Machine Learning (ML) is increasingly used to drive the operation of com...
The Metaverse offers a second world beyond reality, where boundaries are...
In this paper, we propose Value Iteration Network for Reward Shaping
(VI...
Speech signals are subjected to more acoustic interference and emotional...
Most recent studies have shown several vulnerabilities to attacks with t...
Machine learning is becoming ubiquitous. From financial to medicine, mac...
Image spam threat detection has continually been a popular area of resea...
This survey presents a comprehensive review of current literature on
Exp...
Machine learning models have been widely adopted in several fields. Howe...
Detection of illegal and threatening items in baggage is one of the utmo...
Visible light communication (VLC) technology was introduced as a key ena...
Trace clustering has been extensively used to preprocess event logs. By
...
Process discovery methods have obtained remarkable achievements in Proce...
Deep learning applied to electrocardiogram (ECG) data can be used to ach...
This paper introduces a framework for how to appropriately adopt and adj...