-
1181
Comparative Analysis of Traditional and Modern NLP Techniques on the CoLA Dataset: From POS Tagging to Large Language Models
Published 2025-01-01“…The task of classifying linguistic acceptability, exemplified by the CoLA (Corpus of Linguistic Acceptability) dataset, poses unique challenges for natural language processing (NLP) models. These challenges include distinguishing between subtle grammatical errors, understanding complex syntactic structures, and detecting semantic inconsistencies, all of which make the task difficult even for human annotators. …”
Get full text
Article -
1182
An NN Framework for Target Number Detection in FMCW Radar Systems via Hankelization: A Low-Dimensional Data Representation Perspective
Published 2025-01-01“…By integrating the mathematical processes of Hankelization and singular value extraction, we can perform input data manipulation for effective target number detection, resulting in constructing an efficient NN framework. …”
Get full text
Article -
1183
Star Identification Algorithm Based on Dynamic Distance Ratio Matching
Published 2024-12-01Get full text
Article -
1184
Seepage area of the cold seep exhibits strong homogeneous selection on prokaryotic community assembly and supports high depth variability of both archaeal and bacterial communities
Published 2025-07-01“…In this study, we comprehensively investigated the microbial depth variability and its underlying assembly process in the seepage and non-seepage areas of Haima Cold Seep. …”
Get full text
Article -
1185
Remaining useful life prediction of Lithium-ion batteries based on data preprocessing and CNN-LSSVR algorithm
Published 2025-06-01“…Targeting the thorny issues of limited battery historical cycle data and the impact of uncertainty in the data collection process in practical applications, this study proposes a Remaining useful life (RUL) prediction method for lithium-ion batteries based on the data preprocessing and the joint convolutional neural network (CNN)-least squares support vector regression (LSSVR) algorithm. …”
Get full text
Article -
1186
Dataset collection for automatic generation of commit messages
Published 2025-04-01“…In this study, a comprehensive approach was used, including data collection from popular GitHub repositories, preliminary data processing and filtering, as well as statistical analysis and natural language processing method (text vectorization). …”
Get full text
Article -
1187
Short text automatic scoring system based on BERT-BiLSTM model
Published 2022-05-01Get full text
Article -
1188
Wheat policy, wheat yield and production in Ethiopia
Published 2022-12-01“…The purpose of this study was to evaluate the effects of wheat policy, and wheat processing industrial policy on wheat yield and production using Vector Error Correction (VEC) and Tobit models. …”
Get full text
Article -
1189
Construction of advanced persistent threat attack detection model based on provenance graph and attention mechanism
Published 2024-03-01“…In response to the difficulty of existing attack detection methods in dealing with advanced persistent threat (APT) with longer durations, complex and covert attack methods, a model for APT attack detection based on attention mechanisms and provenance graphs was proposed.Firstly, provenance graphs that described system behavior based on system audit logs were constructed.Then, an optimization algorithm was designed to reduce the scale of provenance graphs without sacrificing key semantics.Afterward, a deep neural network (DNN) was utilized to convert the original attack sequence into a semantically enhanced feature vector sequence.Finally, an APT attack detection model named DAGCN was designed.An attention mechanism was applied to the traceback graph sequence.By allocating different weights to different positions in the input sequence and performing weight calculations, sequence feature information of sustained attacks could be extracted over a longer period of time, which effectively identified malicious nodes and reconstructs the attack process.The proposed model outperforms existing models in terms of recognition accuracy and other metrics.Experimental results on public APT attack datasets show that, compared with existing APT attack detection models, the accuracy of the proposed model in APT attack detection reaches 93.18%.…”
Get full text
Article -
1190
Quantum key distribution through quantum machine learning: a research review
Published 2025-05-01Get full text
Article -
1191
Sentiment Analysis of Tweets Using Supervised Machine Learning Techniques Based on Term Frequency
Published 2021-01-01“…Sentiment analysis of the text uses Natural language processing, a machine learning technique to tell the orientation of opinion of a piece of text. …”
Get full text
Article -
1192
Advanced sentiment analysis in online shopping: Implementing LSTM models analyzing E-commerce user sentiments
Published 2025-07-01“…The authors have used a large dataset of customer reviews from famous e-commerce websites, pre-processed for noise reduction and standardization of the input. …”
Get full text
Article -
1193
Identification of Rice Varieties Using Machine Learning Algorithms
Published 2022-04-01“…The images were pre-processed using MATLAB software and prepared for feature extraction. …”
Get full text
Article -
1194
Speech emotion recognition using long-term average spectrum
Published 2025-04-01“…Automatic speech emotion recognition has become an important research subject in the area of speech signal processing. The performance of classification algorithms depends on the features extracted from speech. …”
Get full text
Article -
1195
Deep Learning Approach for Predicting Psychodiagnosis
Published 2024-08-01“…Currently, there is a great need for effectively processing mental healthcare with the integration of artificial intelligence such as machine learning and deep learning. …”
Get full text
Article -
1196
-
1197
-
1198
-
1199
AUTOMATIC SCORING OF KNOWLEDGE GAINED AND SHARED THROUGH DISCUSSION FORUMS: BASED ON THE COMMUNITY OF INQUIRY MODEL
Published 2025-02-01“…The methodology integrated Random Forest (RF) classification with TF-IDF feature extraction and Support Vector Machine (SVM) classification with Word2Vec embedding. …”
Get full text
Article -
1200
Advanced Color Edge Detection Using Clifford Algebra in Satellite Images
Published 2021-01-01“…Quaternion-based Fourier transform is used to process red, green and blue (RGB) images separately in the vector field. …”
Get full text
Article