Results 11 to 20 of about 1,765,999 (278)

Generating Chinese Event Extraction Method Based on ChatGPT and Prompt Learning

open access: yesApplied Sciences, 2023
Regarding the scarcity of annotated data for existing event extraction tasks and the insufficient semantic mining of event extraction models in the Chinese domain, this paper proposes a generative joint event extraction model to improve existing models ...
Jianxun Chen, Peng Chen, Xuxu Wu
doaj   +1 more source

MLNet: a multi-level multimodal named entity recognition architecture

open access: yesFrontiers in Neurorobotics, 2023
In the field of human–computer interaction, accurate identification of talking objects can help robots to accomplish subsequent tasks such as decision-making or recommendation; therefore, object determination is of great interest as a pre-requisite task.
Hanming Zhai   +4 more
doaj   +1 more source

Multidomain Network Based on Programmable Networks: Security Architecture [PDF]

open access: yes, 2005
This paper proposes a generic security architecture designed for a multidomain and multiservice network based on programmable networks. The multiservice network allows users of an IP network to run programmable services using programmable nodes ...
Alarcos, Bernardo   +2 more
core   +2 more sources

Hate Speech Detection Using Machine Learning: A Survey

open access: yesAcademy Journal of Science and Engineering, 2023
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H.,   +7 more
doaj  

Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree

open access: yesMathematics, 2022
Quantum informatics is a new subject formed by the intersection of quantum mechanics and informatics. Quantum communication is a new way to transmit quantum states through quantum entanglement, quantum teleportation, and quantum information splitting ...
Dongfen Li   +6 more
doaj   +1 more source

Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks [PDF]

open access: yes, 2016
Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar.
Alocious, Chaminda   +2 more
core   +2 more sources

Secure physical layer network coding versus secure network coding [PDF]

open access: yes2018 IEEE Information Theory Workshop (ITW), 2018
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is transmitted over a noiseless network and a part of the edges or a part of the intermediate (untrusted)
openaire   +5 more sources

New Parameters of Linear Codes Expressing Security Performance of Universal Secure Network Coding [PDF]

open access: yes, 2012
The universal secure network coding presented by Silva et al. realizes secure and reliable transmission of a secret message over any underlying network code, by using maximum rank distance codes.
Kurihara, Jun   +2 more
core   +1 more source

Research on the Link Prediction Model of Dynamic Multiplex Social Network Based on Improved Graph Representation Learning

open access: yesIEEE Access, 2021
In the natural and social systems of the real world, various network can be seen everywhere. The world where people live can be seen as a combination of network with different dimensions. Link prediction formalizes the interaction behavior between people.
Tianyu Xia, Yijun Gu, Dechun Yin
doaj   +1 more source

An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks

open access: yesSensors, 2023
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication ...
Yuan Cheng   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy