GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2024
    In:  IEEE Access Vol. 12 ( 2024), p. 34489-34504
    In: IEEE Access, Institute of Electrical and Electronics Engineers (IEEE), Vol. 12 ( 2024), p. 34489-34504
    Type of Medium: Online Resource
    ISSN: 2169-3536
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2024
    detail.hit.zdb_id: 2687964-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Academy and Industry Research Collaboration Center (AIRCC) ; 2018
    In:  International Journal of Data Mining & Knowledge Management Process Vol. 8, No. 2 ( 2018-03-30), p. 19-36
    In: International Journal of Data Mining & Knowledge Management Process, Academy and Industry Research Collaboration Center (AIRCC), Vol. 8, No. 2 ( 2018-03-30), p. 19-36
    Type of Medium: Online Resource
    ISSN: 2231-007X , 2230-9608
    URL: Issue
    Language: Unknown
    Publisher: Academy and Industry Research Collaboration Center (AIRCC)
    Publication Date: 2018
    detail.hit.zdb_id: 2717491-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    MDPI AG ; 2020
    In:  IoT Vol. 1, No. 2 ( 2020-10-10), p. 218-239
    In: IoT, MDPI AG, Vol. 1, No. 2 ( 2020-10-10), p. 218-239
    Abstract: In the derived approach, an analysis is performed on Twitter data for World Cup soccer 2014 held in Brazil to detect the sentiment of the people throughout the world using machine learning techniques. By filtering and analyzing the data using natural language processing techniques, sentiment polarity was calculated based on the emotion words detected in the user tweets. The dataset is normalized to be used by machine learning algorithms and prepared using natural language processing techniques like word tokenization, stemming and lemmatization, part-of-speech (POS) tagger, name entity recognition (NER), and parser to extract emotions for the textual data from each tweet. This approach is implemented using Python programming language and Natural Language Toolkit (NLTK). A derived algorithm extracts emotional words using WordNet with its POS (part-of-speech) for the word in a sentence that has a meaning in the current context, and is assigned sentiment polarity using the SentiWordNet dictionary or using a lexicon-based method. The resultant polarity assigned is further analyzed using naïve Bayes, support vector machine (SVM), K-nearest neighbor (KNN), and random forest machine learning algorithms and visualized on the Weka platform. Naïve Bayes gives the best accuracy of 88.17% whereas random forest gives the best area under the receiver operating characteristics curve (AUC) of 0.97.
    Type of Medium: Online Resource
    ISSN: 2624-831X
    Language: English
    Publisher: MDPI AG
    Publication Date: 2020
    detail.hit.zdb_id: 3024999-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    MDPI AG ; 2023
    In:  Algorithms Vol. 16, No. 9 ( 2023-08-23), p. 399-
    In: Algorithms, MDPI AG, Vol. 16, No. 9 ( 2023-08-23), p. 399-
    Abstract: Currently, video and digital images possess extensive utility, ranging from recreational and social media purposes to verification, military operations, legal proceedings, and penalization. The enhancement mechanisms of this medium have undergone significant advancements, rendering them more accessible and widely available to a larger population. Consequently, this has facilitated the ease with which counterfeiters can manipulate images. Convolutional neural network (CNN)-based feature extraction and detection techniques were used to carry out this task, which aims to identify the variations in image features between modified and non-manipulated areas. However, the effectiveness of the existing detection methods could be more efficient. The contributions of this paper include the introduction of a segmentation method to identify the forgery region in images with the U-Net model’s improved structure. The suggested model connects the encoder and decoder pipeline by improving the convolution module and increasing the set of weights in the U-Net contraction and expansion path. In addition, the parameters of the U-Net network are optimized by using the grasshopper optimization algorithm (GOA). Experiments were carried out on the publicly accessible image tempering detection evaluation dataset from the Chinese Academy of Sciences Institute of Automation (CASIA) to assess the efficacy of the suggested strategy. The results show that the U-Net modifications significantly improve the overall segmentation results compared to other models. The effectiveness of this method was evaluated on CASIA, and the quantitative results obtained based on accuracy, precision, recall, and the F1 score demonstrate the superiority of the U-Net modifications over other models.
    Type of Medium: Online Resource
    ISSN: 1999-4893
    Language: English
    Publisher: MDPI AG
    Publication Date: 2023
    detail.hit.zdb_id: 2455149-1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    MDPI AG ; 2022
    In:  Algorithms Vol. 15, No. 8 ( 2022-08-17), p. 291-
    In: Algorithms, MDPI AG, Vol. 15, No. 8 ( 2022-08-17), p. 291-
    Abstract: Explainable artificial intelligence (XAI) characteristics have flexible and multifaceted potential in hate speech detection by deep learning models. Interpreting and explaining decisions made by complex artificial intelligence (AI) models to understand the decision-making process of these model were the aims of this research. As a part of this research study, two datasets were taken to demonstrate hate speech detection using XAI. Data preprocessing was performed to clean data of any inconsistencies, clean the text of the tweets, tokenize and lemmatize the text, etc. Categorical variables were also simplified in order to generate a clean dataset for training purposes. Exploratory data analysis was performed on the datasets to uncover various patterns and insights. Various pre-existing models were applied to the Google Jigsaw dataset such as decision trees, k-nearest neighbors, multinomial naïve Bayes, random forest, logistic regression, and long short-term memory (LSTM), among which LSTM achieved an accuracy of 97.6%. Explainable methods such as LIME (local interpretable model—agnostic explanations) were applied to the HateXplain dataset. Variants of BERT (bidirectional encoder representations from transformers) model such as BERT + ANN (artificial neural network) with an accuracy of 93.55% and BERT + MLP (multilayer perceptron) with an accuracy of 93.67% were created to achieve a good performance in terms of explainability using the ERASER (evaluating rationales and simple English reasoning) benchmark.
    Type of Medium: Online Resource
    ISSN: 1999-4893
    Language: English
    Publisher: MDPI AG
    Publication Date: 2022
    detail.hit.zdb_id: 2455149-1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Frontiers Media SA ; 2020
    In:  Frontiers in Artificial Intelligence Vol. 3 ( 2020-10-5)
    In: Frontiers in Artificial Intelligence, Frontiers Media SA, Vol. 3 ( 2020-10-5)
    Type of Medium: Online Resource
    ISSN: 2624-8212
    Language: Unknown
    Publisher: Frontiers Media SA
    Publication Date: 2020
    detail.hit.zdb_id: 2957496-1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    In: Symmetry, MDPI AG, Vol. 14, No. 5 ( 2022-05-10), p. 978-
    Abstract: Network Function Virtualization (NFV) is an enabling technology that brings together automated network service management and corresponding virtualized network functions that use an NFV Infrastructure (NFVI) framework. The Virtual Network Function Manager (VNFM) placement in a large-scale distributed NFV deployment is therefore a challenging task due to the potential negative impact on performance and operating expense cost. The VNFM assigns Virtual Network Functions (VNFs) and operates efficiently based on network demands with resilient performance through efficient placement techniques. The degradation in performance and a tremendous increase in capital expenditure and operating expenses indicated this chaotic problem. This article proposed a method for VNFM placement using information on the resources of each nodes’ Element Manager (EM), which is an efficient method to assign VNFs to each node of element management systems. In addition, this paper proposed an Optimized Element Manager (OEM) method for looking at appropriate EMs for the placement of VNF through periodic information on available resources. It also overcomes challenges such as delays and variations in VNFs workload for edge computing and distributed cloud regions. The performance is measured based on computations performed on various optimization algorithms such as linear programming and tabu search algorithms. The advent of the new service provisioning model of BGP-EVPN for VXLAN is materialized by integrating VTS with OpenStack. The numerical analysis shows that the proposed OEM algorithm gives an optimal solution with an average gap of 8%.
    Type of Medium: Online Resource
    ISSN: 2073-8994
    Language: English
    Publisher: MDPI AG
    Publication Date: 2022
    detail.hit.zdb_id: 2518382-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Elsevier BV ; 2007
    In:  Information Systems Vol. 32, No. 1 ( 2007-3), p. 131-159
    In: Information Systems, Elsevier BV, Vol. 32, No. 1 ( 2007-3), p. 131-159
    Type of Medium: Online Resource
    ISSN: 0306-4379
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2007
    detail.hit.zdb_id: 194994-9
    detail.hit.zdb_id: 2012447-8
    SSG: 24,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Crimson Publishers ; 2023
    In:  Significances of Bioengineering & Biosciences Vol. 6, No. 4 ( 2023-11-29)
    In: Significances of Bioengineering & Biosciences, Crimson Publishers, Vol. 6, No. 4 ( 2023-11-29)
    Type of Medium: Online Resource
    ISSN: 2637-8078
    URL: Issue
    Language: Unknown
    Publisher: Crimson Publishers
    Publication Date: 2023
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Elsevier BV ; 2008
    In:  Data & Knowledge Engineering Vol. 65, No. 2 ( 2008-5), p. 266-303
    In: Data & Knowledge Engineering, Elsevier BV, Vol. 65, No. 2 ( 2008-5), p. 266-303
    Type of Medium: Online Resource
    ISSN: 0169-023X
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2008
    detail.hit.zdb_id: 1466273-5
    detail.hit.zdb_id: 283758-4
    SSG: 24,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...