Results 31 to 40 of about 279,861 (147)

Exploring Character Trigrams for Robust Arabic Text Classification: A Comparative Analysis in the Face of Vocabulary Expansion and Misspelled Words

open access: yesIEEE Access
Tokenization is an important early step in natural language processing (NLP) tasks. The idea is to split the input sentence into smaller units, called tokens, for further processing.
Dorieh Alomari, Irfan Ahmad
doaj   +1 more source

Thickness Uniformity Dependence on Polymer Viscosity in Silver-Nanowire-Embedded Flexible and Transparent Electrodes

open access: yesApplied Sciences, 2020
We herein report the effect of the viscosity of a prepolymer solution on the thickness uniformity of silver-nanowire-embedded flexible transparent electrodes.
Moonsoo Chae   +6 more
doaj   +1 more source

Knowledge embedded [PDF]

open access: yesSynthese, 2019
AbstractHow should we account for the contextual variability of knowledge claims? Many philosophers favour an invariantist account on which such contextual variability is due entirely to pragmatic factors, leaving no interesting context-sensitivity in the semantic meaning of ‘know that.’ I reject this invariantist division of labor by arguing that ...
openaire   +2 more sources

Natural Intelligence in Search of Ways to Apply Artificial One (Results of the Scientific and Practical Conference “The Use of Artificial Intelligence in Library and Information Activities”)

open access: yesБиблиосфера
The article is an analytical review of reports and presentations made at the scientific conference “Application of Artificial Intelligence in Library and Information Activities” and held by INION RAS on May 29, 2024.
V. K. Stepanov
doaj   +1 more source

On Variable Exponent Amalgam Spaces

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2012
We derive some of the basic properties of weighted variable exponent Lebesgue spaces Lp(.)w (ℝn) and investigate embeddings of these spaces under some conditions.
Aydin İsmail
doaj   +1 more source

Matching the LBO Eigenspace of Non-Rigid Shapes via High Order Statistics

open access: yesAxioms, 2014
A fundamental tool in shape analysis is the virtual embedding of the Riemannian manifold describing the geometry of a shape into Euclidean space. Several methods have been proposed to embed isometric shapes into flat domains, while preserving the ...
Alon Shtern, Ron Kimmel
doaj   +1 more source

Exploiting Human Visual Limitations for High Capacity Information Hiding in Digital Images Using Alpha Channel

open access: yesIEEE Access
Information hiding in digital images is a critical technique for secure communication in the era of high-volume multimedia exchange. While many existing methods embed secret data by modifying image parameters in the spatial or frequency domains, they ...
Mohsin Shah   +3 more
doaj   +1 more source

Frustratingly Easy Meta-Embedding – Computing Meta-Embeddings by Averaging Source Word Embeddings [PDF]

open access: yesProceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 2 (Short Papers), 2018
Creating accurate meta-embeddings from pre-trained source embeddings has received attention lately. Methods based on global and locally-linear transformation and concatenation have shown to produce accurate meta-embeddings. In this paper, we show that the arithmetic mean of two distinct word embedding sets yields a performant meta-embedding that is ...
Coates, Joshua, Bollegala, Danushka
openaire   +3 more sources

An Automatic Framework Recognizing the Relationships of Cultural Heritage

open access: yesIEEE Access
The field of cultural heritage has developed over a long period, accumulating a wealth of research findings. Researchers are now focusing on systematic relationships and taxonomic studies of heritage, exploring the underlying cultural information ...
Zizhan Zhang, Zijun Zhou, Yingchun Cao
doaj   +1 more source

A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices

open access: yesSensors, 2022
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for ...
Iman Almomani   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy