Abstract: The K-nearest neighbors (kNNs) algorithm, a cornerstone of supervised learning, relies on similarity measures constrained by real-number-based distance metrics. A critical limitation of ...
Article subjects are automatically applied from the ACS Subject Taxonomy and describe the scientific concepts and themes of the article. The discovery of functional small molecules, chemical matter ...
1 School of Computer Science and Technology, Yibin University, Yibin, China 2 School of Computer and Software, Southwest Petroleum University, Chengdu, China Ever since Density Peak Clustering (DPC) ...
ABSTRACT: The objective of this work is to determine the true owner of a land—public or private—in the region of Kumasi (Ghana). For this purpose, we applied different machine learning methods to the ...
Embedding-based search outperforms traditional keyword-based methods across various domains by capturing semantic similarity using dense vector representations and approximate nearest neighbor (ANN) ...
Introduction: The health status of bearings is an essential prerequisite to ensure the safe and stable operation of vehicles. However, the negative impact of covariate shifts among data channels on ...
ABSTRACT: To ensure the efficient operation and timely maintenance of wind turbines, thereby enhancing energy security, it is critical to monitor the operational status of wind turbines and promptly ...
A sophisticated cyber-espionage attack used by notorious Russian advanced persistent threat (APT) Fancy Bear at the outset of the current Russia-Ukraine war demonstrates a novel attack vector that a ...
Russian state hackers APT28 (Fancy Bear/Forest Blizzard/Sofacy) breached a U.S. company through its enterprise WiFi network while being thousands of miles away, by leveraging a novel technique called ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results