Showing 281 - 300 results of 309 for search '(( ((papal OR ((pasar OR paper) OR (ppart OR par))) OR kapal) name ) OR ( (papa OR park) name ))', query time: 0.21s Refine Results
  1. 281
  2. 282

    Learning hierarchical review graph representations for recommendation by Liu, Yong, Yang, Susen, Zhang, Yinan, Miao, Chunyan, Nie, Zaiqing, Zhang, Juyong

    Published 2022
    “…Therefore, they may not be effective in capturing the global dependency between words and tend to be easily biased by noise review information. In this paper, we propose a novel review-based recommendation model, named Review Graph Neural Network (RGNN). …”
    Get full text
    Journal Article
  3. 283

    Self-supervised Self2Self denoising strategy for OCT speckle reduction with a single noisy image by Ge, Chenkun, Yu, Xiaojun, Yuan, Miao, Fan, Zeming, Chen, Jinna, Shum, Perry Ping, Liu, Linbo

    Published 2024
    “…To alleviate the influences of speckles without requiring ground-truth images, this paper presents a self-supervised deep learning scheme, namely, Self2Self strategy (S2Snet), for OCT despeckling using a single noisy image. …”
    Get full text
    Journal Article
  4. 284

    Decentralized multimedia data sharing in IoV: a learning-based equilibrium of supply and demand by Fan, Jiani, Xu, Minrui, Guo, Jiale, Shar, Lwin Khin, Kang, Jiawen, Niyato, Dusit, Lam, Kwok-Yan

    Published 2023
    “…We propose a time-sensitive Key-Policy Attribute-Based Encryption (KP-ABE) mechanism coupled with Named Data Networking (NDN) to protect data in IoVs, which adds a layer of security to our proposed solution. …”
    Get full text
    Journal Article
  5. 285

    A finer-grain analysis of the leakage (non) resilience of OCB by Berti, Francesco, Bhasin, Shivam, Breier, Jakub, Hou, Xiaolu, Poussier, Romain, Standaert, François-Xavier, Udvarhelyi, Balasz

    Published 2023
    “…OCB3 is one of the winners of the CAESAR competition and is among the most popular authenticated encryption schemes. In this paper, we put forward a fine-grain study of its security against side-channel attacks. …”
    Get full text
    Journal Article
  6. 286

    TriviA and uTriviA : two fast and secure authenticated encryption schemes by Chakraborti, Avik, Chattopadhyay, Anupam, Muhammad Hassan, Mridul Nandi

    Published 2020
    “…In this paper, we propose two hardware optimized authenticated encryption schemes: TriviA-v2 and uTriviA. …”
    Get full text
    Journal Article
  7. 287

    Experimental and numerical investigations of press-braked stainless steel channel section beam-columns by Zhang, Lulu, Li, Shuai, Tan, Kang Hai, Zhao, Ou

    Published 2022
    “…The buckling behaviour and resistances of press-braked stainless steel channel section beam-columns under combined compression and minor-axis bending have been studied in the present paper through laboratory testing and numerical modelling. …”
    Get full text
    Journal Article
  8. 288

    A unified framework of active transfer learning for cross-system recommendation by Zhao, Lili, Pan, Sinno Jialin, Yang, Qiang

    Published 2017
    “…Based on the framework, we propose three solutions by specifying three state-of-the-art collaborative filtering methods, namely Maximum-Margin Matrix Factorization, Regularized Low-rank Matrix Factorization, and Probabilistic Matrix Factorization. …”
    Get full text
    Get full text
    Journal Article
  9. 289

    Energy efficient resource migration based load balance mechanism for high traffic applications IoT by Kumar, Sunil, Cengiz, Korhan, Vimal, Suresh, Suresh, A.

    Published 2022
    “…These frequent changes demand a new network architecture which supports future technologies and solves all these issues named as the proposal of networks defined by software. …”
    Get full text
    Article
  10. 290
  11. 291

    Towards efficient video-based action recognition: context-aware memory attention network by Koh, Thean Chun, Yeo, Chai Kiat, Jing, Xuan, Sivadas, Sunil

    Published 2024
    “…A persistent challenge in this field is to develop more efficient models capable of real-time recognition with high accuracy for widespread implementation. In this research paper, we introduce a novel human action recognition model named Context-Aware Memory Attention Network (CAMA-Net), which eliminates the need for optical flow extraction and 3D convolution which are computationally intensive. …”
    Get full text
    Journal Article
  12. 292
  13. 293

    Attention-aware resource allocation and QoE analysis for metaverse xURLLC services by Du, Hongyang, Liu, Jiazhen, Niyato, Dusit, Kang, Jiawen, Xiong, Zehui, Zhang, Junshan, Kim, Dong In

    Published 2023
    “…To model the QoE mathematically, we propose a novel metric named Meta-Immersion that incorporates both the objective KPIs and subjective feelings of Metaverse users. …”
    Get full text
    Journal Article
  14. 294

    Constrained neuro fuzzy inference methodology for explainable personalised modelling with applications on gene expression data by Singh, Balkaran, Doborjeh, Maryam, Doborjeh, Zohreh, Budhraja, Sugam, Tan, Samuel, Sumich, Alexander, Goh, Wilson, Lee, Jimmy, Lai, Edmund, Kasabov, Nikola

    Published 2023
    “…Thus far, most machine learning methods applied to gene expression datasets, including deep neural networks, lack personalised interpretability. This paper proposes a new methodology named personalised constrained neuro fuzzy inference (PCNFI) for learning personalised rules from high dimensional datasets which are structurally and semantically interpretable. …”
    Get full text
    Journal Article
  15. 295

    Neural abstractive summarization: improvements at the sequence-level by Ravaut, Mathieu

    Published 2024
    “…We propose a new model named PromptSum, which steers output summaries given an input list of keywords, such as named entities. …”
    Get full text
    Thesis-Doctor of Philosophy
  16. 296

    Atmospheric characterization of cold exoplanets using a 1.5-m coronagraphic space telescope by Maire, Anne-Lise, Galicher, Raphael, Boccaletti, Anthony, Baudoz, Pierre, Schneider, Jean, Stam, Daphne, Cahoy, Kerri, Traub, Wes

    Published 2017
    “…However, the main interest of such instruments, namely the analysis of planet atmospheric/surface properties, has remained largely unexplored. …”
    Get full text
    Article
  17. 297

    Effective type label-based synergistic representation learning for biomedical event trigger detection by Hao, Anran, Yuan, Haohan, Hui, Siu Cheung, Su, Jian

    Published 2024
    “…We conduct experiments on three benchmark BioNLP datasets, namely MLEE, GE09, and GE11, to evaluate our proposed BioLSL model. …”
    Get full text
    Journal Article
  18. 298

    话语标记 “可是” 在马来西亚华语会话中的语用功能 = Pragmatic functions of discourse marker “Keshi” in conversational Malaysian Mandarin by 胡文绮 Woo, Wen Qi

    Published 2016
    “…Previous research have investigated extensively the truth value semantics of “keshi” based on written Mandarin, however, this paper finds that the various uses of “keshi” in natural conversations can hardly be explained with such semantics. …”
    Get full text
    Final Year Project (FYP)
  19. 299

    Mobile application for outdoor augmented reality by Chang, Rongjia

    Published 2017
    “…For massive audiences visiting Singapore National Parks, many of whom are interested in plants, there are demands for a channel that supplies information about varieties of plants inside the Singapore National Parks. …”
    Get full text
    Final Year Project (FYP)
  20. 300