Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
12521
Bidirectional convolutional recurrent neural network architecture with group-wise enhancement mechanism for text sentiment classification
Published 2022-05-01“…Sentiment analysis has been a well-studied research direction in computational linguistics. Deep neural network models, including convolutional neural networks (CNN) and recurrent neural networks (RNN), yield promising results on text classification tasks. …”
Get full text
Article -
12522
Towards solving NLP tasks with optimal transport loss
Published 2022-11-01“…Such functions play a vital role in machine learning algorithms as they steer the learning process. Most common loss functions in natural language processing (NLP), such as Kullback–Leibler (KL) and Jensen–Shannon (JS) divergences, do not base their computations on the properties of label coordinates. …”
Get full text
Article -
12523
LITERATURE REVIEW: ADVANTAGES AND DISADVANTAGES OF BLACK BOX AND WHITE BOX TESTING METHODS
Published 2025-01-01Get full text
Article -
12524
Dynamic subgraph pruning and causal-aware knowledge distillation for temporal knowledge graphs
Published 2025-07-01“…Using a time-decay Hawkes process, DynTKG filters historical events to reconstruct critical temporal subgraphs, effectively reducing redundant computations while maintaining essential dependencies. …”
Get full text
Article -
12525
-
12526
Multi-agent deep reinforcement learning for RIS-assisted secure UAV communication
Published 2025-07-01Get full text
Article -
12527
-
12528
RRDGNN: Relational reflective disentangled graph neural network for entity alignment
Published 2025-05-01Get full text
Article -
12529
RIMFuzz: real-time impact-aware mutation for library API fuzzing
Published 2025-06-01Get full text
Article -
12530
Node importance ranking for influence maximization in social networks
Published 2025-08-01Get full text
Article -
12531
Using genetic Algorithm in Task scheduling for Multiprocessing System
Published 2007-07-01Get full text
Article -
12532
Deep consensus semantic aware network for partial multi-view incomplete multi-label classification
Published 2025-05-01“…Abstract Recently, multi-view multi-label classification (MVMLC) has attracted considerable attention, particularly in the computer vision field. However, due to overlooking incomplete views and missing labels caused by data collection limitations and unreliable annotations, many existing methods have difficulty in extracting consensus semantic information from diverse data sources. …”
Get full text
Article -
12533
The effect of 3D visualization on mainframe application maintenance: A controlled experiment
Published 2019-07-01Get full text
Article -
12534
DESIGNING A WEB-BASED RESTAURANT RESERVATION INFORMATION SYSTEM WITH REQUIREMENT PROTOTYPING METHOD
Published 2025-03-01“…On the consumer side, it is also easier because they can make reservations and food menus from anywhere via a computer or smartphone device connected to the internet. …”
Get full text
Article -
12535
Vehicle detection method based on multi-layer selective feature for UAV aerial images
Published 2025-07-01Get full text
Article -
12536
Offline Arabic handwritten word recognition: A transfer learning approach
Published 2022-11-01Get full text
Article -
12537
Efficient quantum circuit research and implementation for 16-bit S-boxes based on composite field
Published 2025-06-01“…Abstract With the development of quantum computing technology, efficiently implementing the core component S-box of block ciphers in quantum environments has become an important research direction in the field of cryptographic engineering. …”
Get full text
Article -
12538
-
12539
A sparse and invisible targeted backdoor attack in federated learning
Published 2025-07-01Get full text
Article -
12540