|
|
|
Krishna Raj Raghavendran and Ahmed Elragal
In the context of developing machine learning models, until and unless we have the required data engineering and machine learning development competencies as well as the time to train and test different machine learning models and tune their hyperparamet...
ver más
|
|
|
|
|
|
Mikhail Lavrentiev, Konstantin Lysakov, Andrey Marchuk, Konstantin Oblaukhov and Mikhail Shadrin
Carbon footprint reduction issues have been drawing more and more attention these days. Reducing the energy consumption is among the basic directions along this line. In the paper, a low-energy approach to tsunami danger evaluation is concerned. After se...
ver más
|
|
|
|
|
|
Zehan Chen, Yuliang Lu, Kailong Zhu, Lu Yu and Jiazhen Zhao
Fuzzing is one of the most successful software testing techniques used to discover vulnerabilities in programs. Without seeds that fit the input format, existing runtime dependency recognition strategies are limited by incompleteness and high overhead. I...
ver más
|
|
|
|
|
|
Manuel D?Angelo, Alessandro Menghini, Paolo Borlenghi, Lorenzo Bernardini, Lorenzo Benedetti, Francesco Ballio, Marco Belloli and Carmelo Gentile
The present study deals with the structural safety evaluation of a 50-year-old river bridge, called Baghetto Bridge, located in north Italy on the Adda River. Generally speaking, hydraulic processes are the main cause of bridge failure. Scour and hydrody...
ver más
|
|
|
|
|
|
Olga V. Okhlupina,Dmitry S. Murashko
Pág. 17 - 20
Among the common methods of combating spam, a special place is occupied by a probabilistic machine learning algorithm, which is based on the well-known Bayes theorem. The so-called "naive" Bayesian classifier establishes the class of the document by dete...
ver más
|
|
|