Results 21 to 30 of about 17,322,096 (306)
A Survey of Convolutional Neural Networks: Analysis, Applications, and Prospects [PDF]
A convolutional neural network (CNN) is one of the most significant networks in the deep learning field. Since CNN made impressive achievements in many areas, including but not limited to computer vision and natural language processing, it attracted much
Zewen Li +4 more
semanticscholar +1 more source
A Review of Uncertainty Quantification in Deep Learning: Techniques, Applications and Challenges [PDF]
Uncertainty quantification (UQ) plays a pivotal role in reduction of uncertainties during both optimization and decision making processes. It can be applied to solve a variety of real-world applications in science and engineering.
Moloud Abdar +11 more
semanticscholar +1 more source
Learning to Classify Blockchain Peers According to Their Behavior Sequences
Blockchain technologies have the potential to establish novel financial service infrastructures and reshape numerous fields. A blockchain is essentially a distributed ledger maintained by a set of peers (i.e., trading nodes) that do not fully trust each ...
Huayun Tang +5 more
doaj +1 more source
Educational robotics has proven its positive impact on the performances and attitudes of students. However, the educational environments that employ them rarely provide teachers with relevant information that can be used to make an effective monitoring ...
Samantha Orlando +2 more
doaj +1 more source
The intended meaning of the term predictive monitoring used in the paper is the following. A population of subjects (living beings, machines, works of art, etc.) is monitored by a domain expert with regard to the possible occurrence of an undesired ...
MUSSI, S.
doaj +1 more source
The Bukidnon State University (BSU), a state university in the province of Bukidnon in the island of Mindanao, Philippines in partnership with the Commission on Information and Communications Technology (CICT), conducts the capacity-building for ...
Estela C. Itaas
doaj +1 more source
Efficient Detection of Botnet Traffic by Features Selection and Decision Trees
Botnets are one of the online threats with the most significant presence, causing billionaire losses to global economies. Nowadays, the increasing number of devices connected to the Internet makes it necessary to analyze extensive network traffic data ...
Javier Velasco-Mata +3 more
doaj +1 more source
A Simple and Correct Even-Odd Algorithm for the Point-in-Polygon Problem for Complex Polygons [PDF]
Determining if a point is in a polygon or not is used by a lot of applications in computer graphics, computer games and geoinformatics. Implementing this check is error-prone since there are many special cases to be considered.
Galetzka, Michael, Glauner, Patrick O.
core +2 more sources
External Clustering Validation using ARI, NMI and FMI [PDF]
Clustering validation is essential for assessing the quality of unsupervised learning results, yet individual external metrics often fail to provide a complete evaluation.
S Shilpa +4 more
doaj +1 more source
Body weight estimation of yak based on cloud edge computing
In stock farming, the body size parameters and weight of yaks can reasonably reflect the growth and development characteristics, production performance and genetic characteristics of yaks. However, it is difficult for herders to measure the body size and
Yu-an Zhang +5 more
doaj +1 more source

