Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Classification (7)
- Machine Learning (7)
- Deep Learning (4)
- Deep learning (4)
- Twitter (4)
-
- LSTM (3)
- Logistic regression (3)
- Natural Language Processing (3)
- Security (3)
- Support Vector Machine (3)
- Accuracy (2)
- Astronomy (2)
- Authentication (2)
- BERT (2)
- CNN (2)
- Cnn (2)
- Computer Vision (2)
- Cosine similarity (2)
- Cryptography (2)
- Data Augmentation (2)
- Data encryption (2)
- Deep Belief Networks (2)
- Deterministic chaos (2)
- Internet of Things (2)
- Multi-algorithmicity (2)
- Natural language processing (2)
- Photometric Classification (2)
- SMOTE (2)
- Sampling (2)
- Sentiment analysis (2)
- Publication Year
- Publication
- Publication Type
Articles 61 - 63 of 63
Full-Text Articles in Computer Engineering
Archetype Alignment: A Two-Level Driven Semantic Matching Approach To Interoperability In The Clinical Domain, Damon Berry, Jesus Bisbal
Archetype Alignment: A Two-Level Driven Semantic Matching Approach To Interoperability In The Clinical Domain, Damon Berry, Jesus Bisbal
Conference Papers
Semantic interoperability between electronic health record systems and other information systems in the health domain implies agreement about the structure and the meaning of the information that is communicated. There are still a number of similar but different EHR system approaches. Some of the newer approaches adopt the two-layer model approach where a generic reference model is constrained by archetypes into valid clinical concepts which can be exchanged. The meaning of the concepts that are represented by an archetype can be conveyed by embedding codes from a commonly recognised terminology at appropriate points in the archetype. However, as the number …
A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy
A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy
Articles
A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.
In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …
Evaluation Of Robocode As A Teaching Tool For Computer Programming, Arnold Hensman
Evaluation Of Robocode As A Teaching Tool For Computer Programming, Arnold Hensman
Conference Papers
Robocode began as an educational tool to aid in learning Java programming. It has since evolved into something of a phenomenon, as the prospect of creating simple to complex virtual tanks appears to pose an attractive challenge to both novice and expert programmers alike. What started out as a teaching tool has grown into a worldwide network of competitors, all keen to prove that their ‘bot’ stands out from the crowd. Competitions are well organised and many Robocode events are a PR dream for the computing companies that sponsor them. Without a doubt, this easy to use application has sparked …