Zobrazeno 1 - 10
of 150
pro vyhledávání: '"Vili Podgorelec"'
Autor:
Mirka Saarela, Vili Podgorelec
Publikováno v:
Applied Sciences, Vol 14, Iss 19, p 8884 (2024)
This systematic literature review employs the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to investigate recent applications of explainable AI (XAI) over the past three years. From an initial pool of 664 ar
Externí odkaz:
https://doaj.org/article/e33862bf216e4712b2282137fc4c83ed
Publikováno v:
Mathematics, Vol 12, Iss 17, p 2717 (2024)
Microbiota analysis can provide valuable insights in various fields, including diet and nutrition, understanding health and disease, and in environmental contexts, such as understanding the role of microorganisms in different ecosystems. Based on the
Externí odkaz:
https://doaj.org/article/c604974a826a4cfbbbc452fc33ca19e5
Autor:
Grega Vrbancic, Vili Podgorelec
Publikováno v:
IEEE Access, Vol 8, Pp 196197-196211 (2020)
With the utilization of deep learning approaches, the key factors for a successful application are sufficient datasets with reliable ground truth, which are generally not easy to obtain, especially in the field of medicine. In recent years, this issu
Externí odkaz:
https://doaj.org/article/6447b103e71a444c82f0c7fe77de109e
Publikováno v:
Elektronika ir Elektrotechnika, Vol 25, Iss 3, Pp 71-76 (2019)
The analysis of non-stationary signals commonly includes the signal segmentation process, dividing such signals into smaller time series, which are considered stationary and thus easier to process. Most commonly, the methods for signal segmentation u
Externí odkaz:
https://doaj.org/article/bc4c08432a584125bfb9a366c7240c5b
Autor:
Jernej Flisar, Vili Podgorelec
Publikováno v:
IEEE Access, Vol 7, Pp 106475-106494 (2019)
Self-admitted technical debt (SATD) is annotated in source code comments by developers and has been recognized as a great source of discovering flawed software. To reduce manual effort, some recent studies have focused on automated detection of SATD
Externí odkaz:
https://doaj.org/article/a82d78b33c0045a9ae4caae75381c3e0
Publikováno v:
Data in Brief, Vol 33, Iss , Pp 106438- (2020)
Phishing stands for a fraudulent process, where an attacker tries to obtain sensitive information from the victim. Usually, these kinds of attacks are done via emails, text messages, or websites. Phishing websites, which are nowadays in a considerabl
Externí odkaz:
https://doaj.org/article/115c387b6b704d95bfb9978e86d00fdb
Autor:
Grega Vrbancic, Vili Podgorelec
Publikováno v:
Elektronika ir Elektrotechnika, Vol 24, Iss 4, Pp 3-7 (2018)
The analysis of biomedical signals, such as the EEGs for measuring brain activity, provides means for the diagnosis of various cognitive tasks and neural disorders. These signals are frequently transformed into visual representations such as spectrog
Externí odkaz:
https://doaj.org/article/91e016bce176442a8f0cf912fc5882d2
Publikováno v:
Applied Sciences, Vol 10, Iss 23, p 8494 (2020)
With the exponential growth of the presence of sport in the media, the need for effective classification of sports images has become crucial. The traditional approaches require carefully hand-crafted features, which make them impractical for massive-
Externí odkaz:
https://doaj.org/article/8dee104df5494e79a69defcd6d1391d0
Publikováno v:
Applied Sciences, Vol 8, Iss 10, p 1902 (2018)
Different challenges arise while detecting deficient software source code. Usually a large number of potentially problematic entities are identified when an individual software metric or individual quality aspect is used for the identification of def
Externí odkaz:
https://doaj.org/article/bd8de03e5e2545b58d58817df86ed3d0
Publikováno v:
Applied Sciences, Vol 8, Iss 9, p 1521 (2018)
The increasingly rapid creation, sharing and exchange of information nowadays put researchers and data scientists ahead of a challenging task of data analysis and extracting relevant information out of data. To be able to learn from data, the dimensi
Externí odkaz:
https://doaj.org/article/ec096c95fd7443e58d7c1cb5e62f18a6