冰雹 发表于 2025-3-28 15:07:24

A Design and an Implementation of Forecast Sentence Extractor,f the forecast sentence extractor by using natural language processing and machine learning algorithm. The proposed algorithm digests a long article and then provides a short list of forecast sentences. Three feature selection approaches are tested. From the experimental studies, the accuracy of the proposed algorithm is up to 85.10%.

epicardium 发表于 2025-3-28 20:36:53

http://reply.papertrans.cn/27/2628/262752/262752_42.png

CON 发表于 2025-3-29 01:56:57

Conference proceedings 2020communication technologies, and cloud computing and computer networks. In-depth discussions of various issues within these broad areas provide an intriguing and insightful reference guide for researchers, engineers and students alike.

APNEA 发表于 2025-3-29 03:04:20

http://reply.papertrans.cn/27/2628/262752/262752_44.png

首创精神 发表于 2025-3-29 09:00:45

http://reply.papertrans.cn/27/2628/262752/262752_45.png

Encumber 发表于 2025-3-29 11:36:45

An ECC with Probable Secure and Efficient Approach on Noncommutative Cryptography,silient on these two cryptographic assumptions. The claims on the Noncommutative cryptographic scheme on monomials generated elements is considered be based on hidden subgroup or subfield problems that strengthen this manuscript, where original assumptions are hidden and its equivalents semiring tak

利用 发表于 2025-3-29 19:27:40

Probability Prediction Using Improved Method in Delay-Tolerant Network, obtains the message accumulates it and advances its duplicate to another node it experiences. There are many parameters used to evaluate the Delivery Probability (DP) and storage of each node is also used because in DTN all the nodes should be capable of storing the message if the path is not avail

evince 发表于 2025-3-29 21:40:02

Taxonomy of Cyberbullying Detection and Prediction Techniques in Online Social Networks,ility of multiple users, which resultantly attract more criminals and hence increasing insecurity in OSN. Different types of crimes are committed for multiple reasons in cyber realm by taking assistance of cyber technology. This insecure environment of OSN needs attention to prevent the damage cause

Curmudgeon 发表于 2025-3-30 02:29:18

http://reply.papertrans.cn/27/2628/262752/262752_49.png

洞穴 发表于 2025-3-30 07:18:17

http://reply.papertrans.cn/27/2628/262752/262752_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Data Communication and Networks; Proceedings of GUCON Lakhmi C. Jain,George A. Tsihrintzis,Dilip Kumar S Conference proceedings 2020 Spring