Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








6 Hits in 4.7 sec

PLS-CNN-BiLSTM: An End-to-End Algorithm-Based Savitzky–Golay Smoothing and Evolution Strategy for Load Forecasting

Mohamed Massaoudi, Shady S. Refaat, Haitham Abu-Rub, Ines Chihi, Fakhreddine S. Oueslati
2020 Energies  
The proposed model consists of a hybrid Convolutional neural network-Bidirectional Long Short-Term Memory (CBiLSTM) based on the Evolution Strategy (ES) method and the Savitzky–Golay (SG) filter (SG-CBiLSTM  ...  This paper proposes an effective deep learning framework for Short-Term Load Forecasting (STLF) of multivariate time series.  ...  The selection of the aforementioned scores is based on their popularity for regression-based techniques evaluation.  ... 
doi:10.3390/en13205464 fatcat:zlitrye5kfdvrgujzeucy6lxii

gBuilder: A Scalable Knowledge Graph Construction System for Unstructured Corpus [article]

Yanzeng Li, Lei Zou
2023 arXiv   pre-print
Different from existing KGC systems, gBuilder provides a flexible and user-defined pipeline to embrace the rapid development of IE models.  ...  More built-in template-based or heuristic operators and programmable operators are available for adapting to data from different domains.  ...  models and the theory of ontology merging and provide a series of built-in template-based, heuristic-based and programmable operators for adapting built-in models and data from different domains.  ... 
arXiv:2208.09705v3 fatcat:hll7d4i355gdxbrmtdqszjkway

NLP-Based Techniques for Cyber Threat Intelligence [article]

Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., Vinod P., Mauro Conti
2023 arXiv   pre-print
This survey draws a complete framework and serves as a valuable resource for security professionals and researchers seeking to understand the state-of-the-art NLP-based threat intelligence techniques and  ...  This survey paper provides a comprehensive overview of NLP-based techniques applied in the context of threat intelligence.  ...  The data-gathering process starts by creating an initial list of potential sites based on factors such as the number of listings, discussion threads, threat actors, and the number of listings related to  ... 
arXiv:2311.08807v1 fatcat:ycq3secwmvhllpe5oytrl5ue7e

ICCIT 2020 Conference Proceedings [Front matter]

2020 2020 23rd International Conference on Computer and Information Technology (ICCIT)  
Bhavani Thuraisingham is the Founders Chair Professor of Computer Science and the  ...  In our model, a multiple feature fusion technique is used which combines sequence based CKSAAP, physicochemical property based AAIndex and mutation based evolutionary information.  ...  Multilabel Emotion Detection from Bangla Text Using BiGRU and CNN-BiLSTM 78 The 23 rd International Conference on Computer and Information Technology, ICCIT 2020 December 19-21, 2020 Ahsanullah University  ... 
doi:10.1109/iccit51783.2020.9392749 fatcat:pz3hf7rsmzbjpe6hxjlu5tmrfq

A novel Auto-ML Framework for Sarcasm Detection

Sharjeel Imtiaz
2022
Similarly, the AutoML based BiLSTM-DNN model achieved the best performance of 0.98 F1, which is better than core approaches and existing state-of-the-art Tweeter tweet dataset, Amazon reviews, and dialog  ...  The purpose of this research is to classify sarcasm for multiple domains using the deep learning based AutoML framework.  ...  AutoML is categorized into generalized models and methods: evolutionary, tree-based, and deep learning-based.  ... 
doi:10.15123/uel.8q7y9 fatcat:7whsc4klfjenfcmvj4wcseyz6i

Human Activity Recognition Data Analysis: History, Evolutions, and New Trends

Paola Patricia Ariza-Colpas, Enrico Vicario, Ana Isabel Oviedo-Carrascal, Shariq Butt Aziz, Marlon Alberto Piñeres-Melo, Alejandra Quintero-Linero, Fulvio Patara
2022
As a result of this article, it can be identified that models based on reinforcement or transfer learning constitute a good line of work for the processing and analysis of human recognition activities.  ...  This article aims to show the review of the literature and the evolution of the different techniques for processing this type of data from supervised, unsupervised, ensembled learning, deep learning, reinforcement  ...  Furthermore, this research has been supported by the Spanish government by means of the projects RTI2018-098979-A-I00, PI-0387-2018 and CAS17/00292.  ... 
doi:10.3390/s22093401 pmid:35591091 pmcid:PMC9103712 fatcat:w4d56ecnezhvffxfyjpf4zmwaa