A review of deep learning with special emphasis on architectures, applications and recent trends
Deep learning (DL) has solved a problem that a few years ago was thought to be intractable—
the automatic recognition of patterns in spatial and temporal data with an accuracy superior …
the automatic recognition of patterns in spatial and temporal data with an accuracy superior …
Physical reservoir computing based on nanoscale materials and devices
Bioinspired computation systems can achieve artificial intelligence, bypassing fundamental
bottlenecks and cost constraints. Computational frameworks suited for temporal/sequential …
bottlenecks and cost constraints. Computational frameworks suited for temporal/sequential …
GTR-GA: Harnessing the power of graph-based neural networks and genetic algorithms for text augmentation
A Onan - Expert systems with applications, 2023 - Elsevier
Text augmentation is a popular technique in natural language processing (NLP) that has
been shown to improve the performance of various downstream tasks. The goal of text …
been shown to improve the performance of various downstream tasks. The goal of text …
Foundation and large language models: fundamentals, challenges, opportunities, and social impacts
D Myers, R Mohawesh, VI Chellaboina, AL Sathvik… - Cluster …, 2024 - Springer
Abstract Foundation and Large Language Models (FLLMs) are models that are trained using
a massive amount of data with the intent to perform a variety of downstream tasks. FLLMs …
a massive amount of data with the intent to perform a variety of downstream tasks. FLLMs …
Automated machine learning for healthcare and clinical notes analysis
A Mustafa, M Rahimi Azghadi - Computers, 2021 - mdpi.com
Machine learning (ML) has been slowly entering every aspect of our lives and its positive
impact has been astonishing. To accelerate embedding ML in more applications and …
impact has been astonishing. To accelerate embedding ML in more applications and …
GraphSPD: Graph-based security patch detection with enriched code semantics
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …
widely propagating to downstream software. Due to different maintenance policies, software …
Towards Smart Healthcare: Patient Data Privacy and Security in Sensor‐Cloud Infrastructure
Nowadays, wireless body area networks (WBANs) systems have adopted cloud computing
(CC) technology to overcome limitations such as power, storage, scalability, management …
(CC) technology to overcome limitations such as power, storage, scalability, management …
Dataset meta-level and statistical features affect machine learning performance
What dataset features affect machine learning (ML) performance has primarily been
unknown in the current literature. This study examines the impact of tabular datasets' …
unknown in the current literature. This study examines the impact of tabular datasets' …
Saving lives using social media: analysis of the role of twitter for personal blood donation requests and dissemination
Social media has an impact on many aspects of human life ranging from sharing personal
information to revolutionizing political systems of entire countries. One not so well studied …
information to revolutionizing political systems of entire countries. One not so well studied …
SubFlow: A dynamic induced-subgraph strategy toward real-time DNN inference and training
We introduce SubFlow-a dynamic adaptation and execution strategy for a deep neural
network (DNN), which enables real-time DNN inference and training. The goal of SubFlow is …
network (DNN), which enables real-time DNN inference and training. The goal of SubFlow is …