Auswahl der wissenschaftlichen Literatur zum Thema „Popularity detection“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Popularity detection" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Popularity detection"

1

Zhang, Xiaoming, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li und Jiali Xia. „Event detection and popularity prediction in microblogging“. Neurocomputing 149 (Februar 2015): 1469–80. http://dx.doi.org/10.1016/j.neucom.2014.08.045.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

NN, Mrs Deepti. „D-SCAN : DEPRESSION DETECTION“. INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, Nr. 04 (23.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem31462.

Der volle Inhalt der Quelle
Annotation:
Depression is a serious illness that affects millions of people globally. From child to senior citizen are facing depression. Major area is occupied by adults, college going students and teenagers also. In recent years, the task of automation depression detection from speech has gained popularity. We provide a comparative analyses of various features for depression detection by evaluating how a system built on text-based, voice-based, and speech-based system. Detecting texts that express negativity in the data is one of the best ways to detect depression. In this paper, this problem of depression detection on social media and various machine learning algorithms that can be used to detect depression have been discussed. Key Words: Depression, Face detection, Audio detection, Video detection, Healthcare innovation, Result.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Miao, Zhongchen, Kai Chen, Yi Fang, Jianhua He, Yi Zhou, Wenjun Zhang und Hongyuan Zha. „Cost-Effective Online Trending Topic Detection and Popularity Prediction in Microblogging“. ACM Transactions on Information Systems 35, Nr. 3 (09.06.2017): 1–36. http://dx.doi.org/10.1145/3001833.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wolcott, M. J. „Advances in nucleic acid-based detection methods.“ Clinical Microbiology Reviews 5, Nr. 4 (Oktober 1992): 370–86. http://dx.doi.org/10.1128/cmr.5.4.370.

Der volle Inhalt der Quelle
Annotation:
Laboratory techniques based on nucleic acid methods have increased in popularity over the last decade with clinical microbiologists and other laboratory scientists who are concerned with the diagnosis of infectious agents. This increase in popularity is a result primarily of advances made in nucleic acid amplification and detection techniques. Polymerase chain reaction, the original nucleic acid amplification technique, changed the way many people viewed and used nucleic acid techniques in clinical settings. After the potential of polymerase chain reaction became apparent, other methods of nucleic acid amplification and detection were developed. These alternative nucleic acid amplification methods may become serious contenders for application to routine laboratory analyses. This review presents some background information on nucleic acid analyses that might be used in clinical and anatomical laboratories and describes some recent advances in the amplification and detection of nucleic acids.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hao, Yaojun, Peng Zhang und Fuzhi Zhang. „Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems“. Security and Communication Networks 2018 (11.10.2018): 1–33. http://dx.doi.org/10.1155/2018/8174603.

Der volle Inhalt der Quelle
Annotation:
Faced with the evolving attacks in collaborative recommender systems, the conventional shilling detection methods rely mainly on one kind of user-generated information (i.e., single view) such as rating values, rating time, and item popularity. However, these methods often suffer from poor precision when detecting different attacks due to ignoring other potentially relevant information. To address this limitation, in this paper we propose a multiview ensemble method to detect shilling attacks in collaborative recommender systems. Firstly, we extract 17 user features by considering the temporal effects of item popularity and rating values in different popular item sets. Secondly, we devise a multiview ensemble detection framework by integrating base classifiers from different classification views. Particularly, we use a feature set partition algorithm to divide the features into several subsets to construct multiple optimal classification views. We introduce a repartition strategy to increase the diversity of views and reduce the influence of feature order. Finally, the experimental results on the Netflix and Amazon review datasets indicate that the proposed method has better performance than benchmark methods when detecting various synthetic attacks and real-world attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Skaperas, Sotiris, Lefteris Mamatas und Arsenia Chorti. „Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis“. IEEE Access 7 (2019): 142246–60. http://dx.doi.org/10.1109/access.2019.2940816.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Singha, Subroto, und Burchan Aydin. „Automated Drone Detection Using YOLOv4“. Drones 5, Nr. 3 (11.09.2021): 95. http://dx.doi.org/10.3390/drones5030095.

Der volle Inhalt der Quelle
Annotation:
Drones are increasing in popularity and are reaching the public faster than ever before. Consequently, the chances of a drone being misused are multiplying. Automated drone detection is necessary to prevent unauthorized and unwanted drone interventions. In this research, we designed an automated drone detection system using YOLOv4. The model was trained using drone and bird datasets. We then evaluated the trained YOLOv4 model on the testing dataset, using mean average precision (mAP), frames per second (FPS), precision, recall, and F1-score as evaluation parameters. We next collected our own two types of drone videos, performed drone detections, and calculated the FPS to identify the speed of detection at three altitudes. Our methodology showed better performance than what has been found in previous similar studies, achieving a mAP of 74.36%, precision of 0.95, recall of 0.68, and F1-score of 0.79. For video detection, we achieved an FPS of 20.5 on the DJI Phantom III and an FPS of 19.0 on the DJI Mavic Pro.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Madana Mohana, R., Paramjeet Singh, Vishal Kumar und Sohail Shariff. „Brutality detection and rendering of brutal frames“. MATEC Web of Conferences 392 (2024): 01072. http://dx.doi.org/10.1051/matecconf/202439201072.

Der volle Inhalt der Quelle
Annotation:
The popularity of anime is increasing exponentially in every part of the world due to its unique storyline, nonstop entertainment, fights, and similar type of content that can hold viewers and keeps them at the edge of their seats. However, with the increase of popularity in anime there has also been an exponential increase in violence and brutality in anime videos. Violent scenes have become much more common in anime videos when compared to generic cinema. This survey paper presents a comprehensive view on the detection of violence in movies and different scenarios using various techniques. Most commonly to automate detection of violence, machine learning is used for training the machine to detect violence. Convolution neural networks (CNN) are used very commonly to understand image pattern recognition with high accuracy. Moreover, use of other different methods such as LSTM and Markov models are also used to detect violence. The main goals kept in mind while working is to detect violence with high accuracy and to use less computation or to perform the action at a high-speed rate.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Satwik, Pallerla. „Hate Speech Detection“. International Journal for Research in Applied Science and Engineering Technology 12, Nr. 3 (31.03.2024): 1646–49. http://dx.doi.org/10.22214/ijraset.2024.59053.

Der volle Inhalt der Quelle
Annotation:
Abstract: The rise in popularity of microblogging sites such as Facebook, Instagram, and Twitter has resulted in more people from different backgrounds indirectly communicating with one another. Our study aims to design an autonomous Deep Neural Network (DNN) algorithm for social media hate speech detection to tackle this problem. Using cutting-edge Natural Language Processing (NLP) techniques, the objective is to build a strong system that can recognize and categorize hate speech material in text data with accuracy. Our DNN algorithm allows for the real-time detection and moderation of offensive information, providing a proactive strategy against online hate speech. With the deployment of this technology, everyone will be able to access a safer and more welcoming online environment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Patil, Vaibhavi, Sakshi Patil, Krishna Ganjegi und Pallavi Chandratre. „Face and Eye Detection for Interpreting Malpractices in Examination Hall“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 4 (30.04.2022): 1119–23. http://dx.doi.org/10.22214/ijraset.2022.41456.

Der volle Inhalt der Quelle
Annotation:
Abstract: One of the most difficult problems in computer vision is detecting faces and eyes. The purpose of this work is to give a review of the available literature on face and eye detection, as well as assessment of gaze. With the growing popularity of systems based on face and eye detection in a range of disciplines in recent years, academia and industry have paid close attention to this topic. Face and eye identification has been the subject of numerous investigations. Face and eye detection systems have made significant process despite numerous challenges such as varying illumination conditions, wearing glasses, having facial hair or moustache on the face, and varying orientation poses or occlusion of the face. We categorize face detection models and look at basic face detection methods in this paper. We categorize face detection models and look at basic face detection methos in this paper. Then we’ll go through eye detection and estimation techniques. Keywords: Image Processing, Face Detection, Eye Detection, Gaze Estimation
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Popularity detection"

1

Hsu, Yu-Song, und 許煜松. „A Fast Detection Algorithm on Popularity Modeling“. Thesis, 2007. http://ndltd.ncl.edu.tw/handle/03362414636695668535.

Der volle Inhalt der Quelle
Annotation:
碩士
國立清華大學
資訊工程學系
95
Popularity of publications, such as CDs, books, and movies, is critical to circulations and incomes. However, an erroneous prediction of popularity of publications causes unnecessary costs, or lost due to underproduction. Hence, the analysis of popularity of products has become an important issue. Our purpose in this research was to detect the trend before a publication becomes popular. Generally, the time series of popularity of a product can be divided into three phases – the slow-start phase, the fast-growing phase, and the slow-end phase. We proposed a two-stages detecting algorithm, which monitored the popularity with a CUSUM mechanism, verified the monitoring by comparing the distributions of past and future data to find the outbreak point, predicted the future trend of popularity, and then detected the time that the growth slows down. Thus, the data series was divided into the three mentioned phases. Through some simulation results with real data, the rate of accuracy on detecting outbreak points was over 90%, and over 80% on detecting cool-down points. This exhibits that the proposed algorithm improves efficiency and accuracy while predicting popularity of publications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

„Social Media Analytics for Crisis Response“. Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.29691.

Der volle Inhalt der Quelle
Annotation:
abstract: Crises or large-scale emergencies such as earthquakes and hurricanes cause massive damage to lives and property. Crisis response is an essential task to mitigate the impact of a crisis. An effective response to a crisis necessitates information gathering and analysis. Traditionally, this process has been restricted to the information collected by first responders on the ground in the affected region or by official agencies such as local governments involved in the response. However, the ubiquity of mobile devices has empowered people to publish information during a crisis through social media, such as the damage reports from a hurricane. Social media has thus emerged as an important channel of information which can be leveraged to improve crisis response. Twitter is a popular medium which has been employed in recent crises. However, it presents new challenges: the data is noisy and uncurated, and it has high volume and high velocity. In this work, I study four key problems in the use of social media for crisis response: effective monitoring and analysis of high volume crisis tweets, detecting crisis events automatically in streaming data, identifying users who can be followed to effectively monitor crisis, and finally understanding user behavior during crisis to detect tweets inside crisis regions. To address these problems I propose two systems which assist disaster responders or analysts to collaboratively collect tweets related to crisis and analyze it using visual analytics to identify interesting regions, topics, and users involved in disaster response. I present a novel approach to detecting crisis events automatically in noisy, high volume Twitter streams. I also investigate and introduce novel methods to tackle information overload through the identification of information leaders in information diffusion who can be followed for efficient crisis monitoring and identification of messages originating from crisis regions using user behavior analysis.
Dissertation/Thesis
Doctoral Dissertation Computer Science 2015
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Popularity detection"

1

Copyright Paperback Collection (Library of Congress), Hrsg. Play it again. New York: Volo, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Identität ermitteln: Ethnische und postkoloniale Kriminalromane zwischen Popularität und Subversion. Würzburg: Königshausen & Neumann, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Revenge of the homecoming queen. New York: Berkley Jam, 2007.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Gildersleeve, Jessica, und Kate Cantrell. Screening the Gothic in Australia and New Zealand. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2022. http://dx.doi.org/10.5117/9789463721141.

Der volle Inhalt der Quelle
Annotation:
The persistent popularity of the detective narrative, new obsessions with psychological and supernatural disturbances, as well as the resurgence of older narratives of mystery or the Gothic all constitute a vast proportion of contemporary film and television productions. New ways of watching film and television have also seen a reinvigoration of this ‘most domestic of media’. But what does this ‘domesticity’ of genre and media look like ‘Down Under’ in the twenty.first century? This collection traces representations of the Gothic on both the small and large screens in Australia and New Zealand in the twenty.first century. It attends to the development and mutation of the Gothic in these post. or neo.colonial contexts, concentrating on the generic innovations of this temporal and geographical focus.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Henderson, Lauren. Nụ hôn thần chết. Hà Nội: NXB Văn hóa thông tin, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Scripted. New York, NY: G. P. Putnam's Sons, an imprint of Penguin Group (USA), 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Henderson, Lauren. Kiss me kill me. New York: Delacorte Press, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Henderson, Lauren. Kiss Me Kill Me. New York: Random House Children's Books, 2009.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Stine, R. L. The dare. London: Pocket Books, 1994.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Stine, R. L. The dare. New York: Archway Paperbacks, 1994.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Popularity detection"

1

Schedl, Markus, Peter Knees und Gerhard Widmer. „Improving Prototypical Artist Detection by Penalizing Exorbitant Popularity“. In Computer Music Modeling and Retrieval, 196–200. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751069_18.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sahoo, Somya Ranjan, und B. B. Gupta. „Popularity-Based Detection of Malicious Content in Facebook Using Machine Learning Approach“. In First International Conference on Sustainable Technologies for Computational Intelligence, 163–76. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0029-9_13.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Tolosana, Ruben, Ruben Vera-Rodriguez, Julian Fierrez, Aythami Morales und Javier Ortega-Garcia. „An Introduction to Digital Face Manipulation“. In Handbook of Digital Face Manipulation and Detection, 3–26. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_1.

Der volle Inhalt der Quelle
Annotation:
AbstractDigital manipulation has become a thriving topic in the last few years, especially after the popularity of the term DeepFakes. This chapter introduces the prominent digital manipulations with special emphasis on the facial content due to their large number of possible applications. Specifically, we cover the principles of six types of digital face manipulations: (i) entire face synthesis, (ii) identity swap, (iii) face morphing, (iv) attribute manipulation, (v) expression swap (a.k.a. face reenactment or talking faces), and (vi) audio- and text-to-video. These six main types of face manipulation are well established by the research community, having received the most attention in the last few years. In addition, we highlight in this chapter publicly available databases and code for the generation of digital fake content.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Devaraj, Jayanthi. „A Comparative Analysis of Deep Learning Models for Fake News Detection and Popularity Prediction of Articles“. In Intelligent Systems and Sustainable Computational Models, 246–65. Boca Raton: Auerbach Publications, 2024. http://dx.doi.org/10.1201/9781003407959-16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Chu, Quanquan, Zhenhao Cao, Xiaofeng Gao, Peng He, Qianni Deng und Guihai Chen. „Cease with Bass: A Framework for Real-Time Topic Detection and Popularity Prediction Based on Long-Text Contents“. In Computational Data and Social Networks, 53–65. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04648-4_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zhu, Chengang, Guang Cheng und Kun Wang. „Program Popularity Prediction Approach for Internet TV Based on Trend Detecting“. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 142–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74176-5_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Narayan, Shaifali, und Brij B. Gupta. „Study of Smartcards Technology“. In Handbook of Research on Intrusion Detection Systems, 341–56. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch017.

Der volle Inhalt der Quelle
Annotation:
Smart cards have gained popularity in many domains by providing different facilities in every domain. Such cards are beneficial for storing credentials and access information. The cards are easy to carry and provides easy and fast computations. The cards have certain limitations due to the possible attacks on them. This chapter gives an overview of the smartcards including its history, physical design, life cycle. It also provides an overview of the possible threats on smartcards and its application area.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Martinez, Marcos E., Francisco López-Orozco, Karla Olmos-Sánchez und Julia Patricia Sánchez-Solís. „Mispronunciation Detection and Diagnosis Through a Chatbot“. In Handbook of Research on Natural Language Processing and Smart Service Systems, 31–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4730-4.ch002.

Der volle Inhalt der Quelle
Annotation:
The interaction between humans and machines has evolved; thus, the idea of being able to communicate with computers as we usually do with other people is becoming increasingly closer to coming true. Nowadays, it is common to come across intelligent systems named chatbots, which allow people to communicate by using natural language to hold conversations related to a specific domain. Chatbots have gained popularity in different kinds of sectors, such as customer service, marketing, sales, e-commerce, e-learning, travel, and even in education itself. This chapter aims to present a chatbot-based approach to learning English as a second language by using computer-assisted language learning systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Gautam, Shikha, und Anand Singh Jalal. „An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties“. In Cyber Warfare and Terrorism, 712–22. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch044.

Der volle Inhalt der Quelle
Annotation:
Digital images are found everywhere from cell phones to the pages of online news sites. With the rapid growth of the Internet and the popularity of digital image capturing devices, images have become major source of information. Now-a-days fudge of images has become easy due to powerful advanced photo-editing software and high-resolution cameras. In this article, the authors present a method for detecting forgery, which is detected by estimating camera's intrinsic noise properties. Differences in noise parameters of the image are used as evidence of Image tampering. The method works in two steps. In the first step, the given image is classified as forge or non-forge. In the second step, the forged region in the image is detected. Results show that the proposed method outperforms the previous methods and shows a detection accuracy of 85.76%.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Gautam, Shikha, und Anand Singh Jalal. „An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties“. In Digital Forensics and Forensic Investigations, 92–102. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3025-2.ch008.

Der volle Inhalt der Quelle
Annotation:
Digital images are found everywhere from cell phones to the pages of online news sites. With the rapid growth of the Internet and the popularity of digital image capturing devices, images have become major source of information. Now-a-days fudge of images has become easy due to powerful advanced photo-editing software and high-resolution cameras. In this article, the authors present a method for detecting forgery, which is detected by estimating camera's intrinsic noise properties. Differences in noise parameters of the image are used as evidence of Image tampering. The method works in two steps. In the first step, the given image is classified as forge or non-forge. In the second step, the forged region in the image is detected. Results show that the proposed method outperforms the previous methods and shows a detection accuracy of 85.76%.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Popularity detection"

1

Abbink, Jasper, und Christian Doerr. „Popularity-based Detection of Domain Generation Algorithms“. In ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3107008.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

zhu, xinyi, und yu zhang. „An auxiliary edge cache strategy based on content popularity in NDN“. In Ninth Symposium on Novel Photoelectronic Detection Technology and Applications (NDTA2022), herausgegeben von Wenqing Liu, Hongxing Xu und Junhao Chu. SPIE, 2023. http://dx.doi.org/10.1117/12.2664524.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Skaperas, Sotiris, Lefteris Mamatas und Arsenia Chorti. „Early Video Content Popularity Detection with Change Point Analysis“. In GLOBECOM 2018 - 2018 IEEE Global Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/glocom.2018.8648121.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Yang, Tianbao, Prakash Mandaym Comar und Linli Xu. „Community detection by popularity based models for authored networked data“. In ASONAM '13: Advances in Social Networks Analysis and Mining 2013. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2492517.2492520.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Yang, Tianbao, Yun Chi, Shenghuo Zhu, Yihong Gong und Rong Jin. „Directed Network Community Detection: A Popularity and Productivity Link Model“. In Proceedings of the 2010 SIAM International Conference on Data Mining. Philadelphia, PA: Society for Industrial and Applied Mathematics, 2010. http://dx.doi.org/10.1137/1.9781611972801.65.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Steuber, Florian, Sinclair Schneider, João A. G. Schneider und Gabi Dreo Rodosek. „Real-Time Anomaly Detection and Popularity Prediction for Emerging Events on Twitter“. In ASONAM '23: International Conference on Advances in Social Networks Analysis and Mining. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3625007.3627517.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zhang, Weifeng, Ting Zhong, Ce Li, Kunpeng Zhang und Fan Zhou. „CausalRD: A Causal View of Rumor Detection via Eliminating Popularity and Conformity Biases“. In IEEE INFOCOM 2022 - IEEE Conference on Computer Communications. IEEE, 2022. http://dx.doi.org/10.1109/infocom48880.2022.9796678.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sparks, Kevin A., Roger G. Li, Gautam S. Thakur, Robert N. Stewart und Marie L. Urban. „Facility detection and popularity assessment from text classification of social media and crowdsourced data“. In SIGSPATIAL'16: 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3003464.3003466.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ilić, Velibor, und Milovan Medojević. „DETECTION OF ANOMALIES ON THE SURFACE OF WORKPIECES PRODUCED ON CNC MACHINES“. In 19th International Scientific Conference on Industrial Systems. Faculty of Technical Sciences, 2023. http://dx.doi.org/10.24867/is-2023-t3.1-2_11141.

Der volle Inhalt der Quelle
Annotation:
Poor working conditions, insufficient technology, and other factors can all have a substantial impact on the quality of manufactured components throughout the CNC manufacturing process. Poor quality is usually obvious in the form of surface abnormalities among work item flaws. Detecting these flaws guarantees both a defined quality and a high qualifying percentage. A non-manual visual inspection strategy for anomaly identification is necessary to overcome these challenges. Visual inspection automation in industrial products, such as defect inspection and anomaly recognition, is a crucial task in computer vision. As a result, ASAD (Autonomous workpiece surface anomalies detection) based approaches have grown in popularity among manufacturers for surface anomaly detection because they provide an efficient solution to address the disadvantages of human inspection such as low accuracy, poor real-time performance, subjectivity, and labor intensity. This paper describes the application of the Segment Anything Model (SAM) and Convolutional Neural Networks (CNN) to the analysis and image processing of workpieces produced on CNC machines to detect surface scratches and anomalies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

S. B, Abilash, und Sujitha R. „Instagram Fake and Automated Account Detection: A Review“. In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/dpaz6258/ngcesi23p29.

Der volle Inhalt der Quelle
Annotation:
Fake engagement is one of the significant problems in Online Social Networks (OSNs) which is used to increase the popularity of an account in an inorganic manner. The detection of fake engagement is crucial because it leads to loss of money for businesses, wrong audience targeting in advertising, wrong product predictions systems, and unhealthy social network environment. This study is related with the detection of fake and automated accounts which leads to fake engagement on Instagram. Prior to this work, there were no publicly available dataset for fake and automated accounts. For this purpose, two datasets have been published for the detection of fake and automated accounts. For the detection of these accounts, machine learning algorithms like Naive Bayes, Logistic Regression, Support Vector Machines and Neural Networks are applied. Additionally, for the detection of automated accounts, cost sensitive genetic algorithm is proposed to handle the unnatural bias in the dataset. To deal with the unevenness problem in the fake dataset, Smote-nc algorithm is implemented. In this paper investigating various methods used in the existing work for the Instagram fake account detection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Popularity detection"

1

Bielinskyi, Andrii, Vladimir Soloviev, Serhiy Semerikov und Viktoria Solovieva. Detecting Stock Crashes Using Levy Distribution. [б. в.], August 2019. http://dx.doi.org/10.31812/123456789/3210.

Der volle Inhalt der Quelle
Annotation:
In this paper we study the possibility of construction indicators-precursors relying on one of the most power-law tailed distributions – Levy’s stable distribution. Here, we apply Levy’s parameters for 29 stock indices for the period from 1 March 2000 to 28 March 2019 daily values and show their effectiveness as indicators of crisis states on the example of Dow Jones Industrial Average index for the period from 2 January 1920 to 2019. In spite of popularity of the Gaussian distribution in financial modeling, we demonstrated that Levy’s stable distribution is more suitable due to its theoretical reasons and analysis results. And finally, we conclude that stability α and skewness β parameters of Levy’s stable distribution which demonstrate characteristic behavior for crash and critical states, can serve as an indicator-precursors of unstable states.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie