Zeitschriftenartikel zum Thema „Explicit content detection“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Explicit content detection" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Marcial Basilio, Jorge Alberto, Gualberto Aguilar Torres, Gabriel Sanchez Perez, Linda Karina Toscano Medina, Hector Manuel Perez Meana und Enrique Escamilla Hernadez. „Explicit Content Image Detection“. Signal & Image Processing : An International Journal 1, Nr. 2 (29.12.2010): 47–58. http://dx.doi.org/10.5121/sipij.2010.1205.
Der volle Inhalt der QuelleQamar Bhatti, Ali, Muhammad Umer, Syed Hasan Adil, Mansoor Ebrahim, Daniyal Nawaz und Faizan Ahmed. „Explicit Content Detection System: An Approach towards a Safe and Ethical Environment“. Applied Computational Intelligence and Soft Computing 2018 (04.07.2018): 1–13. http://dx.doi.org/10.1155/2018/1463546.
Der volle Inhalt der QuelleAppati, Justice Kwame, Kennedy Yaw Lodonu und Richmond Chris-Koka. „A Review of Image Analysis Techniques for Adult Content Detection“. International Journal of Software Innovation 9, Nr. 2 (April 2021): 102–21. http://dx.doi.org/10.4018/ijsi.2021040106.
Der volle Inhalt der QuelleChen, Xiaoyuan, Turki Aljrees, Muhammad Umer, Hanen Karamti, Saba Tahir, Nihal Abuzinadah, Khaled Alnowaiser, Ala’ Abdulmajid Eshmawi, Abdullah Mohamed und Imran Ashraf. „A novel approach for explicit song lyrics detection using machine and deep ensemble learning models“. PeerJ Computer Science 9 (30.08.2023): e1469. http://dx.doi.org/10.7717/peerj-cs.1469.
Der volle Inhalt der QuelleMuhammad Fadzli, Muhammad Arif Haikal, Mohd Fadzil Abu Hassan und Norazlin Ibrahim. „Explicit kissing scene detection in cartoon using convolutional long short-term memory“. Bulletin of Electrical Engineering and Informatics 11, Nr. 1 (01.02.2022): 213–20. http://dx.doi.org/10.11591/eei.v11i1.3542.
Der volle Inhalt der QuelleMarcial Basilio, Jorge A., Gualberto Aguilar Torres, Gabriel Sánchez Pérez, Karina Toscano Medina und Héctor M. Pérez Meana. „Novel method for pornographic image detection using HSV and YCbCr color models“. Revista Facultad de Ingeniería Universidad de Antioquia, Nr. 64 (03.10.2012): 79–90. http://dx.doi.org/10.17533/udea.redin.13117.
Der volle Inhalt der QuelleZhang, Linhao, Li Jin, Xian Sun, Guangluan Xu, Zequn Zhang, Xiaoyu Li, Nayu Liu, Qing Liu und Shiyao Yan. „TOT:Topology-Aware Optimal Transport for Multimodal Hate Detection“. Proceedings of the AAAI Conference on Artificial Intelligence 37, Nr. 4 (26.06.2023): 4884–92. http://dx.doi.org/10.1609/aaai.v37i4.25614.
Der volle Inhalt der QuelleBekaryan, Lilit. „Lost in “Transl-Hation”: Exploring the Impact of Machine Translation as an Intermediary Tool in Detecting Armenian Hate Speech“. Translation Studies: Theory and Practice 3, Nr. 2 (6) (25.12.2023): 40–47. http://dx.doi.org/10.46991/tstp/2023.3.2.040.
Der volle Inhalt der QuelleFOUCAMBERT, DENIS, und JACQUES BAILLÉ. „Evolution of the missing-letter effect among young readers between ages 5 and 8“. Applied Psycholinguistics 32, Nr. 1 (07.10.2010): 1–17. http://dx.doi.org/10.1017/s0142716410000263.
Der volle Inhalt der QuelleCela-Conde, Camilo J., Gisèle Marty, Enric Munar, Marcos Nadal und Lucrecia Burges. „The “Style Scheme” Grounds Perception of Paintings“. Perceptual and Motor Skills 95, Nr. 1 (August 2002): 91–100. http://dx.doi.org/10.2466/pms.2002.95.1.91.
Der volle Inhalt der QuelleSeyler, Dominic, Shulong Tan, Dingcheng Li, Jingyuan Zhang und Ping Li. „Textual Analysis and Timely Detection of Suspended Social Media Accounts“. Proceedings of the International AAAI Conference on Web and Social Media 15 (22.05.2021): 644–55. http://dx.doi.org/10.1609/icwsm.v15i1.18091.
Der volle Inhalt der QuelleMalkawi, Rami, Mohammad Daradkeh, Ammar El-Hassan und Pavel Petrov. „A Semantic Similarity-Based Identification Method for Implicit Citation Functions and Sentiments Information“. Information 13, Nr. 11 (17.11.2022): 546. http://dx.doi.org/10.3390/info13110546.
Der volle Inhalt der QuelleDespot, Kristina Š., Ana Ostroški Anić und Tony Veale. „“Somewhere along your pedigree, a bitch got over the wall!” A proposal of implicitly offensive language typology“. Lodz Papers in Pragmatics 19, Nr. 2 (01.12.2023): 385–414. http://dx.doi.org/10.1515/lpp-2023-0019.
Der volle Inhalt der QuelleLavie, Nilli, Diane M. Beck und Nikos Konstantinou. „Blinded by the load: attention, awareness and the role of perceptual load“. Philosophical Transactions of the Royal Society B: Biological Sciences 369, Nr. 1641 (05.05.2014): 20130205. http://dx.doi.org/10.1098/rstb.2013.0205.
Der volle Inhalt der QuelleJakku, Sai Sreekar, Sudheer Narla, Abhinav Reddy Emmadi und V. Kakulapati. „A Novel Approach to Detection of Fake News in Online Communities“. Advances in Research 24, Nr. 4 (08.04.2023): 79–84. http://dx.doi.org/10.9734/air/2023/v24i4950.
Der volle Inhalt der QuelleBuchner, Jens S., Ute Wollschläger und Kurt Roth. „Inverting surface GPR data using FDTD simulation and automatic detection of reflections to estimate subsurface water content and geometry“. GEOPHYSICS 77, Nr. 4 (01.07.2012): H45—H55. http://dx.doi.org/10.1190/geo2011-0467.1.
Der volle Inhalt der QuellePeng, Jin, Chengming Liu, Haibo Pang, Xiaomeng Gao, Guozhen Cheng und Bing Hao. „GP-Net: Image Manipulation Detection and Localization via Long-Range Modeling and Transformers“. Applied Sciences 13, Nr. 21 (05.11.2023): 12053. http://dx.doi.org/10.3390/app132112053.
Der volle Inhalt der QuelleSui Lyn, Hor, Sarina Mansor, Nouar AlDahoul und Hezerul Abdul Karim. „Convolutional Neural Network-based Transfer Learning and Classification of Visual Contents for Film Censorship“. Journal of Engineering Technology and Applied Physics 2, Nr. 2 (15.12.2020): 28–35. http://dx.doi.org/10.33093/jetap.2020.2.2.5.
Der volle Inhalt der QuelleWen, Hamilton, Janos L. Mathe, Stuart T. Weinberg, Asli Ozdas Weitkamp und Scott D. Nelson. „Creating an immunization content database for knowledge management across clinical systems“. American Journal of Health-System Pharmacy 76, Supplement_3 (28.07.2019): S79—S84. http://dx.doi.org/10.1093/ajhp/zxz134.
Der volle Inhalt der QuelleKumar, Shubham. „Smart System to Detect Adult Content and Child Pornography on Web“. International Journal for Research in Applied Science and Engineering Technology 9, Nr. 9 (30.09.2021): 1704–6. http://dx.doi.org/10.22214/ijraset.2021.38256.
Der volle Inhalt der QuelleZiems, Caleb, Ymir Vigfusson und Fred Morstatter. „Aggressive, Repetitive, Intentional, Visible, and Imbalanced: Refining Representations for Cyberbullying Classification“. Proceedings of the International AAAI Conference on Web and Social Media 14 (26.05.2020): 808–19. http://dx.doi.org/10.1609/icwsm.v14i1.7345.
Der volle Inhalt der QuelleFormenton, M., G. Panegrossi, D. Casella, S. Dietrich, A. Mugnai, P. Sanò, F. Di Paola, H. D. Betz, C. Price und Y. Yair. „Using a cloud electrification model to study relationships between lightning activity and cloud microphysical structure“. Natural Hazards and Earth System Sciences 13, Nr. 4 (24.04.2013): 1085–104. http://dx.doi.org/10.5194/nhess-13-1085-2013.
Der volle Inhalt der QuelleMudler, Jan, Andreas Hördt, Dennis Kreith, Madhuri Sugand, Kirill Bazhin, Lyudmila Lebedeva und Tino Radić. „Broadband spectral induced polarization for the detection of Permafrost and an approach to ice content estimation – a case study from Yakutia, Russia“. Cryosphere 16, Nr. 11 (14.11.2022): 4727–44. http://dx.doi.org/10.5194/tc-16-4727-2022.
Der volle Inhalt der QuelleJohn-Africa, Elijah, und Victor T. Emmah. „Performance Evaluation of LSTM and RNN Models in the Detection of Email Spam Messages“. European Journal of Information Technologies and Computer Science 2, Nr. 6 (26.11.2022): 24–30. http://dx.doi.org/10.24018/compute.2022.2.6.80.
Der volle Inhalt der QuelleLaio, F., P. Allamano und P. Claps. „Exploiting the information content of hydrological ''outliers'' for goodness-of-fit testing“. Hydrology and Earth System Sciences 14, Nr. 10 (12.10.2010): 1909–17. http://dx.doi.org/10.5194/hess-14-1909-2010.
Der volle Inhalt der QuelleLaio, F., P. Allamano und P. Claps. „Exploiting the information content of hydrological "outliers" for goodness-of-fit testing“. Hydrology and Earth System Sciences Discussions 7, Nr. 4 (22.07.2010): 4851–74. http://dx.doi.org/10.5194/hessd-7-4851-2010.
Der volle Inhalt der QuelleJeevan Nagendra Kumar, Y., Rohith Reddy Vanapatla, Vamshi Krishna Pinamoni, Jaswanth Kandukuri, Muntather Almusawi, Aravinda K, Lavish Kansal und Ravi Kalra. „Detecting cyberbullying in social media using text analysis and ensemble techniques“. E3S Web of Conferences 507 (2024): 01069. http://dx.doi.org/10.1051/e3sconf/202450701069.
Der volle Inhalt der QuelleJUPP, JULIE, und JOHN S. GERO. „Visual style: Qualitative and context-dependent categorization“. Artificial Intelligence for Engineering Design, Analysis and Manufacturing 20, Nr. 3 (27.06.2006): 247–66. http://dx.doi.org/10.1017/s0890060406060197.
Der volle Inhalt der QuellePanagiotaropoulos, Theofanis I., Vishal Kapoor und Nikos K. Logothetis. „Subjective visual perception: from local processing to emergent phenomena of brain activity“. Philosophical Transactions of the Royal Society B: Biological Sciences 369, Nr. 1641 (05.05.2014): 20130534. http://dx.doi.org/10.1098/rstb.2013.0534.
Der volle Inhalt der QuelleMonroe, J. Grey, John K. McKay, Detlef Weigel und Pádraic J. Flood. „The population genomics of adaptive loss of function“. Heredity 126, Nr. 3 (11.02.2021): 383–95. http://dx.doi.org/10.1038/s41437-021-00403-2.
Der volle Inhalt der QuelleThakur, Nirmalya, Shuqi Cui, Karam Khanna, Victoria Knieling, Yuvraj Nihal Duggal und Mingchen Shao. „Investigation of the Gender-Specific Discourse about Online Learning during COVID-19 on Twitter Using Sentiment Analysis, Subjectivity Analysis, and Toxicity Analysis“. Computers 12, Nr. 11 (31.10.2023): 221. http://dx.doi.org/10.3390/computers12110221.
Der volle Inhalt der QuelleAhne, Adrian, Vivek Khetan, Xavier Tannier, Md Imbesat Hassan Rizvi, Thomas Czernichow, Francisco Orchard, Charline Bour, Andrew Fano und Guy Fagherazzi. „Extraction of Explicit and Implicit Cause-Effect Relationships in Patient-Reported Diabetes-Related Tweets From 2017 to 2021: Deep Learning Approach“. JMIR Medical Informatics 10, Nr. 7 (19.07.2022): e37201. http://dx.doi.org/10.2196/37201.
Der volle Inhalt der QuelleJo, Mijoung, Soondool Chung und Hajin Lee. „Comparative analysis of Ordinances on the Prevention of Lonely Deaths in Metropolitan and Local Governments : Focused on the「Act on the Prevention and Management of Lonely Deaths」“. Academy of Social Welfare and Law 14, Nr. 2 (31.08.2023): 3–26. http://dx.doi.org/10.35589/swlj.2023.14.2.3.
Der volle Inhalt der QuelleMarkovsky, Aleksandr V. „ADDITIVE EFFECT OF GENES POLYMORPHISM OF FOLATE CYCLE PROTEINS AND HOMOCYSTEIN LEVEL IN PATIENTS WITH PROLIFERATIVE DISEASES OF THE BREAST AS A POTENTIAL FACTOR OF THE RISK OF THROMBOSSES“. Atherothrombosis Journal, Nr. 2 (27.12.2018): 46–53. http://dx.doi.org/10.21518/2307-1109-2018-2-46-53.
Der volle Inhalt der QuelleDewani, Amirita, Mohsin Ali Memon, Sania Bhatti, Adel Sulaiman, Mohammed Hamdi, Hani Alshahrani, Abdullah Alghamdi und Asadullah Shaikh. „Detection of Cyberbullying Patterns in Low Resource Colloquial Roman Urdu Microtext using Natural Language Processing, Machine Learning, and Ensemble Techniques“. Applied Sciences 13, Nr. 4 (05.02.2023): 2062. http://dx.doi.org/10.3390/app13042062.
Der volle Inhalt der QuelleGobel, Sry Ade Muhtya, Elnovani Lusiana und Susanne Dida. „Mental Health Promotion: Stop Self-Diagnosing Through Social Media“. Jurnal Promkes 11, Nr. 1 (10.03.2023): 71–81. http://dx.doi.org/10.20473/jpk.v11.i1.2023.71-81.
Der volle Inhalt der QuelleLin, Qinan, Huaguo Huang, Linfeng Yu und Jingxu Wang. „Detection of Shoot Beetle Stress on Yunnan Pine Forest Using a Coupled LIBERTY2-INFORM Simulation“. Remote Sensing 10, Nr. 7 (18.07.2018): 1133. http://dx.doi.org/10.3390/rs10071133.
Der volle Inhalt der QuelleMcCauley, Robert N., George Graham und A. C. Reid. „Theory of Mind, Religiosity, and Autistic Spectrum Disorder: a Review of Empirical Evidence Bearing on Three Hypotheses“. Journal of Cognition and Culture 19, Nr. 5 (08.11.2019): 411–31. http://dx.doi.org/10.1163/15685373-12340067.
Der volle Inhalt der QuelleSahbeni, Ghada, Balázs Székely, Peter K. Musyimi, Gábor Timár und Ritvik Sahajpal. „Crop Yield Estimation Using Sentinel-3 SLSTR, Soil Data, and Topographic Features Combined with Machine Learning Modeling: A Case Study of Nepal“. AgriEngineering 5, Nr. 4 (09.10.2023): 1766–88. http://dx.doi.org/10.3390/agriengineering5040109.
Der volle Inhalt der QuelleRospocher, Marco, und Samaneh Eksir. „Assessing Fine-Grained Explicitness of Song Lyrics“. Information 14, Nr. 3 (02.03.2023): 159. http://dx.doi.org/10.3390/info14030159.
Der volle Inhalt der QuelleZhao, Jian, Ming Xiao, Juntao Chen und Dongdong Li. „Explicit Dynamic DDA Method considering Dynamic Contact Force“. Shock and Vibration 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/7431245.
Der volle Inhalt der QuelleMendoza, Juan Pablo, Reid Simmons und Manuela Veloso. „Detection and correction of subtle context-dependent robot model inaccuracies using parametric regions“. International Journal of Robotics Research 38, Nr. 8 (20.05.2019): 887–909. http://dx.doi.org/10.1177/0278364919845047.
Der volle Inhalt der QuelleMastouri, Mahmoud, Zied Bouyahia, Hedi Haddad, Leila Horchani und Nafaa Jabeur. „A Context-Aware, Computer-Vision-Based Approach for the Detection of Taxi Street-Hailing Scenes from Video Streams“. Sensors 23, Nr. 10 (16.05.2023): 4796. http://dx.doi.org/10.3390/s23104796.
Der volle Inhalt der QuelleRuan, Dongsheng, Jun Wen, Nenggan Zheng und Min Zheng. „Linear Context Transform Block“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 04 (03.04.2020): 5553–60. http://dx.doi.org/10.1609/aaai.v34i04.6007.
Der volle Inhalt der QuelleJi, Wenting, Hanfen Shi, Tianyi Feng, Shuang Zhang, Haixia Liu, Wenxiu Xu, Xueqian Wang und Qingguo Wang. „Majie Cataplasm Promotes Th1 Response to Fight against Asthmatic Th2 Inflammation through NKs“. Evidence-Based Complementary and Alternative Medicine 2022 (12.05.2022): 1–12. http://dx.doi.org/10.1155/2022/6745420.
Der volle Inhalt der QuelleMaeda, Tatsuro, Kazuaki Oishi, Hiroto Ishii, Hiroyuki Ishii, Wen Hsin Chang, Tetsuji Shimizu, Akira Endoh, Hiroki Fujishiro und Takashi Koida. „Schottky barrier contact on In0.53Ga0.47As with short-wave infrared transparent conductive oxide“. Applied Physics Letters 121, Nr. 23 (05.12.2022): 232102. http://dx.doi.org/10.1063/5.0129445.
Der volle Inhalt der QuelleDunshea, Glenn, Nélio B. Barros, Elizabeth J. Berens McCabe, Nicholas J. Gales, Mark A. Hindell, Simon N. Jarman und Randall S. Wells. „Stranded dolphin stomach contents represent the free-ranging population's diet“. Biology Letters 9, Nr. 3 (23.06.2013): 20121036. http://dx.doi.org/10.1098/rsbl.2012.1036.
Der volle Inhalt der QuelleCalvo, Manuel G., P. Avero, M. Dolores Castillo und Juan J. Miguel-Tobal. „Multidimensional Anxiety and Content-specificity Effects in Preferential Processing of Threat“. European Psychologist 8, Nr. 4 (Januar 2003): 252–65. http://dx.doi.org/10.1027//1016-9040.8.4.252.
Der volle Inhalt der QuelleRömer, Ulrich J., Alexander Fidlin und Wolfgang Seemann. „Explicit analytical solutions for two-dimensional contact detection problems between almost arbitrary geometries and straight or circular counterparts“. Mechanism and Machine Theory 128 (Oktober 2018): 205–24. http://dx.doi.org/10.1016/j.mechmachtheory.2018.05.018.
Der volle Inhalt der QuelleBerdnikova, T. V. „The Problem of Detecting Incitement in Extremist Content (Using Examples from the Internet)“. Theory and Practice of Forensic Science 14, Nr. 3 (23.10.2019): 34–39. http://dx.doi.org/10.30764/1819-2785-2019-14-3-34-39.
Der volle Inhalt der Quelle