„graph-based methods“
Suchergebnisse
456 Treffer
-
Photocatalytic disinfection efficiency of 2D structure graphitic carbon nitride-based nanocomposites: a review
-
Analyzing interactions in donation-based live streaming platforms: a multi-leader-follower game approach
-
One-way ticket to the moon? An NLP-based insight on the phenomenon of small-scale neo-broker trading
-
A survey of sentiment analysis methods based on graph neural network
-
A novel controllable molecularly imprinted drug delivery system based on the photothermal effect of graphene oxide quantum dots
-
A community-based entropic method to identify influential nodes across multiple social networks
-
A model for web services reputation based on social networks data with application to X
-
UpMax: User Partitioning for MaxSAT
-
A survey on the recent random walk-based methods for embedding graphs
-
Graphene-based SERS-active substrates for environmental detection: nanoarchitectonics and applications
-
Eulertigs: Minimum Plain Text Representation of k-mer Sets Without Repetitions in Linear Time
-
Sentiment classification for review rating prediction based on hybrid reaction diffusion support vector neural network
-
PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs
-
Polypyrrol/iron-manganese oxide/graphene oxide composites as electrode materials for supercapacitors based on core–shell layered structure
-
Lgma-net: liver and tumor segmentation methods based on local–global feature mergence and attention mechanisms
-
Gesture recognition based on Gramian angular difference field and multi-stream fusion methods
-
Gode: graph Fourier transform based outlier detection using empirical Bayesian thresholding
-
Inertial measurement unit signal-based machine learning methods for frailty assessment in geriatric health
-
Graph-theoretical methods in systems theory and control – modelling, analysis and design methods based on directed graphs, bipartite graphs, and random graphs
-
Pattern-based methods for vulnerability discovery