|
|
|
Xinyue Lan, Liyue Wang, Cong Wang, Gang Sun, Jinzhang Feng and Miao Zhang
In this research, we introduce a deep-learning-based framework designed for the prediction of transonic flow through a linear cascade utilizing large-scale point-cloud data. In our experimental cases, the predictions demonstrate a nearly four-fold speed ...
ver más
|
|
|
|
|
|
|
Wenxin Yang, Xiaoli Zhi and Weiqin Tong
Current edge devices for neural networks such as FPGA, CPLD, and ASIC can support low bit-width computing to improve the execution latency and energy efficiency, but traditional linear quantization can only maintain the inference accuracy of neural netwo...
ver más
|
|
|
|
|
|
|
Ahmed Dourhri, Mohamed Hanine and Hassan Ouahmane
The growth of structured, semi-structured, and unstructured data produced by the new applications is a result of the development and expansion of social networks, the Internet of Things, web technology, mobile devices, and other technologies. However, as...
ver más
|
|
|
|
|
|
|
Huiyan Wu and Jun Huang
The main purpose of the joint entity and relation extraction is to extract entities from unstructured texts and extract the relation between labeled entities at the same time. At present, most existing joint entity and relation extraction networks ignore...
ver más
|
|
|
|
|
|
|
Ilia Azizi and Iegor Rudnytskyi
Multi-modal data are widely available for online real estate listings. Announcements can contain various forms of data, including visual data and unstructured textual descriptions. Nonetheless, many traditional real estate pricing models rely solely on w...
ver más
|
|
|
|
|
|
|
Bahrad A. Sokhansanj and Gail L. Rosen
A key challenge for artificial intelligence in the legal field is to determine from the text of a party?s litigation brief whether, and why, it will succeed or fail. This paper shows a proof-of-concept test case from the United States: predicting outcome...
ver más
|
|
|
|
|
|
|
Mário Antunes, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado and Tiago Murteira
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilit...
ver más
|
|
|
|
|
|
|
Jianfeng Zhu, Lichun Sui, Yufu Zang, He Zheng, Wei Jiang, Mianqing Zhong and Fei Ma
In various applications of airborne laser scanning (ALS), the classification of the point cloud is a basic and key step. It requires assigning category labels to each point, such as ground, building or vegetation. Convolutional neural networks have achie...
ver más
|
|
|
|
|
|
|
Chidubem Iddianozie and Gavin McArdle
Graph Neural Networks (GNNs) have received wide acclaim in recent times due to their performance on inference tasks for unstructured data. Typically, GNNs operate by exploiting local structural information in graphs and disregarding their global structur...
ver más
|
|
|
|
|
|
|
Mada? Abdel Jawad,Saeed Salah,Raid Zaghal
Pág. pp. 95 - 114
Mobile Ad-Hoc Networks (MANETs) are characterized as decentralized control networks. The mobile nodes route and forward data based on their routing information without the need for routing devices. In this type of networks, nodes move in an unstructured ...
ver más
|
|
|
|