|
|
|
Marie-Therese Charlotte Evans, Majid Latifi, Mominul Ahsan and Julfikar Haider
Keyword extraction from Knowledge Bases underpins the definition of relevancy in Digital Library search systems. However, it is the pertinent task of Joint Relation Extraction, which populates the Knowledge Bases from which results are retrieved. Recent ...
ver más
|
|
|
|
|
|
Jie Zhang, Qiao Wang, Paul Mitchell and Hamed Ahmadi
Integrated access and backhaul (IAB) networks offer transformative benefits, primarily their deployment flexibility in locations where fixed backhaul faces logistical or financial challenges. This flexibility is further enhanced by IAB?s inherent ability...
ver más
|
|
|
|
|
|
Yilei Wang, Yuelin Hu, Wenliang Xu and Futai Zou
Dark web vendor identification can be seen as an authorship aliasing problem, aiming to determine whether different accounts on different markets belong to the same real-world vendor, in order to locate cybercriminals involved in dark web market transact...
ver más
|
|
|
|
|
|
Shihao Ma, Jiao Wu, Zhijun Zhang and Yala Tong
Addressing the limitations, including low automation, slow recognition speed, and limited universality, of current mudslide disaster detection techniques in remote sensing imagery, this study employs deep learning methods for enhanced mudslide disaster d...
ver más
|
|
|
|
|
|
Maria Inês Frutuoso, Horácio C. Neto, Mário P. Véstias and Rui Policarpo Duarte
Wearable devices used for personal monitoring applications have been improved over the last decades. However, these devices are limited in terms of size, processing capability and power consumption. This paper proposes an efficient hardware/software embe...
ver más
|
|
|