微生物 发表于 2025-3-28 15:12:00

http://reply.papertrans.cn/16/1599/159869/159869_41.png

Melodrama 发表于 2025-3-28 22:30:30

Classifying Incoming Customer Messages for an e-Commerce Site Using Supervised Learningll company in Colombia that sells entertainment products through an e-commerce website and receives customer messages through various channels, including a webform, email, Facebook and Twitter. This dataset comprises 29,970 messages collected from 2019 to 2021. Each message can be categorized as bei

GUILT 发表于 2025-3-29 02:56:47

Comparison of Machine Learning Models for Predicting Rainfall in Tropical Regions: The Colombian Casa dataset with monthly rainfall levels obtained from the Institute of Hydrology, Meteorology and Environmental Studies (IDEAM) from 1980 to 2018 for each meteorological station installed in the country. We identify six kinds of time series according to results of an augmented Dickey-Fuller test and

严峻考验 发表于 2025-3-29 04:42:55

Deep Mining Covid-19 Literaturech is a huge collection of all papers published about and around the SARS-CoV2 virus and the pandemic it caused. We discuss how classical text mining algorithms like Latent Semantic Analysis (LSA) or its modern version Latent Drichlet Allocation (LDA) can be used for this purpose and also touch more

resilience 发表于 2025-3-29 09:50:39

Keyword-Based Processing for Assessing Short Answers in the Educational Fieldectives of the test. This is a time consuming and subjective task. The support of a software tool that identifies the correctness of the response and provides useful feedback to both student and teacher may alleviate its complexity. In this work, a semi-automatic evaluation method based on augmented

conformity 发表于 2025-3-29 13:38:21

Statistical Characterization of Image Intensities in Regions Inside Arteries to Facilitate the Extrat scientists use to establish parallel planes where quantifications could be accomplished with accuracy. Unfortunately, during the center line construction, high-intensity regions representing pathologies such as atheromas and calcifications mislead algorithms and thus medical verdicts. Physicians a

后天习得 发表于 2025-3-29 16:24:21

Text Encryption with Advanced Encryption Standard (AES) for Near Field Communication (NFC) Using Hufn code can access both the code wordlist with the encoded bits in order to decode the message. In this way, improper error correction algorithms with encoded bits can be damaged resulting in total loss of information. However, code wordlist and code bit sent to the receiver require a high-level of t

绕着哥哥问 发表于 2025-3-29 23:41:56

A Systematic Review on Phishing Detection: A Perspective Beyond a High Accuracy in Phishing Detectio on detecting phishing attacks showing high accuracy, those have problems acting with the effectiveness required to prevent people to fall into these attacks in the early stages. In this article, a state-of-the-art overview of phishing detection is shown using a systematic literature review methodol

完整 发表于 2025-3-30 00:17:10

Application of Duality Properties of Renyi Entropy for Parameter Tuning in an Unsupervised Machine Lcs/clusters. In a series of numerical experiments on text data, it was demonstrated that Renyi entropy of topic models, expressed in . form (based on the escort distribution), as a function of the number of topics, is the most effective in terms of determining the optimal number of topics. At the sa

栏杆 发表于 2025-3-30 07:42:39

http://reply.papertrans.cn/16/1599/159869/159869_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Applied Informatics; 5th International Co Hector Florez,Henry Gomez Conference proceedings 2022 The Editor(s) (if applicable) and The Autho