Results 11 to 20 of about 160,535 (190)

SFA: Small Faces Attention Face Detector

open access: yesIEEE Access, 2019
Tremendous strides have been made in face detection thanks to convolutional neural network. However, the performance of previous face detectors deteriorates dramatically as the face scale shrinks.
Shi Luo   +3 more
doaj   +1 more source

Understanding socialbot behavior on end hosts

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Server-side socialbot detection approaches can identify malicious accounts and spams in online social networks. However, they cannot detect socialbot processes, residing on user hosts, which control these accounts. Therefore, new approaches are needed to
Yukun He   +4 more
doaj   +1 more source

GroupFound: An effective approach to detect suspicious accounts in online social networks

open access: yesInternational Journal of Distributed Sensor Networks, 2017
Online social networks are an important part of people’s life and also become the platform where spammers use suspicious accounts to spread malicious URLs.
Bo Feng   +4 more
doaj   +1 more source

Detection and Independent Validation of Model-Based Quantitative Transcriptional Regulation Relationships Altered in Lung Cancers

open access: yesFrontiers in Bioengineering and Biotechnology, 2020
Differential expressions of genes are widely evaluated for the diagnosis and prognosis correlations with diseases. But limited studies investigate how transcriptional regulations are quantitatively altered in diseases.
Meiyu Duan   +8 more
doaj   +1 more source

MuscNet, a Weighted Voting Model of Multi-Source Connectivity Networks to Predict Mild Cognitive Impairment Using Resting-State Functional MRI

open access: yesIEEE Access, 2020
The neurological disorder mild cognitive impairment (MCI) demonstrates minor impacts on the patient's daily activities and may be ignored as the status of normal aging.
Jialiang Li   +8 more
doaj   +1 more source

The unpolarized and polarized single-mass three-loop heavy flavor operator matrix elements A gg,Q and ∆A gg,Q

open access: yesJournal of High Energy Physics, 2022
We calculate the gluonic massive operator matrix elements in the unpolarized and polarized cases, A gg,Q (x, μ 2) and ∆A gg,Q (x, μ 2), at three-loop order for a single mass.
J. Ablinger   +7 more
doaj   +1 more source

Symbolic Computation Software Composability [PDF]

open access: yes, 2008
We present three examples of the composition of Computer Algebra Systems to illustrate the progress on a composability infrastructure as part of the SCIEnce (Symbolic Computation Infrastructure for Europe) project1. One of the major results of the project so far is an OpenMath based protocol called SCSCP (Symbolic Computation Software Composability ...
Freundt, S.   +4 more
openaire   +1 more source

Computations for symbolic substitutions [PDF]

open access: yes, 2017
We provide a survey of results from symbolic dynamics and algebraic topology relating to Grout, a new user-friendly program developed to calculate combinatorial properties and topological invariants of a large class of symbolic substitutions. We study their subshifts (and related spaces) with an emphasis on examples of computations.
Balchin, Scott, Rust, Dan
openaire   +3 more sources

Constrained Consistency Modeling for Attributed Network Embedding

open access: yesIEEE Access, 2019
Network embedding has emerged as a fundamental approach to network analysis tasks. Its main purpose is to learn a suitable mapping function to convert nodes in networks into a low-dimensional representations.
Xuan Zang   +3 more
doaj   +1 more source

The OCS-SVM: An Objective-Cost-Sensitive SVM With Sample-Based Misclassification Cost Invariance

open access: yesIEEE Access, 2019
Studies on the traditional support vector machine (SVM) implicitly assume that the costs of different types of mistakes are the same and minimize the error rate.
Shuang Yu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy