Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Intro
Editor's Preface
Contents
Anomaly-Based Risk Detection Using Digital News Articles
1 Introduction
2 Background
2.1 Elliptic Envelope
2.2 Local Outlier Factor
2.3 Isolation Forest
2.4 Seasonal and Trend Decomposition Using Loess
2.5 Natural Language Processing
3 Approach
3.1 Data and Preprocessing
3.2 Anomaly Detection
3.3 News-Cluster Risk Analysis
3.4 Matching Anomalies and News-Cluster Risks
4 Evaluation
5 Results
6 Related Work
7 Conclusion
References

Robust Rule Based Neural Network Using Arithmetic Fuzzy Inference System
1 Introduction
2 Distending Function and Weighted Dombi Operator
3 Proposed Network Structure
3.1 Feed-Forward Calculations
3.2 Feedback Calculations
4 Training
5 Simulation Results and Discussion
5.1 Selling Price Prediction of Used Cars
5.2 IRIS Flower Species Classification
5.3 Wine Quality Dataset
6 Conclusion
References
A Hierarchical Approach for Spanish Sign Language Recognition: From Weak Classification to Robust Recognition System
1 Introduction
2 Related Work

3 Proposed Approach
3.1 Data Collection
3.2 Followed Pipeline
4 Experimental Results
5 Discussion
6 Conclusion and Future Work
References
Deontic Sentence Classification Using Tree Kernel Classifiers
1 Introduction
2 Methodology
2.1 Akoma Ntoso
2.2 LegalRuleML
2.3 Tree Kernels and Tree Representation
3 Related Works
4 Data
5 Experiment Settings and Results
6 Conclusions
References
Sparse Distributed Memory for Sparse Distributed Data
1 Purpose
2 Background
3 Model
4 Results
5 Conclusions
References

Quantum Displacements Dictated by Machine Learning Principles: Towards Optimization of Quantum Paths
1 Introduction
2 The Quantum Mechanics Machinery
2.1 Discrete Case
2.2 Continuous Case
2.3 Applications
2.4 Extraction of Propagator
2.5 Choice of Hamiltonian
2.6 Iterations Involving Propagators
2.7 Errors at the Energy Measurement
3 The Quantum Mechanics Machinery
4 Applications
4.1 Numerical Applications
5 Conclusion
References
A Semi-supervised Vulnerability Management System
1 Introduction
2 Related Work
3 Contributions of This Work

4 Problem Formulation
5 Algorithm
6 Experiments and Results
6.1 Database
6.2 Experiments
6.3 Preprocessing
6.4 Results
7 Analysis of Results
7.1 Improvement in Results
7.2 Word2Vec Embedding Space
8 Implementation Details
9 Model Deployment
9.1 Architecture
10 Conclusion
References
Evaluation of Deep Learning Techniques in Human Activity Recognition
1 Introduction
1.1 Motivation
1.2 Objectives
2 Background
2.1 Deep Learning
2.2 Deep Learning Architectures
2.3 Internet of Things
3 Methods
3.1 Deep Learning Models

Browse Subjects

Show more subjects...

Statistics

from
to
Export