找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Intelligent Systems, Technologies and Applications; Proceedings of ISTA Sabu M. Thampi,Ljiljana Trajkovic,Deepak Mishra Conference proceed

[复制链接]
楼主: PLY
发表于 2025-3-25 04:06:22 | 显示全部楼层
发表于 2025-3-25 09:03:16 | 显示全部楼层
发表于 2025-3-25 13:45:09 | 显示全部楼层
Efficient Pre-processing and Feature Selection for Clustering of Cancer Tweets,ata analysts. As each type of data from social media is unstructured, these data have to be processed, represented and then analysed in different ways suitable to our requirements. Though retail industry and political people are using social media to a great extent to gather feedback and market thei
发表于 2025-3-25 17:28:03 | 显示全部楼层
,Intrinsic Evaluation for English–Tamil Bilingual Word Embeddings,aper, we present a data resource and evaluation for the English–Tamil bilingual word vector model. In this paper, we present dataset and the evaluation paradigm for English–Tamil bilingual language pair. This dataset contains words that covers a range of concepts that occur in natural language. The
发表于 2025-3-25 21:33:12 | 显示全部楼层
A Novel Approach of Augmenting Training Data for Legal Text Segmentation by Leveraging Domain Knowlge collection of documents. Text segmentation refers to the task of dividing a document into smaller labeled text fragments according to the semantic commonality of the contents. Due to the presence of rich semantic information in legal text, text segmentation becomes very crucial in legal domain fo
发表于 2025-3-26 02:35:53 | 显示全部楼层
Sarcasm Detection on Twitter: User Behavior Approach,of expressing opinions by different people make it difficult to determine the actual sentiments. Different elements that influence these sentiments are briefly discussed in this paper. To do this, only the content of that tweet is not enough; there is an emerging need to find some generic approach f
发表于 2025-3-26 07:20:50 | 显示全部楼层
Personalized Recommender Agent for E-Commerce Products Based on Data Mining Techniques,b sites. Turning visitors of Web sites into customers and clicks made by them into purchases is a challenging task which is achieved through accurate product recommendation. The recommendation algorithm designed in the present work initially design a user-context click matrix that predicts each user
发表于 2025-3-26 11:34:01 | 显示全部楼层
发表于 2025-3-26 15:39:35 | 显示全部楼层
Maneuvering Black-Hole Attack Using Different Traffic Generators in MANETs,ts. The attack could be just for an acquaintance or with determination to harm a network. The type of attack implemented is black hole in which the traffic is attracted by node and destination is kept deprived of the transmission. The analysis is done using FTP, VBR, and CBR generators at the applic
发表于 2025-3-26 18:17:17 | 显示全部楼层
Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies,tric technologies. Fingerprint is the most convenient biometric which is used for proving an individual’s identity. Minutiae are said to be the unique representation of a fingerprint. There are different schemes in the literature for efficient storage of minutiae. Recently, a binary tree-based appro
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-11 14:14
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表