Browsing Electronic Engineering and Computer Science by Title
Now showing items 2135-2154 of 3268
-
Open problems in causal structure learning: A case study of COVID-19 in the UK
(Elsevier, 2023-08)Causal machine learning (ML) algorithms recover graphical structures that tell us something about cause-and-effect relationships. The causal representation provided by these algorithms enables transparency and explainability, ... -
Open System Categorical Quantum Semantics in Natural Language Processing
Originally inspired by categorical quantum mechanics (Abramsky and Coecke, LiCS'04), the categorical compositional distributional model of natural language meaning of Coecke, Sadrzadeh and Clark provides a conceptually ... -
An Operating System Session Plan Towards Social Justice and Intercultural Development in Microteaching for Higher Education
(IGI Global, 2022-09-01)Microteaching has been successful in developing teaching practices of both novice and more experienced educators and in enhancing student learning. At Queen Mary University of London, they have a highly diverse body of ... -
Opinion-aware retrieval models based on sentiment and intensity of lexical features
(2021-10-29)Sentiment analysis has received much attention in Information Retrieval (IR) and other domains including data mining, machine learning algorithms and NLP. However, when it comes to big data, incorporating sentiment of words ... -
Opinions are Made to be Changed: Temporally Adaptive Stance Classification
(2021-10-19)Given the rapidly evolving nature of social media and people's views, word usage changes over time. Consequently, the performance of a classifier trained on old textual data can drop dramatically when tested on newer data. ... -
Opportunistic Access Point Selection for Mobile Edge Computing Networks
(IEEE, 2021-01)In this paper, we investigate a mobile edge computing (MEC) network with two computational access points (CAPs), where the source is equipped with multiple antennas and it has some computational tasks to be accomplished ... -
The Opportunity Prior: A Simple and Practical Solution to the Prior Probability Problem for Legal Cases
(2017-06-12)One of the greatest impediments to the use of probabilistic reasoning in legal arguments is the difficulty in agreeing on an appropriate prior probability for the ultimate hypothesis, (in criminal cases this is normally ... -
Optical flow analysis reveals that Kinesin-mediated advection impacts on the orientation of microtubules in the Drosophila oocyte.
(American Society for Cell Biology, 2020-04-08)The orientation of microtubule networks is exploited by motors to deliver cargoes to specific intracellular destinations, and is thus essential for cell polarity and function. Reconstituted in vitro systems have largely ... -
Optical Music Recognition: State of the Art and Major Challenges
(2020-05-12)Optical Music Recognition (OMR) is concerned with transcribing sheet music into a machine-readable format. The transcribed copy should allow musicians to compose, play and edit music by taking a picture of a music sheet. ... -
Optimal Fairness-Aware Time and Power Allocation in Wireless Powered Communication Networks
(Institute of Electrical and Electronics Engineers, 2018-02-19)In this paper, we consider the sum α-fair utility maximization problem for joint downlink (DL) and uplink (UL) transmissions of a wireless powered communication network via time and power allocation. In the DL, the users ... -
Optimal Observer Synthesis for Microgrids With Adaptive Send-on-Delta Sampling Over IoT Communication Networks
(IEEE, 2020-01-01)State estimation is one of the main challenges in the microgrids, due to the complexity of the system dynamics and the limitations of the communication network. In this regard, a novel real-time event-based optimal state ... -
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool
(Association for Computing Machinery, 2022-04-28)CySecTool is a tool that finds a cost-optimal security controls portfolio in a given budget for a probabilistic attack graph. A portfolio is a set of counter-measures, or controls, against vulnerabilities adopted for a ...