Embedding Data in Non-Important Gabor Ridges
How to cite (IJASEIT) :
C. Chen et al., “Review helpfulness prediction with embedding-gated cnn,” arXiv Prepr. arXiv1808.09896, 2018.
F.-T. Hong, W.-H. Li, and W.-S. Zheng, “Learning to detect important people in unlabelled images for semi-supervised important people detection,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020, pp. 4146-4154.
M. Wang, J. Zhang, S. Jiao, X. Zhang, N. Zhu, and G. Chen, “Important citation identification by exploiting the syntactic and contextual information of citations,” Scientometrics, vol. 125, no. 3, pp. 2109-2129, 2020.
Z. Yang, C. Zhu, and W. Chen, “Parameter-free sentence embedding via orthogonal basis,” arXiv Prepr. arXiv1810.00438, 2018.
C. M. Childs and N. R. Washburn, “Embedding domain knowledge for machine learning of complex material systems,” MRS Commun., vol. 9, no. 3, pp. 806-820, 2019.
N. Van Tu, J.-H. Yoo, and J. W.-K. Hong, “PPTMon: Real-Time and Fine-Grained Packet Processing Time Monitoring in Virtual Network Functions,” IEEE Trans. Netw. Serv. Manag., vol. 18, no. 4, pp. 4324-4336, 2021.
R. Hidayat, F. N. Jaafar, I. M. Yassin, A. Zabidi, F. H. K. Zaman, and Z. I. Rizman, “Face detection using Min-Max features enhanced with Locally Linear Embedding,” TEM J., vol. 7, no. 3, p. 678, 2018.
M. S. Shim, H. Hu, and P. Li, “Reversible Gating Architecture for Rare Failure Detection of Analog and Mixed-Signal Circuits,” in 2021 58th ACM/IEEE Design Automation Conference (DAC), 2021, pp. 901-906.
N. R. Aljohani, A. Fayoumi, and S.-U. Hassan, “A novel focal-loss and class-weight-aware convolutional neural network for the classification of in-text citations,” J. Inf. Sci., p. 0165551521991022, 2021.
S. Thakur, A. K. Singh, and S. P. Ghrera, “Encryption Based DWT-SVD Medical Image Watermarking Technique Using Hamming Code,” in Proceedings of ICETIT 2019, Springer, 2020, pp. 1091-1099.
J. Im and S. Cho, “Distance-based self-attention network for natural language inference,” arXiv Prepr. arXiv1712.02047, 2017.
H. K. Sharaf, M. R. Ishak, S. M. Sapuan, N. Yidris, and A. Fattahi, “Experimental and numerical investigation of the mechanical behavior of full-scale wooden cross arm in the transmission towers in terms of load-deflection test,” J. Mater. Res. Technol., vol. 9, no. 4, pp. 7937-7946, 2020.
H. K. Sharaf, S. Salman, M. H. Dindarloo, V. I. Kondrashchenko, A. A. Davidyants, and S. V Kuznetsov, “The effects of the viscosity and density on the natural frequency of the cylindrical nanoshells conveying viscous fluid,” Eur. Phys. J. Plus, vol. 136, no. 1, pp. 1-19, 2021.
S. H. Raheemah, K. I. Fadheel, Q. H. Hassan, A. M. Aned, A. A. T. Al-Taie, and H. Kadhim, “Numerical Analysis of the Crack Inspections Using Hybrid Approach for the Application the Circular Cantilever Rods,” Pertanika J. Sci. Technol., vol. 29, no. 2, 2021.
N. S. Tawfik and M. R. Spruit, “Evaluating sentence representations for biomedical text: Methods and experimental results,” J. Biomed. Inform., vol. 104, p. 103396, 2020.
D. S. Kumar and V. M. Rao, “Simultaneous feature selection and classification using fuzzy rules,” in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018, pp. 125-130.
S. Abujar, A. K. M. Masum, M. Mohibullah, Ohidujjaman, and S. A. Hossain, “An Approach for Bengali Text Summarization using Word2Vector,” in 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Jul. 2019, pp. 1-5, doi: 10.1109/ICCCNT45670.2019.8944536.
A. A. Ismail, M. Gunady, H. Corrada Bravo, and S. Feizi, “Benchmarking deep learning interpretability in time series predictions,” Adv. Neural Inf. Process. Syst., vol. 33, pp. 6441-6452, 2020.
M. T. Gení§oÄŸlu and S. B. Hasan, “Combining of Cryptography and Steganography for Improving of Security.”
A. A. Ismail, M. Gunady, L. Pessoa, H. Corrada Bravo, and S. Feizi, “Input-cell attention reduces vanishing saliency of recurrent neural networks,” Adv. Neural Inf. Process. Syst., vol. 32, 2019.
R. Bakthula, S. Shivani, and S. Agarwal, “Self authenticating medical X-ray images for telemedicine applications,” Multimed. Tools Appl., vol. 77, no. 7, pp. 8375-8392, 2018.
H. Zhu and T. Huang, “A novel deep quality-aware CNN for image edge smoothening,” Futur. Gener. Comput. Syst., vol. 113, pp. 468-473, 2020.
B. B. Hazarika, D. Gupta, and P. Borah, “An intuitionistic fuzzy kernel ridge regression classifier for binary classification,” Appl. Soft Comput., vol. 112, p. 107816, 2021.
W.-H. Li, F.-T. Hong, and W.-S. Zheng, “Learning to learn relation for important people detection in still images,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 5003-5011.
D. V Zubarev and I. V Sochenkov, “Cross-language text alignment for plagiarism detection based on contextual and context-free models,” in Proc. of the Annual International Conference “Dialogue, 2019, vol. 1, pp. 799-810.
F. Yang, Y. Zhao, and R. Cui, “Recognition Method of Important Words in Korean Text Based on Reinforcement Learning,” in China National Conference on Chinese Computational Linguistics, 2020, pp. 261-272.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).