The advantage of recursive programming is that it is very easy to write and it only requires very few lines of code if done *** query language(SQL)is a database language and is used to manipulate *** Microsoft SQL Ser...
详细信息
The advantage of recursive programming is that it is very easy to write and it only requires very few lines of code if done *** query language(SQL)is a database language and is used to manipulate *** Microsoft SQL Server 2000,recursive queries are implemented to retrieve data which is presented in a hierarchical format,but this way has its *** table expression(CTE)construction introduced in Microsoft SQL Server 2005 provides the significant advantage of being able to reference itself to create a recursive *** data structures,organizational charts and other parent-child table relationship reports can easily benefit from the use of recursive *** recursive query is illustrated and implemented on some simple hierarchical *** addition,one business case study is brought forward and the solution using recursive query based on CTE is *** the same time,stored procedures are programmed to do the recursion in *** results show that recursive queries based on CTEs bring us the chance to create much more complex queries while retaining a much simpler syntax.
The utilization of multi-agent systems has been increasingly prevalent across various sectors, owing to their notable efficacy in execution. However, a multitude of hazards exist that possess the capability to undermi...
详细信息
Optical Character Recognition (OCR) technology is essential in converting printed or handwritten documents into machine-readable text. This paper provides an overview of machine learning based OCR technology, includin...
详细信息
Aptamers are single-stranded DNA or RNA oligonucleotides that selectively bind to specific targets, making them valuable for drug design and diagnostic applications. Identifying the interactions between aptamers and t...
详细信息
Purpose-Parkinson’s disease(PD)is a well-known complex neurodegenerative ***,its identification is based on motor disorders,while the computer estimation of its main symptoms with computational machine learning(ML)ha...
详细信息
Purpose-Parkinson’s disease(PD)is a well-known complex neurodegenerative ***,its identification is based on motor disorders,while the computer estimation of its main symptoms with computational machine learning(ML)has a high exposure which is supported by researches ***,ML approaches required first to refine their parameters and then to work with the best model *** process often requires an expert user to oversee the performance of the ***,an attention is required towards new approaches for better forecasting ***/methodology/approach-To provide an available identification model for Parkinson disease as an auxiliary function for clinicians,the authors suggest a new evolutionary classification *** core of the prediction model is a fast learning network(FLN)optimized by a genetic algorithm(GA).To get a better subset of features and parameters,a new coding architecture is introduced to improve GA for obtaining an optimal FLN ***-The proposed model is intensively evaluated through a series of experiments based on Speech and HandPD benchmark *** very popular wrappers induction models such as support vector machine(SVM),K-nearest neighbors(KNN)have been tested in the same *** results support that the proposed model can achieve the best performances in terms of accuracy and ***/value-A novel efficient PD detectionmodel is proposed,which is called *** A-W-FLN utilizes FLN as the base classifier;in order to take its higher generalization ability,and identification capability is alsoembedded to discover themost suitable featuremodel in the detection ***,the proposedmethod automatically optimizes the FLN’s architecture to a smaller number of hidden nodes and solid connecting *** helps the network to train on complex PD datasets with non-linear features and yields superior result.
Image to caption has attracted extensive research attention ***,image to poetry,especially Chinese classical poetry,is much more *** works mainly focus on generating coherent poetry without taking the contexts of poet...
详细信息
Image to caption has attracted extensive research attention ***,image to poetry,especially Chinese classical poetry,is much more *** works mainly focus on generating coherent poetry without taking the contexts of poetry into *** this paper,we propose an Images2Poem with the Dual-CharRNN model which exploits images to generate Chinese classical poems in different ***,we first extract a few keywords representing elements from the given image based on multi-label image ***,these keywords are expanded to related ones with the planning-based ***,we employ Dual-CharRNN to generate Chinese classical poetry in different contexts.A comprehensive evaluation of human judgements demonstrates that our model achieves promising performance and is effective in enhancing poetry's semantic consistency,readability,and *** present an Images2Poem with the Dual-CharRNN model exploiting images to generate Chinese classical poems in different contexts,which effectively improves the semantic consistency,readability and aesthetics of the generated poetry.
This study presents a pilot study on the potential future use of aerial sound sources utilizing parametric array loudspeakers (PALs) in drones via fifth-generation (5G) networks. Integrating superdirectional loudspeak...
详细信息
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor...
详细信息
In this study, we demonstrated light shift detection in a running atomic clock using the multi-photodetection method. This method enables the observation of atomic resonances with different intensities using the inten...
详细信息
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or v...
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or videos), while cryptography scrambles the data into an unreadable format. This paper introduces a new way to hide data using a technique called Perfect Square Quotient Differencing. Instead of embedding data in a straight sequence, the method hides information in two steps within the components of an image pixel (called the quotient and remainder). In the first step, a perfect square quantization technique is applied to the quotient part. In the second step, the Two Least Significant Bit (2LSB) method is used on the remainder part. A new range-table is also introduced to help determine how much data can be hidden in the first step. This two-step approach allows a large amount of data to be hidden (about 3 bits per pixel on average). The method was tested on many animated color images, and its performance was measured using tools like Peak-Signal-to-Noise-Ratio (PSNR), Mean Square Error (MSE), Universal Image Quality Index (UIQI), and Payload Curve. The results show that this method works better than several modern steganography techniques. Additionally, tests were conducted to ensure the method is secure against potential attacks. This new algorithm could be particularly useful for protecting digital documents stored in cloud-based platforms, offering a robust and efficient way to keep data safe.
暂无评论