Word beam search: A connectionist temporal classification decoding algorithm

H Scheidl, S Fiel, R Sablatnig - 2018 16th International …, 2018 - ieeexplore.ieee.org
Recurrent Neural Networks (RNNs) are used for sequence recognition tasks such as
Handwritten Text Recognition (HTR) or speech recognition. If trained with the Connectionist …

Comparison of orthogonality estimation methods for the two-dimensional separations of peptides

M Gilar, J Fridrich, MR Schure, A Jaworski - Analytical chemistry, 2012 - ACS Publications
In two-dimensional chromatography, the orthogonality of separation is important for
achieving high peak capacity. In this paper, a number of different metrics are compared as …

Accurate tracking, collision detection, and optimal scheduling of airport ground support equipment

S Wang, Y Che, H Zhao, A Lim - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
In order to lower the ramp risk and improve the aircraft ground handling efficiency, we aim to:
1) track ground support equipment (GSE) in a real-time and high-accuracy manner so that …

NMR-TS: de novo molecule identification from NMR spectra

J Zhang, K Terayama, M Sumita… - … and technology of …, 2020 - Taylor & Francis
Nuclear magnetic resonance (NMR) spectroscopy is an effective tool for identifying
molecules in a sample. Although many previously observed NMR spectra are accumulated …

ezTag: tagging biomedical concepts via interactive learning

D Kwon, S Kim, CH Wei, R Leaman… - Nucleic acids research, 2018 - academic.oup.com
Recently, advanced text-mining techniques have been shown to speed up manual data
curation by providing human annotators with automated pre-annotations generated by rules …

[HTML][HTML] Quantum algorithms for some strings problems based on quantum string comparator

K Khadiev, A Ilikaev, J Vihrovs - Mathematics, 2022 - mdpi.com
We study algorithms for solving three problems on strings. These are sorting of n strings of
length k,“the Most Frequent String Search Problem”, and “searching intersection of two …

Opportunistic networks for emergency applications and their standard implementation framework

L Lilien, A Gupta, Z Yang - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
We present a novel paradigm of opportunistic networks or oppnets in the context of
emergency preparedness and response (EPR). Oppnets constitute the category of ad hoc …

EIGER: automated IOC generation for accurate and interpretable endpoint malware detection

Y Kurogome, Y Otsuki, Y Kawakoya… - Proceedings of the 35th …, 2019 - dl.acm.org
A malware signature including behavioral artifacts, namely Indicator of Compromise (IOC)
plays an important role in security operations, such as endpoint detection and incident …

[PDF][PDF] 区块链系统中的分布式数据管理技术——挑战与展望

于戈, 聂铁铮, **晓华, 张岩峰, 申德荣, 鲍玉斌 - 计算机学报, 2021 - 159.226.43.17
(东北大学计算机科学与工程学院, 沈阳110169) 摘要区块链是在数字加密货币的应用基础之上
发展起来的一种分布式数据库技术. 区块链系统具有去中心化, 不可篡改, 分布共识 …

Lock-free augmented trees

P Fatourou, E Ruppert - arxiv preprint arxiv:2405.10506, 2024 - arxiv.org
Augmenting an existing sequential data structure with extra information to support greater
functionality is a widely used technique. For example, search trees are augmented to build …