Results 1 to 10 of about 1,552,228 (293)
In recent years, a forward-looking subfield of machine learning has emerged with important applications in a variety of scientific fields. Semi-supervised learning is increasingly being recognized as a burgeoning area embracing a plethora of efficient ...
Stamatis Karlos +2 more
doaj +1 more source
Educational Software Evaluation Process [PDF]
The Active Digital Library at the Vanderbilt University Medical Center has created and implemented an educational software evaluation process to facilitate the timely recommendation for product acquisition. Using this process, breadth and depth of subject coverage, clarity of presentation, quality of construction, and ease of use are being assessed by ...
J T, Huber, N B, Giuse
openaire +2 more sources
Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks
Due to the broadcast nature of wireless transmission, traditional wireless two-hop relaying is vulnerable for eavesdroppers to overhear messages. In order to enhance the physical-layer security, this paper studies one cooperative network with caching ...
Fang Shi +5 more
doaj +1 more source
Artificial Intelligence Related Publication Analysis Based on Citation Counting
Artificial intelligence is one of the most popular technologies in recently years. Journals and conferences are widely viewed as major tools to track the development of technologies.
Zongbao Yang +4 more
doaj +1 more source
I prodotti multimediali nel contesto europeo
Le tecnologie dell’informazione e della comunicazione offrono nuove promettenti possibilita’; in questo contesto e’ importante sviluppare un ambiente europeo capace di fornire a insegnanti e studenti gli strumenti educativi idonei al loro inserimento ...
Corinne Hermant, André Richier
doaj +1 more source
Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System With Direct Links
In this paper, we study an underlay cognitive energy harvesting decode-and-forward (DF) relaying communications system with multiple secondary users (SUs) and a primary destination.
Dongqing Xie +3 more
doaj +1 more source
A Web Second-Order Vulnerabilities Detection Method
Second-order vulnerabilities are more subtle and more destructive than the first-order vulnerabilities. After researching and analyzing the principles of web penetration testing and second-order attack principles, this paper proposes a method to detect ...
Miao Liu, Bin Wang
doaj +1 more source
Patch-Based Principal Covariance Discriminative Learning for Image Set Classification
Image set classification has attracted increasing attention with respect to the use of significant amounts of within-set information. The covariance matrix is a natural and effective descriptor for describing image sets. Non-singular covariance matrices,
Hengliang Tan, Ying Gao
doaj +1 more source
Kernelized Fast Algorithm for Regularized Hull-Based Face Recognition With Image Sets
Great success in face recognition has been achieved in recent years; however, complex variations and low-resolution images remain a challenge for unconstrained face recognition.
Hengliang Tan, Ying Gao
doaj +1 more source
Spectral and Energy Efficiency of Massive MIMO for Hybrid Architectures Based on Phase Shifters
This paper investigates the downlink achievable spectral efficiency (SE) and energy efficiency (EE) of massive MIMO for hybrid architectures based on phase shifters, where the base station (BS) has perfect channel state information and baseband ...
Weiqiang Tan +5 more
doaj +1 more source

