Results 11 to 20 of about 186,948 (311)
MLNet: a multi-level multimodal named entity recognition architecture
In the field of human–computer interaction, accurate identification of talking objects can help robots to accomplish subsequent tasks such as decision-making or recommendation; therefore, object determination is of great interest as a pre-requisite task.
Hanming Zhai+4 more
doaj +1 more source
Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li+6 more
doaj +1 more source
In the natural and social systems of the real world, various network can be seen everywhere. The world where people live can be seen as a combination of network with different dimensions. Link prediction formalizes the interaction behavior between people.
Tianyu Xia, Yijun Gu, Dechun Yin
doaj +1 more source
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,+7 more
doaj
Security of Information and Networks
This special issue aims to make people aware and up to date of the innovative research in the area of emerging techniques and methods in security of information and network. The majority of organizations in the commercial and government sectors are relying completely on their computer and network systems. Extensive attacks can cause heavy loss in a few
Iftikhar Ahmad+3 more
openaire +4 more sources
IoT Equipment Monitoring System Based on C5.0 Decision Tree and Time-Series Analysis
Abnormal traffic and vulnerability attack monitoring play an important role in today’s Internet of Things (IoT) applications. The existing solutions are usually based on machine learning for traffic, and its disadvantage is that a large number of ...
Biaokai Zhu+8 more
doaj +1 more source
An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng+3 more
doaj +1 more source
Security risk assessment of projects in high-risk areas based on attack-defense game model
Assessing the security risk of projects in high-risk areas is particularly important. This paper develops a security risk assessment model for projects in high-risk areas based on the target loss probability model and Bayesian game model.
Yifan Yao, Wenjing Chen
doaj +1 more source
MLSFF: Multi-level structural features fusion for multi-modal knowledge graph completion
With the rise of multi-modal methods, multi-modal knowledge graphs have become a better choice for storing human knowledge. However, knowledge graphs often suffer from the problem of incompleteness due to the infinite and constantly updating nature of ...
Hanming Zhai+4 more
doaj +1 more source
Improved RANSAC features image-matching method based on SURF
For the speed of traditional SIFT algorithm in the feature extraction and matching is slow, the article proposes an improved RANSAC features image matching method based on speeded up robust features (SURF).
Jinliang Liu, FanLiang Bu, FanLiang Bu
doaj +1 more source