intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Network embedding

Xem 1-20 trên 134 kết quả Network embedding
  • Vietnamese text-based person search is still a challenging problem with the limited dataset of Vietnamese descriptions. The current popular approach to this problem is Deep Neural Networks (DNNs), and recently, transformer networks have been more favored because of their outperformance over CNN and RNN networks for both vision and natural language processing tasks.

    pdf9p viambani 18-06-2024 5 1   Download

  • Part 1 book "Advances for in vehicle and mobile systems - Challenges for international standards" includes content: Experiments ondecision fusion for driver recognition; driver recognition system using FNN and statistical methods; driver identification based on spectral analysis ofdrivingbehavioral signals; anartificial vision based environment perception system; variable time scale multimedia streaming over 802.11 inter vehicle ad hoc networks; a configurable distributed speech recognition system; embedded mobile phone digit recognition,... and other contents.

    pdf134p dianmotminh03 11-06-2024 2 1   Download

  • Ebook Proceedings of the 4th international conference on computer engineering and networks is organized as follows: Part I: Algorithm design, part II: Data processing, part III: Pattern recognition, part IV: Cloud computing, part V: Embedded systems, part VI: Network optimization.

    pdf1252p zizaybay1103 29-05-2024 2 2   Download

  • Part 2 book "Automotive embedded systems handbook" includes content: Product lines in automotive electronics, reuse of software in automotive electronics, automotive architecture description languages, model based development of automotive embedded systems; testing automotive control software; testing and monitoring of flexray based applications; timing analysis of can based automotive communication systems; scheduling messages with offsets on controller area network - A major performance boost; formal methods in the automotive domain - The case of TTA.

    pdf289p dianmotminh01 20-05-2024 6 2   Download

  • Part 1 book "Automotive embedded systems handbook" includes content: Vehicle functional domains and their requirements; application of the AUTOSAR standard; intelligent vehicle technologies; a review of embedded automotive protocols, flexray protocol, dependable automotive CAN networks.

    pdf201p dianmotminh01 20-05-2024 2 0   Download

  • This paper introduces a novel framework, July, which serves the dual purpose of detecting vulnerable commits and localizing the root causes of the vulnerabilities. The fundamental concept of July is that the determinant of the vulnerability of a commit is the inherent meaning embedded in its changed code. For just-in-time vulnerability detection (JIT-VD), July represents each commit by a Code Transformation Graph and employs a Graph Neural Network model to capture their meanings and distinguish between vulnerable and non-vulnerable commits.

    pdf23p dianmotminh02 03-05-2024 3 1   Download

  • It is increasingly recognized that some patients self-manage in the context of social networks rather than alone. Consumer health information technology (IT) designed to support socially embedded self-management must be responsive to patients’ everyday communication practices.

    pdf17p visteverogers 24-06-2023 4 2   Download

  • Investigating the molecular mechanisms of symptoms is a vital task in precision medicine to refine disease taxonomy and improve the personalized management of chronic diseases. Although there are abundant experimental studies and computational efforts to obtain the candidate genes of diseases, the identification of symptom genes is rarely addressed.

    pdf8p visteverogers 24-06-2023 9 2   Download

  • Ebook Creating web-based training: A step-by-step guide to designing effective e-learning – Part 2 presents the following content: Chapter 10 interactivity and usability, chapter 11 supplementary protocols, chapter 12 types of WBT, chapter 13 embedded programming, chapter 14 forms, chapter 15 readable text, chapter 17 streaming sound, chapter 16 complementary technologies, chapter 18 streaming video, chapter 19 SMIL, chapter 20 advanced software, chapter 21 designing WBT, chapter 22 using XML, chapter 23 book WBT project, chapter 24 WBT projects, chapter 25 WBT Costs.

    pdf282p runthenight05 11-01-2023 8 3   Download

  • Speaker diarization is the method of dividing a conversation into segments spoken by the same speaker, usually referred to as “who spoke when”. This paper describes our experiment with speaker diarization system built upon DNNs embeddings.

    pdf3p vipriyankagandhi 27-07-2022 3 2   Download

  • Part 1 of the document "Speech and language processing: An introduction to natural language processing, computational linguistics, and speech recognition" provide with knowledge about: regular expressions, text normalization, edit distance; N-gram language models; naive bayes and sentiment classification; logistic regression; vector semantics and embeddings; neural networks and neural language models;...

    pdf287p britaikridanik 05-07-2022 17 6   Download

  • This book "CompTIA® Security+: Guide to Network Security Fundamentals" is designed to meet the needs of students and professionals who want to master basic information security. Part 1 of book provide students with knowledge about: introduction to security; threat management and cyber security resources; threats and attacks on endpoints; endpoint and application development security; mobile, embedded, and specialized device security; basic cryptography; public key infrastructure and cryptographic protocols;...

    pdf244p britaikridanik 05-07-2022 36 9   Download

  • "CompTIA® Security+: Security+ Guide to Network Security Fundamentals (Sixth edition)" is designed to equip learners with the knowledge and skills needed to be information security professionals. Part 2 of book provide students with knowledge about: client and application security; mobile and embedded device security; authentication and account management; access management; vulnerability assessment and data security; business continuity; risk mitigation;...

    pdf388p britaikridanik 05-07-2022 23 6   Download

  • Advanced Computer Networks: Lecture 44. This lecture will cover the following: overlay networks; overlay network layered on top of a physical network; overlay nodes tunnel through physical nodes; multicast tree embedded in an overlay mesh; triangular inequality in networks;...

    ppt14p haoasakura 30-05-2022 20 4   Download

  • Graph neural networks (GNNs) have achieved superior performance and gained significant interest in various domains. However, most of the existing GNNs are considered for homogeneous graphs, whereas real-world systems are usually modeled as heterogeneous graphs or heterogeneous information networks (HINs).

    pdf26p guernsey 28-12-2021 4 0   Download

  • The pretrained BERT multilingual model is used to generate embedding vectors from the input text. These vectors are combined with TF-IDF values to produce the input of the text summarization system. Redundant sentences from the output summary are eliminated by the Maximal Marginal Relevance method. Our system is evaluated with both English and Vietnamese languages using CNN and Baomoi datasets, respectively. Experimental results show that our system achieves better results compared to existing works using the same dataset.

    pdf21p spiritedaway36 25-11-2021 7 1   Download

  • In this study, we clarify fundamental features of the framework and clear out the relations between them. Then based primarily on the power allocation factors, we examine interference between cognitive sensors and primary sensors even as enhancing throughput of the network. Eventually, Matlab/Simulink based simulation is conducted to verify the analysis.

    pdf7p visteveballmer 06-11-2021 21 1   Download

  • Internet of Things (IoT) applications are increasingly making impact in all areas of human life. Day by day, its chatty embedded devices have been generating tons of data requiring effective network infrastructure. To deliver millions of IoT messages back and forth with as few faults as possible, participation of communication protocols like Message Queuing Telemetry Transport (i.e., MQTT) is a must. Lightweight blueprint and battery friendly design are just two of many advantages of this protocol making it become a dominant in IoT world.

    pdf14p nguaconbaynhay11 07-04-2021 9 2   Download

  • This study can also prevent distortion drift. The experimental results show that the proposed algorithm can approximately recover to the original video. By comparing with the other studies, the proposed study further improves the embedding capacity, and can recover to the original video. A disadvantage of the algorithm is that it cannot correct the error bits for network attacks. So, in the future, we will use BCH code technique for robustness of data hiding with the proposed algorithm

    pdf7p chauchaungayxua11 23-03-2021 11 2   Download

  • Biofilm is a large collection of colonies containing sessile bacteria which are adhered onto the surface and embedded in the self produced biopolymers such as Extracellular Polymeric Substances (EPS). The surface may be present either in soil or aquatic system as well as in any medical devices or living tissue. These polymeric substances form a cohesive network that interconnects and immobilizes the biofilm cells helping them in mechanical stability.

    pdf18p trinhthamhodang9 16-12-2020 10 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1228 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2