Results 81 to 90 of about 184,038 (192)

Target Apps Selection: Towards a Unified Search Framework for Mobile Devices

open access: yes, 2018
With the recent growth of conversational systems and intelligent assistants such as Apple Siri and Google Assistant, mobile devices are becoming even more pervasive in our lives.
Aliannejadi, Mohammad   +3 more
core   +1 more source

Remote sensing for UN SDGs: A global analysis of research and collaborations

open access: yesEgyptian Journal of Remote Sensing and Space Sciences
The Sustainable Development Goals (SDGs) provide a policy-making baseline for countries to overcome shortcomings and barriers for people and the planet Earth by 2030.
Omer Ekmen, Sultan Kocaman
doaj   +1 more source

Cell fishing: A similarity based approach and machine learning strategy for multiple cell lines-compound sensitivity prediction.

open access: yesPLoS ONE, 2019
The prediction of cell-lines sensitivity to a given set of compounds is a very important factor in the optimization of in-vitro assays. To date, the most common prediction strategies are based upon machine learning or other quantitative structure ...
E Tejera   +6 more
doaj   +1 more source

A Shared Ontology Approach to Semantic Representation of BIM Data [PDF]

open access: yes, 2017
Architecture, engineering, construction and facility management (AEC-FM) projects involve a large number of participants that must exchange information and combine their knowledge for successful completion of a project.
Karshenas, Saeed, Niknam, Mehrdad
core   +1 more source

HmtDB, a Human Mitochondrial Genomic Resource Based on Variability Studies Supporting Population Genetics and Biomedical Research

open access: yesBMC Bioinformatics, 2005
Background Population genetics studies based on the analysis of mtDNA and mitochondrial disease studies have produced a huge quantity of sequence data and related information.
Pappadà Graziano   +8 more
doaj   +1 more source

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

An Investigation of Term Weighting and Feature Selection Methods for Sentiment Analysis

open access: yesMajlesi Journal of Electrical Engineering
Sentiment analysis automatically classifies the opinions, which are expressed in a document, usually as positive or negative. A review document in general, reflects its author’s opinion about the objects mentioned in the text.
Tuba Parlar, Selma Ayşe Özel
doaj  

Edge-Ready Romanian Language Models: Training, Quantization, and Deployment

open access: yesAI
We present RoBaseLM-S (125 M) and RoBaseLM-M (260 M), two compact Romanian decoder-only language models trained from scratch on a 4.3 B-token curated corpus.
T. A. Diac   +5 more
doaj   +1 more source

MSProfileR: An Open-Source Software for Quality Control of Matrix-Assisted Laser Desorption Ionization–Time of Flight Spectra

open access: yesInformatics
In the early 2000s, matrix-assisted laser desorption ionization–time of flight mass spectrometry (MALDI-TOF MS) emerged as a performant and relevant tool for identifying micro-organisms.
Refka Ben Hamouda   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy