-
7381
From Entity Description to Semantic Analysis: The Case of Theodor Fontane’s Notebooks
Published 2015-06-01“…Scholars all over the world are now able to use huge datasets for further research. There are now many digital editions available, but only a few tools to analyze them. …”
Get full text
Article -
7382
Tracking algorithm of Siamese network based on online target classification and adaptive template update
Published 2021-08-01“…Aiming at the problem that tracking algorithm of Siamese network learned the embedded features of the tracked target and the object in the offline training stage, and these embedded features often lacked the target-specific context information, which made these tracking algorithms less robust, a tracking algorithm of the Siamese network based on online target classification and adaptive template update was proposed, which used SiamRPN++ as the baseline algorithm.Firstly, a cross-correlation feature map supervision module for classification was designed in the offline training phase to learn more discriminative embedded features.Secondly, an online target classification module that included an attention mechanism in the online tracking phase was designed, and the online update filter strategy in the module was used to filter out the background noise.Finally, an adaptive template update module was designed to update the target template information using the UpdateNet.The results of experiments on VOT2018 and VOT2019 datasets verify the effectiveness of the proposed algorithm, which brings 13.5% and 18.2% (EAO) improvement respectively compared with the baseline algorithm SiamRPN++.…”
Get full text
Article -
7383
Alpha Power Transformed Generalized Weibull Distribution With Its Detailed Properties and Applications
Published 2024-01-01“…Simulation studies and analysis of real datasets with the new APTGWD model demonstrate the distribution’s potential as an alternative for modeling lifetime and reliability data. …”
Get full text
Article -
7384
Motor Tasks Classification Using Phase Locking Value in a BCI Based EEG Paradigm
Published 2025-12-01“…An approach based on phase synchronization was tested on two datasets (one with EEG signals recorded from 15 healthy subjects and one with EEG signals recorded from 9 subjects with disabilities). …”
Get full text
Article -
7385
Sequential recommendation algorithm for long-tail users based on knowledge-enhanced contrastive learning
Published 2024-06-01“…Experimental results on real-world datasets demonstrate the effectiveness of the proposed algorithm in improving performance for long-tail users.…”
Get full text
Article -
7386
Lung cancer Prediction and Classification based on Correlation Selection method Using Machine Learning Techniques
Published 2021-05-01“…Basically, the informational indexes utilized as a part of this examination are taken from UCI datasets for patients affected by lung cancer. The principle point of this paper is to the execution investigation of the classification algorithms accuracy by WEKA Tool. …”
Get full text
Article -
7387
Measurements of 4ΛH and 4ΛHe Production in √sNN = 3.0-3.5 GeV Au+Au Collisions at RHIC
Published 2025-01-01“…In these proceedings, the measurements of A=4 hypernuclei (4ΛH and 4ΛHe) production from the RHIC-STAR experiment utilizing the fixed target datasets are presented. The measured yields dN=dy of 4ΛH and 4ΛHe as a function of rapidity are shown from √sNN and 3.5 GeV Au+Au collisions. …”
Get full text
Article -
7388
Semantic segmentation of 3D point cloud based on contextual attention CNN
Published 2020-07-01“…Aiming at the under-segmentation of 3D point cloud semantic segmentation caused by the lack of contextual fine-grained information of the point cloud,an algorithm based on contextual attention CNN was proposed for 3D point cloud semantic segmentation.Firstly,the fine-grained features in local area of the point cloud were mined through the attention coding mechanism.Secondly,the contextual features between multi-scale local areas were captured by the contextual recurrent neural network coding mechanism and compensated with the fine-grained local features.Finally,the multi-head mechanism was used to enhance the generalization ability of the network.Experiments show that the mIoU of the proposed algorithm on the three standard datasets of ShapeNet Parts,S3DIS and vKITTI are 85.4%,56.7% and 38.1% respectively,which has good segmentation performance and good generalization ability.…”
Get full text
Article -
7389
Comparing ChatGPT And LSTM In Predicting Changes In Quarterly Financial Metrics
Published 2024-06-01“…The methodology involves preprocessing large datasets from Twitter concerning major companies such as Amazon, Google, and Tesla, training LSTM models, and prompt engineering for ChatGPT-based predictions. …”
Get full text
Article -
7390
Impact of Using Double Positive Samples in Deming Regression
Published 2022-01-01“…Each of the simulation is made up of 100 datasets with 300 observations. Simulation studies suggest that the traditional Deming regression which deletes censored observations gives biased estimates and a low coverage, whereas the adapted Deming regression that takes censoring into account gives estimates that are close to the true value making them unbiased and gives a high coverage. …”
Get full text
Article -
7391
Multi-view graph neural network for fraud detection algorithm
Published 2022-11-01“…Aiming at the problem that in the field of fraud detection, imbalance labels and lack of necessary connections between fraud nodes, resulting in fraud detection tasks not conforming to the hypothesis of homogeneity of graph neural networks, multi-view graph neural network for fraud detection (MGFD) algorithm was proposed.First, A structure-independent encoder was used to encode the attributes of nodes in the network to learn the difference between the fraud node and the normal node.The hierarchical attention mechanism was designed to integrate the multi-view information in the network, and made full use of the interaction information between different perspectives in the network to model the nodes on the basis of learning differences.Then, based on the data imbalance ratio sampled subgraph, the sample was constructed according to the connection characteristics of fraud nodes for classification, which solved the problem of imbalance sample labels.Finally, the prediction label was used to identify whether a node is fraudulent.Experiments on real-world datasets have shown that the MGFD algorithm outperforms the comparison method in the field of graph-based fraud detection.…”
Get full text
Article -
7392
Ensemble Classification Approach for Sarcasm Detection
Published 2021-01-01“…The proposed model is implemented in Python and tested on five datasets of different sizes. The performance of the models is tested with regard to various metrics.…”
Get full text
Article -
7393
LEO satellite Internet resource allocation strategy based on terminal traffic prediction
Published 2024-07-01“…An improved LSTM-ARIMA algorithm was proposed with real datasets by the strategy to accurately predict the data traffic generated in the ground area over a certain period of time in the future. …”
Get full text
Article -
7394
Improved Convolutional Neural Image Recognition Algorithm based on LeNet-5
Published 2022-01-01“…Based on convolution operation, pooling operation, softmax classifier, and network optimization algorithm in improved convolutional neural network of LeNet-5, this paper conducts image recognition experiments on handwritten digits and face datasets, respectively. A method combining local binary pattern and convolutional neural network is proposed for face recognition research. …”
Get full text
Article -
7395
Robust deepfake detection method based on siamese network
Published 2024-04-01“…The proposed method demonstrated an average accuracy exceeding 90% across various datasets with different compression levels, surpassing several existing detection techniques. …”
Get full text
Article -
7396
Differentiable Few-view CT-Reconstruction for Arbitrary CT-Trajectories including Prior Knowledge
Published 2025-02-01“…Experiments on real-world datasets demonstrate the efficacy of the approach. …”
Get full text
Article -
7397
A Mixture of Regular Vines for Multiple Dependencies
Published 2021-01-01“…However, the variation of complex hidden correlations from one pair of variables to another is more likely to be present in many real datasets. Single-type bivariate copulas are unable to deal with such a problem. …”
Get full text
Article -
7398
The global Multidimensional Poverty Index: Harmonised level estimates and their changes over time
Published 2025-01-01“…The estimates are based on 211 individual survey datasets, provided primarily by the Demographic Health Surveys (DHS) and the Multiple Indicator Cluster Surveys (MICS). …”
Get full text
Article -
7399
Defending Deep Neural Networks Against Backdoor Attack by Using De-Trigger Autoencoder
Published 2025-01-01“…Experiments were conducted using MNIST, Fashion-MNIST, and CIFAR-10 as the experimental datasets and TensorFlow as the machine learning library. …”
Get full text
Article -
7400
Design of nodes importance assessment method for complex network based on neighborhood information
Published 2024-03-01“…Accurate identification of influential nodes in complex networks is crucial for network management and network security.The local centrality method is concise and easy to use, but ignores the topological relationship between neighboring nodes and cannot provide globally optimal results.A node importance assessment method was proposed to correlate the node edge relationship and topology, which firstly applied the H-index and information entropy to assess the nodes, then combined the structural holes of the nodes with the structural characteristics of the nodes, and took into account the attribute of “bridging” while focusing on the node’s own quality and the amount of information about the neighboring nodes.The algorithm was validated by simulating the propagation process using the SIR model, and the Kendall correlation coefficient, complementary cumulative distribution function and propagation influence were applied to validate the validity and applicability of the method.Comparison of the experimental results on six real network datasets shows that the proposed method is more accurate than the traditional centrality methods in identifying and ordering the key nodes in the network.…”
Get full text
Article