Results 41 to 50 of about 331,795 (188)

Optimizing poultry audio signal classification with deep learning and burn layer fusion

open access: yesJournal of Big Data
This study introduces a novel deep learning-based approach for classifying poultry audio signals, incorporating a custom Burn Layer to enhance model robustness.
Esraa Hassan   +4 more
doaj   +1 more source

AntiGPS spoofing method for UAV based on LSTM-KF model

open access: yes网络与信息安全学报, 2020
A detection method of anti GPS deception of UAV was proposed for the problem that GPS signal of UAV was easy to be interfered and deceived, which combined deep learning and Kalman filter.
SUN Yang, CAO Chunjie   +1 more
doaj   +1 more source

Attention Lens: A Tool for Mechanistically Interpreting the Attention Head Information Retrieval Mechanism [PDF]

open access: green, 2023
Mansi Sakarvadia   +7 more
openalex   +1 more source

Intelligent text similarity assessment using Roberta with integrated chaotic perturbation optimization techniques

open access: yesJournal of Big Data
Precisely evaluating text similarity remains a fundamental challenge in Natural Language Processing (NLP), with widespread applications in plagiarism detection, information retrieval, semantic analysis, and recommendation systems.
Esraa Hassan   +2 more
doaj   +1 more source

Seagrass and hydrographic data for the Mediterranean Sea

open access: yesData in Brief, 2019
The dataset includes 1,771 locations of major seagrass families (Cymodoceaceae, Zosteraceae, Posidoniaceae, Hydrocharitaceae, Ruppiaceae), which are further divided into the species they include, as well as 1,284 locations of seagrass absence ...
Dimitrios Effrosynidis   +2 more
doaj   +1 more source

Privacy-Preserving Data Sharing and Computing for Outsourced Policy Iteration with Attempt Records from Multiple Users

open access: yesApplied Sciences
Reinforcement learning is a machine learning framework that relies on a lot of trial-and-error processes to learn the best policy to maximize the cumulative reward through the interaction between the agent and the environment.
Bangyan Chen, Jun Ye
doaj   +1 more source

Routing Protocol for Underwater Wireless Sensor Networks Based on a Trust Model and Void-Avoided Algorithm

open access: yesSensors
Underwater wireless sensor networks have a wide range of application prospects in important fields such as ocean exploration and underwater environment monitoring. However, the influence of complex underwater environments makes underwater wireless sensor
Jun Ye, Weili Jiang
doaj   +1 more source

Home - About - Disclaimer - Privacy