ABSTRACT: The objective of this work is to determine the true owner of a land—public or private—in the region of Kumasi (Ghana). For this purpose, we applied different machine learning methods to the ...
If Earth needs to borrow a cup of sugar, it's comforting to know that there may be a convenient, possibly habitable, world orbiting Alpha Centauri only 4.34 light years away – at least, if the ...
1 Yibin University, School of Computer Science and Technology, Yibin, China 2 Southwest Petroleum University, School of Computer and Software, Chengdu, China Network security is the core guarantee for ...
Since version 2.11, OpenSearch has supported neural sparse retrieval as a novel semantic search approach. Leveraging inverted index technology, this method achieves efficiency comparable to ...
SEATTLE — Companies are increasingly using algorithms and artificial intelligence (AI) to analyze the massive amount of data they scoop up about us to decide what financial products we qualify for and ...
Abstract: In this study, the machine learning algorithm, K-Nearest Neighbor (KNN) is introduced for human action recognition. A wearable sensor is employed to collect the acceleration signals, which ...
Department of Chemistry and The James Franck Institute, The University of Chicago, Chicago, Illinois 60637, United States Department of Chemistry, Department of Electrical and Computer Engineering, ...
A sophisticated cyber-espionage attack used by notorious Russian advanced persistent threat (APT) Fancy Bear at the outset of the current Russia-Ukraine war demonstrates a novel attack vector that a ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results