S Venkateshan, A Patel… - IEEE Transactions on Very …, 2014 - ieeexplore.ieee.org
Support vector machines (SVM) are a popular class of supervised models in machine learning. The associated compute intensive learning algorithm limits their use in real-time …
J Xu, L Tang, T Li - Expert Systems with Applications, 2016 - Elsevier
Abstract System maintenance for large and complex IT infrastructures highly depends on automatic system monitoring, and the performance of system monitoring depends on their …
Objectives: The development of better biomarkers for disease assessment remains an ongoing effort across the spectrum of neurologic illnesses. One approach for refining …
C Liu, X Wang, H Xu - IEEE Access, 2022 - ieeexplore.ieee.org
Graph Convolutional Networks (GCNs) have received considerable attention in the field of artificial machine intelligence (AMI) and natural language processing research because they …
It has been observed from recent studies that corticolimbic Theta rhythm from EEG recordings perceived as fear or threatening scene during neural processing of visual stimuli …
In this paper, we study the exploitation of language generation models for disinformation purposes from two viewpoints. Quantitatively, we argue that language models hardly deal …
Lumpy skin diseases virus (LSDV) is a dangerous and contagious diseases that are mostly common in Sub-Saharan African, South Eastern Europe, South Asia and as well as Middle …
OC Abikoye, SO Omokanye, TO Aro - Computing and Information …, 2018 - researchgate.net
Purpose: This paper gives an overview of data mining algorithms used for text classification and a review of works that have been performed on classifying texts. Design/Methodology …
W Wang, P Yi, H Xu - Computer Networks, 2024 - Elsevier
Cross-site scripting (XSS) attack has been one of the most dangerous attacks in cyberspace security. Traditional methods essentially discover XSS attack by detecting malicious …