickly across the globe, yet its security is insufficient. The results are encouraging for using machine learning to identify malware on these frequently unattended devices. ...
详细信息
Around the globe, Fake news is a raising concern and has several negative repercussions on people, societies, and countries. It has several detrimental effects on society, including disseminating false information and...
详细信息
At present, Graph Neural Network (GNN) methods usually follow the node centered message passing process, and rely heavily on smooth node characteristics rather than graph structure. In view of this limitation, based o...
详细信息
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo...
详细信息
暂无评论