標題: Titlebook: Computational Intelligence in Data Science; Third IFIP TC 12 Int Aravindan Chandrabose,Ulrich Furbach,Anand Kumar M Conference proceedings [打印本頁] 作者: 欺侮 時間: 2025-3-21 16:47
書目名稱Computational Intelligence in Data Science影響因子(影響力)
書目名稱Computational Intelligence in Data Science影響因子(影響力)學科排名
書目名稱Computational Intelligence in Data Science網(wǎng)絡(luò)公開度
書目名稱Computational Intelligence in Data Science網(wǎng)絡(luò)公開度學科排名
書目名稱Computational Intelligence in Data Science被引頻次
書目名稱Computational Intelligence in Data Science被引頻次學科排名
書目名稱Computational Intelligence in Data Science年度引用
書目名稱Computational Intelligence in Data Science年度引用學科排名
書目名稱Computational Intelligence in Data Science讀者反饋
書目名稱Computational Intelligence in Data Science讀者反饋學科排名
作者: 證明無罪 時間: 2025-3-21 20:56 作者: FLOAT 時間: 2025-3-22 01:22
Tamil Paraphrase Detection Using Encoder-Decoder Neural Networksguages differ from the other languages like English, the usage of lexico-syntactic features vary between the Indian languages and plays a critical role in determining the performance of the system. Instead of using various lexico-syntactic similarity features, we aim to apply a complete end-to-end s作者: Grievance 時間: 2025-3-22 06:46 作者: 珠寶 時間: 2025-3-22 12:27
Sensitive Keyword Extraction Based on Cyber Keywords and LDA in Twitter to Avoid Regretsline repository. The data presented by users on social networking sites are usually composed of sensitive or private data that is highly potential for cyber threats. The most frequently presented sensitive private data is analyzed by collecting real-time tweets based on benchmarked cyber-keywords un作者: subordinate 時間: 2025-3-22 14:08 作者: subordinate 時間: 2025-3-22 19:52 作者: Free-Radical 時間: 2025-3-22 22:54
A Thesaurus Based Semantic Relation Extraction for Agricultural Corporaguage Processing (NLP) applications such as Question Answering (QA) and Information Retrieval (IR) system. Automatic semantic relation extraction from text increases the efficiency of these systems by aiding in retrieving more accurate information to the user query. In this research work, we have pr作者: MARS 時間: 2025-3-23 04:52
Bat Algorithm with CNN Parameter Tuning for Lung Nodule False Positive Reduction Detecting it in the earlier stage is the only solution to reduce lung cancer deaths. The most common tests to look for cancerous cells include X-ray, CT scan, Sputum cytology and biopsy test. CT scan is recognized as one of the effective tools in recognizing it in the earlier stage. Detecting the l作者: 事情 時間: 2025-3-23 09:28 作者: sed-rate 時間: 2025-3-23 13:11 作者: Intellectual 時間: 2025-3-23 17:42 作者: 認為 時間: 2025-3-23 21:53 作者: 左右連貫 時間: 2025-3-24 00:56 作者: Classify 時間: 2025-3-24 03:54 作者: figment 時間: 2025-3-24 08:30
Effective Emotion Recognition from Partially Occluded Facial Images Using Deep Learningal muscles irrespective of pose, face shape, illumination, and image resolution is very much essential for serving the purpose. However, extraction and analysis of facial and appearance based features fails with improper face alignment and occlusions. Few existing works on these problems mainly dete作者: obligation 時間: 2025-3-24 12:04
Emotion Recognition in Sentences - A Recurrent Neural Network Approachmentioned data set and an accuracy of 91.6% for the prediction of degree of emotion for a sentence. Additionally, every sentence is associated with a degree of the dominant emotion. One can infer that a degree of emotion means the extent of the emphasis of an emotion. Although, more than one sentenc作者: 駕駛 時間: 2025-3-24 16:24
Tamil Paraphrase Detection Using Encoder-Decoder Neural Networkst systems. The system was trained and evaluated on DPIL@FIRE2016 Shared Task dataset. To our knowledge, ours is the first deep learning model which validates the training instances of both the subtask-1 and subtask-2 dataset of DPIL shared task.作者: 剝皮 時間: 2025-3-24 19:49
Trustworthy User Recommendation Using Boosted Vector Similarity Measureposed model in terms of accuracy measures such as precision@k and recall@k and error measures, namely, MAE, MSE and RMSE is discussed in this paper. The evaluation shows that the proposed system outperforms other recommender system with minimum MAE and RMSE.作者: tic-douloureux 時間: 2025-3-25 01:26
Sensitive Keyword Extraction Based on Cyber Keywords and LDA in Twitter to Avoid Regretshe originality of this research work lies in identifying sensitive keywords that reveal Tweeter’s Personally Identifiable Information through the novel Topic Keyword Extractor. The potential sensitive topics in which the social media users frequently exhibit personal information and unintended infor作者: 香料 時間: 2025-3-25 06:02 作者: 拒絕 時間: 2025-3-25 09:53 作者: 機警 時間: 2025-3-25 14:11 作者: 鞠躬 時間: 2025-3-25 18:30 作者: scotoma 時間: 2025-3-25 20:46
Detection of Human Faces in Video Sequences Using Mean of GLBP Signatures images for identifying the portion of the face region. Our experimental results on YouTube video face database exhibits promising results and demonstrate a significant performance improvement when compared to the existing techniques. Furthermore, our designed work is uncaring to head poses and stur作者: 細微的差異 時間: 2025-3-26 03:18
Malware Family Classification Model Using User Defined Features and Representation Learningnique. In this paper, malware family recognition is formulated as multi classification task and appropriate solution is obtained using representation learning based on binary array of malware executable files. Six families of malware have been considered here for building the models. The feature dat作者: EXPEL 時間: 2025-3-26 05:23
Irony Detection in Bengali Tweets: A New Dataset, Experimentation and Results作者: CLOWN 時間: 2025-3-26 09:56 作者: ULCER 時間: 2025-3-26 15:58 作者: LIMIT 時間: 2025-3-26 20:38 作者: 用肘 時間: 2025-3-26 22:50
Customer Relationship Managementposed model in terms of accuracy measures such as precision@k and recall@k and error measures, namely, MAE, MSE and RMSE is discussed in this paper. The evaluation shows that the proposed system outperforms other recommender system with minimum MAE and RMSE.作者: Cirrhosis 時間: 2025-3-27 02:32
Merchandise and Category Managementhe originality of this research work lies in identifying sensitive keywords that reveal Tweeter’s Personally Identifiable Information through the novel Topic Keyword Extractor. The potential sensitive topics in which the social media users frequently exhibit personal information and unintended infor作者: 按時間順序 時間: 2025-3-27 06:23 作者: 不能逃避 時間: 2025-3-27 10:08 作者: 斥責 時間: 2025-3-27 13:41
Strategic Safety Stocks in Supply Chainsgenerating WM (watermark) which makes the WMG secure. The technique is analyzed using the images given in datasets, signal and image processing institute (SIPI), break our watermarking system (BOWS), and Copydays. The experimental results of the proposed scheme are promising.作者: 包庇 時間: 2025-3-27 19:41
Single-Echelon Inventory Models,s a face image based on the minimum distance. Experiments have been performed with FEI and ORL face databases for the evaluation of approximation string matching algorithms and the results demonstrate the utility of distance measures for the face recognition system.作者: SSRIS 時間: 2025-3-27 23:59 作者: Coronary-Spasm 時間: 2025-3-28 02:59
Sales as the Key to Change Within Companies,nique. In this paper, malware family recognition is formulated as multi classification task and appropriate solution is obtained using representation learning based on binary array of malware executable files. Six families of malware have been considered here for building the models. The feature dat作者: 指耕作 時間: 2025-3-28 07:50 作者: Inflated 時間: 2025-3-28 14:05 作者: 推崇 時間: 2025-3-28 17:25 作者: Mutter 時間: 2025-3-28 22:47 作者: FISC 時間: 2025-3-28 22:58
Merchandise and Category Managementline repository. The data presented by users on social networking sites are usually composed of sensitive or private data that is highly potential for cyber threats. The most frequently presented sensitive private data is analyzed by collecting real-time tweets based on benchmarked cyber-keywords un作者: 障礙 時間: 2025-3-29 06:40 作者: Graves’-disease 時間: 2025-3-29 11:19 作者: 馬賽克 時間: 2025-3-29 15:16
https://doi.org/10.1007/978-3-8349-6740-4guage Processing (NLP) applications such as Question Answering (QA) and Information Retrieval (IR) system. Automatic semantic relation extraction from text increases the efficiency of these systems by aiding in retrieving more accurate information to the user query. In this research work, we have pr作者: 存在主義 時間: 2025-3-29 17:23 作者: 小隔間 時間: 2025-3-29 19:53
Strategic Safety Stocks in Supply Chainsf public storages like clouds etc., security and privacy of digital data are of extreme importance. With the availability of powerful editing tools, modification of digital data is no longer a challenging task. Content modification can be done either with positive intentions like image and video enh作者: Accord 時間: 2025-3-30 03:03 作者: 透明 時間: 2025-3-30 06:19 作者: Anthem 時間: 2025-3-30 08:59
Sales as the Key to Change Within Companies,stem from being infected, protecting it from potential information loss and system compromise. Commonly, there are 25 malware families exists. Traditional malware detection and anti-virus systems fail to classify the new variants of unknown malware into their corresponding families. With development作者: FOVEA 時間: 2025-3-30 14:15 作者: 盤旋 時間: 2025-3-30 16:52 作者: GLUE 時間: 2025-3-30 21:16 作者: 晚間 時間: 2025-3-31 04:01 作者: 漸變 時間: 2025-3-31 06:19 作者: enflame 時間: 2025-3-31 10:46 作者: PAN 時間: 2025-3-31 17:11