|
|
|
Zhenzhen Di, Miao Chang, Peikun Guo, Yang Li and Yin Chang
Most worldwide industrial wastewater, including in China, is still directly discharged to aquatic environments without adequate treatment. Because of a lack of data and few methods, the relationships between pollutants discharged in wastewater and those ...
ver más
|
|
|
|
|
|
|
Jiarui Xia and Yongshou Dai
Ground roll noise suppression is a crucial step in processing deep pre-stack seismic data. Recently, supervised deep learning methods have gained popularity in this field due to their ability to adaptively learn and extract powerful features. However, th...
ver más
|
|
|
|
|
|
|
Achini Adikari, Su Nguyen, Rashmika Nawaratne, Daswin De Silva and Damminda Alahakoon
The proliferation of online hotel review platforms has prompted decision-makers in the hospitality sector to acknowledge the significance of extracting valuable information from this vast source. While contemporary research has primarily focused on extra...
ver más
|
|
|
|
|
|
|
Haidi Badr, Nayer Wanas and Magda Fayek
Unsupervised domain adaptation (UDA) presents a significant challenge in sentiment analysis, especially when faced with differences between source and target domains. This study introduces Weighted Sequential Unsupervised Domain Adaptation (WS-UDA), a no...
ver más
|
|
|
|
|
|
|
Shancheng Tang, Ying Zhang, Zicheng Jin, Jianhui Lu, Heng Li and Jiqing Yang
The number of defect samples on the surface of aluminum profiles is small, and the distribution of abnormal visual features is dispersed, such that the existing supervised detection methods cannot effectively detect undefined defects. At the same time, t...
ver más
|
|
|
|
|
|
|
Woo-Hyun Choi and Jongwon Kim
Industrial control systems (ICSs) play a crucial role in managing and monitoring critical processes across various industries, such as manufacturing, energy, and water treatment. The connection of equipment from various manufacturers, complex communicati...
ver más
|
|
|
|
|
|
|
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
The growth of the Internet of Things (IoT) has led to a significant rise in cyber attacks and an expanded attack surface for the average consumer. In order to protect consumers and infrastructure, research into detecting malicious IoT activity must be of...
ver más
|
|
|
|
|
|
|
Jianlei Qiao, Yonglu Lv, Yucai Feng, Chang Liu, Yi Zhang, Jinying Li, Shuang Liu and Xiaohui Weng
At present, the electronic nose has became a new technology for the rapid detection of pesticides. However, the technique may misidentify them for samples that have not been involved in training. Therefore, a hybrid model based on unsupervised and superv...
ver más
|
|
|
|
|
|
|
Xiaojuan Wang and Weilan Wang
As there is a lack of public mark samples of Tibetan historical document image characters at present, this paper proposes an unsupervised Tibetan historical document character recognition method based on deep learning (UD-CNN). Firstly, using the Tibetan...
ver más
|
|
|
|