Assessment of using transfer learning with different classifiers in hypodontia diagnosis. [PDF]
Uyar T, Uyar DS.
europepmc +1 more source
A novel dataset of annotated oyster mushroom images with environmental context for machine learning applications. [PDF]
Duman S +5 more
europepmc +1 more source
Enhancing Oral Squamous Cell Carcinoma Detection Using Histopathological Images: A Deep Feature Fusion and Improved Haris Hawks Optimization-Based Framework. [PDF]
Zafar A +5 more
europepmc +1 more source
Anonymous Traffic Detection Based on Feature Engineering and Reinforcement Learning. [PDF]
Liu D, Park Y.
europepmc +1 more source
A modified vision transformer framework for image-based land cover segmentation in rural architectural design and planning. [PDF]
Wassan S +5 more
europepmc +1 more source
Crop classification with UAV multispectral remote sensing, employing an enhanced ResNet50 residual network. [PDF]
Xu C, Lu S, Feng X, Zhang X, Wang J.
europepmc +1 more source
Deep learning models for interpretation of point of care ultrasound in military working dogs. [PDF]
Hernandez Torres SI +4 more
europepmc +1 more source
Related searches:
BitTorrent (BT) plays an important role in Internet content distribution. Because public BTs suffer from the free-rider problem, Darknets are becoming increasingly popular, which use Sharing Ratio Enforcement to increase their efficiency. We crawled and traced 17 Darknets from September 2009 to February 2011, and obtained datasets about over 5 million ...
Xiaowen Chu +4 more
openaire +1 more source
As the majority of popular deep neural network (DNN) frameworks focus on a closed format CUDA implementations based on one or more NVIDIA GPUs, they cannot efficiently leverage other devices in cluster mode to accelerate the training and inference of DNNs except NVIDIA GPUs.
Longlong Liao +4 more
openaire +1 more source
The Internet contains both public content ("Surface Web"), and private content ("Deep Web") sometimes hosted on exclusive networks ("Darknets") only accessible using dedicated software such as TOR (The Onion Router). This software makes it almost impossible to identify its users.
Carl-Maria Mörch +5 more
openaire +2 more sources

