Journal articles on the topic 'Popularity detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Popularity detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zhang, Xiaoming, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li, and Jiali Xia. "Event detection and popularity prediction in microblogging." Neurocomputing 149 (February 2015): 1469–80. http://dx.doi.org/10.1016/j.neucom.2014.08.045.
Full textNN, Mrs Deepti. "D-SCAN : DEPRESSION DETECTION." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 23, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31462.
Full textMiao, Zhongchen, Kai Chen, Yi Fang, Jianhua He, Yi Zhou, Wenjun Zhang, and Hongyuan Zha. "Cost-Effective Online Trending Topic Detection and Popularity Prediction in Microblogging." ACM Transactions on Information Systems 35, no. 3 (June 9, 2017): 1–36. http://dx.doi.org/10.1145/3001833.
Full textWolcott, M. J. "Advances in nucleic acid-based detection methods." Clinical Microbiology Reviews 5, no. 4 (October 1992): 370–86. http://dx.doi.org/10.1128/cmr.5.4.370.
Full textHao, Yaojun, Peng Zhang, and Fuzhi Zhang. "Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems." Security and Communication Networks 2018 (October 11, 2018): 1–33. http://dx.doi.org/10.1155/2018/8174603.
Full textSkaperas, Sotiris, Lefteris Mamatas, and Arsenia Chorti. "Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis." IEEE Access 7 (2019): 142246–60. http://dx.doi.org/10.1109/access.2019.2940816.
Full textSingha, Subroto, and Burchan Aydin. "Automated Drone Detection Using YOLOv4." Drones 5, no. 3 (September 11, 2021): 95. http://dx.doi.org/10.3390/drones5030095.
Full textMadana Mohana, R., Paramjeet Singh, Vishal Kumar, and Sohail Shariff. "Brutality detection and rendering of brutal frames." MATEC Web of Conferences 392 (2024): 01072. http://dx.doi.org/10.1051/matecconf/202439201072.
Full textSatwik, Pallerla. "Hate Speech Detection." International Journal for Research in Applied Science and Engineering Technology 12, no. 3 (March 31, 2024): 1646–49. http://dx.doi.org/10.22214/ijraset.2024.59053.
Full textPatil, Vaibhavi, Sakshi Patil, Krishna Ganjegi, and Pallavi Chandratre. "Face and Eye Detection for Interpreting Malpractices in Examination Hall." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 1119–23. http://dx.doi.org/10.22214/ijraset.2022.41456.
Full textThanvanthri, Srinedhi, and Shivani Ramakrishnan. "Performance of Text Classification Methods in Detection of Hate Speech in Media." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 354–58. http://dx.doi.org/10.22214/ijraset.2022.40567.
Full textHaimovich, Daniel, Dima Karamshuk, Thomas J. Leeper, Evgeniy Riabenko, and Milan Vojnovic. "Popularity prediction for social media over arbitrary time horizons." Proceedings of the VLDB Endowment 15, no. 4 (December 2021): 841–49. http://dx.doi.org/10.14778/3503585.3503593.
Full textPattanaik, Debasish, Sarat Chandra Swain, Indu Sekhar Samanta, Ritesh Dash, and Kunjabihari Swain. "Power Quality Disturbance Detection and Monitoring of Solar Integrated Micro-Grid." WSEAS TRANSACTIONS ON POWER SYSTEMS 17 (October 6, 2022): 306–15. http://dx.doi.org/10.37394/232016.2022.17.31.
Full textLiu, Xiao, Wenjun Wang, Dongxiao He, Pengfei Jiao, Di Jin, and Carlo Vittorio Cannistraci. "Semi-supervised community detection based on non-negative matrix factorization with node popularity." Information Sciences 381 (March 2017): 304–21. http://dx.doi.org/10.1016/j.ins.2016.11.028.
Full textShaheer, Rizana, and Malu U. "Real-Time Video Violence Detection Using CNN." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 2586–90. http://dx.doi.org/10.22214/ijraset.2023.52182.
Full textShyla and Vishal Bhatnagar. "Comprehensive Examination of Network Intrusion Detection Models on Data Science." International Journal of Information Retrieval Research 11, no. 4 (October 2021): 14–40. http://dx.doi.org/10.4018/ijirr.2021100102.
Full textIqbal, Nafees, Syed Abid Ali, Iqra Munir, Saima Khan, Khurshid Ayub, Mariya al-Rashida, Muhammad Islam, Zahid Shafiq, Ralf Ludwig, and Abdul Hameed. "Acridinedione as selective flouride ion chemosensor: a detailed spectroscopic and quantum mechanical investigation." RSC Advances 8, no. 4 (2018): 1993–2003. http://dx.doi.org/10.1039/c7ra11974g.
Full textRamotsoela, Daniel T., Gerhard P. Hancke, and Adnan M. Abu-Mahfouz. "Practical Challenges of Attack Detection in Microgrids Using Machine Learning." Journal of Sensor and Actuator Networks 12, no. 1 (January 18, 2023): 7. http://dx.doi.org/10.3390/jsan12010007.
Full textHuang, Hsin Haou, and Chun Kun Chiang. "Damage Localization in Plate Structures Based on Baseline-Free Method of Lamb Wave Using Mobile Transducer Set." Key Engineering Materials 970 (December 15, 2023): 119–23. http://dx.doi.org/10.4028/p-kvttx1.
Full textAlKhonaini, Arwa, Tarek Sheltami, Ashraf Mahmoud, and Muhammad Imam. "UAV Detection Using Reinforcement Learning." Sensors 24, no. 6 (March 14, 2024): 1870. http://dx.doi.org/10.3390/s24061870.
Full textC, Saranya, Santosh Kumar, Lokesh S, and Ram Ratan. "Spam Detection on Social Media Platform." International Journal of Innovative Research in Advanced Engineering 10, no. 06 (June 23, 2023): 355–61. http://dx.doi.org/10.26562/ijirae.2023.v1006.20.
Full textWang, Zhen Qi, and Dan Kai Zhang. "HIDS and NIDS Hybrid Intrusion Detection System Model Design." Advanced Engineering Forum 6-7 (September 2012): 991–94. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.991.
Full textVanjari, Prof S. P., Priyanka Rekhawar, Ketki Shinde, Sakshi Shinde, and Prajkta Shelke. "Fraud Apps Detection Using Sentiment Analysis and Spam Filtering." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (March 31, 2023): 1975–77. http://dx.doi.org/10.22214/ijraset.2023.49724.
Full textBhaskar, Navaneeth, Priyanka Tupe-Waghmare, Shobha S. Nikam, and Rakhi Khedkar. "Computer-aided automated detection of kidney disease using supervised learning technique." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 5 (October 1, 2023): 5932. http://dx.doi.org/10.11591/ijece.v13i5.pp5932-5941.
Full textLiang, Chao, Bharanidharan Shanmugam, Sami Azam, Asif Karim, Ashraful Islam, Mazdak Zamani, Sanaz Kavianpour, and Norbik Bashah Idris. "Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems." Electronics 9, no. 7 (July 10, 2020): 1120. http://dx.doi.org/10.3390/electronics9071120.
Full textZhang, Huaizu, Chengbin Xia, Guangfu Feng, and Jun Fang. "Hospitals and Laboratories on Paper-Based Sensors: A Mini Review." Sensors 21, no. 18 (September 7, 2021): 5998. http://dx.doi.org/10.3390/s21185998.
Full textFang, Tianqi, Xuanyu He, and Lizhe Xu. "Pulmonary inflammation region detection algorithms based on deep learning: a review." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 273–79. http://dx.doi.org/10.54097/hset.v4i.914.
Full textCao, Gaofeng, Huan Zhang, Jianbo Zheng, Li Kuang, and Yu Duan. "An Outlier Degree Shilling Attack Detection Algorithm Based on Dynamic Feature Selection." International Journal of Software Engineering and Knowledge Engineering 29, no. 08 (August 2019): 1159–78. http://dx.doi.org/10.1142/s0218194019500360.
Full textSingh, Raman, Harish Kumar, Ravinder Kumar Singla, and Ramachandran Ramkumar Ketti. "Internet attacks and intrusion detection system." Online Information Review 41, no. 2 (April 10, 2017): 171–84. http://dx.doi.org/10.1108/oir-12-2015-0394.
Full textMasand, Abhishek, Suryansh Chauhan, and Tarun Jain. "Depression Identification Through Tweet Clusters." International Journal of Software Innovation 10, no. 1 (January 2022): 1–14. http://dx.doi.org/10.4018/ijsi.297916.
Full textWang, Benyou, and Li Gu. "Detection of Network Intrusion Threat Based on the Probabilistic Neural Network Model." Information Technology and Control 48, no. 4 (December 18, 2019): 618–25. http://dx.doi.org/10.5755/j01.itc.48.4.24036.
Full textRevathy, S., and S. Sathya Priya. "Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4s (April 3, 2023): 156–60. http://dx.doi.org/10.17762/ijritcc.v11i4s.6322.
Full textSharma, Divyeh. "Facial Landmark Detection with Sentiment Recognition." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3488–92. http://dx.doi.org/10.22214/ijraset.2022.44687.
Full textAmirul Asyraf Zhahir, Siti Munirah Mohd, Mohd Ilias M Shuhud, Bahari Idrus, Hishamuddin Zainuddin, Nurhidaya Mohamad Jan, and Mohamed Ridza Wahiddin. "Entanglement Detection: A Scoping Review." Journal of Advanced Research in Applied Sciences and Engineering Technology 42, no. 2 (April 3, 2024): 209–20. http://dx.doi.org/10.37934/araset.42.2.209220.
Full textMuise, Christian. "Characterizing and Computing All Delete-Relaxed Dead-ends." Inteligencia Artificial 21, no. 62 (September 18, 2018): 67. http://dx.doi.org/10.4114/intartif.vol21iss62pp67-74.
Full textBura, Deepa, Amit Choudhary, and Rakesh Kumar Singh. "A Novel UML Based Approach for Early Detection of Change Prone Classes." International Journal of Open Source Software and Processes 8, no. 3 (July 2017): 1–23. http://dx.doi.org/10.4018/ijossp.2017070101.
Full textM, Senthil Raja, Arun Raj L, and Arun A. "Detection of Depression among Social Media Users with Machine Learning." Webology 19, no. 1 (January 20, 2022): 250–57. http://dx.doi.org/10.14704/web/v19i1/web19019.
Full textSharma, Sandeep, Prachi ., Rita Chhikara, and Kavita Khanna. "An efficient Android malware detection method using Borutashap algorithm." International Journal of Experimental Research and Review 34, Special Vo (October 30, 2023): 86–96. http://dx.doi.org/10.52756/ijerr.2023.v34spl.009.
Full textMazri, Ammar, and Merouane Mehdi. "A NEW APPROACH TO DETECT P2P TRAFFIC BASED ON SIGNATURES ANALYSIS." RECIMA21 - Revista Científica Multidisciplinar - ISSN 2675-6218 5, no. 3 (March 6, 2024): e534994. http://dx.doi.org/10.47820/recima21.v5i3.4994.
Full textNashikkar, Siddharth. "Social Network Mental Disorders Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (September 30, 2023): 1683–92. http://dx.doi.org/10.22214/ijraset.2023.55901.
Full textMitbavkar, Tejashri, Swarangi Pedamkar, Saloni Kuvalekar, and Prof Kumud Wasnik. "Fake Product Detection Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1879–85. http://dx.doi.org/10.22214/ijraset.2023.50409.
Full textRohankar, A. W., Shantanu Pathak, Mrinal K. Naskar, and Amitava Mukherjee. "Audio Streaming with Silence Detection Using 802.15.4 Radios." ISRN Sensor Networks 2012 (December 10, 2012): 1–5. http://dx.doi.org/10.5402/2012/590651.
Full textAzrour, Mourade, Mohammed Ouanan, and Yousef Farhaoui. "Survey of Detection SIP Malformed Messages." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 2 (August 1, 2017): 457. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp457-465.
Full textTimokhin, Stanislav, Mohammad Sadrani, and Constantinos Antoniou. "Predicting Venue Popularity Using Crowd-Sourced and Passive Sensor Data." Smart Cities 3, no. 3 (August 6, 2020): 818–41. http://dx.doi.org/10.3390/smartcities3030042.
Full textZhang, Yuxing, Jinchen Song, Yuehan Jiang, and Hongjun Li. "Online Video Anomaly Detection." Sensors 23, no. 17 (August 26, 2023): 7442. http://dx.doi.org/10.3390/s23177442.
Full textMohamed Elmahalwy, Amina, Hayam M. Mousa, and Khalid M. Amin. "New hybrid ensemble method for anomaly detection in data science." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (June 1, 2023): 3498. http://dx.doi.org/10.11591/ijece.v13i3.pp3498-3508.
Full textWahab, Abbas A., N. Fatimah Abdullah, and M. A. H. Rasid. "Mechanical Fault Detection on Electrical Machine: Thermal Analysis of Small Brushed DC Motor with Faulty Bearing." MATEC Web of Conferences 225 (2018): 05012. http://dx.doi.org/10.1051/matecconf/201822505012.
Full textM. P, Milan. "CHALLENGES IN FACE RECOGNITION TECHNIQUE." Journal of University of Shanghai for Science and Technology 23, no. 07 (July 24, 2021): 1201–4. http://dx.doi.org/10.51201/jusst/21/07253.
Full textSingh, Archana, and Rakesh Kumar. "Machine Learning and Deep Learning Approaches for detecting Alzheimer’s Disease (AD): A Review." International Journal of Engineering Research in Computer Science and Engineering 9, no. 7 (July 21, 2022): 63–68. http://dx.doi.org/10.36647/ijercse/09.07.art014.
Full textMarazqah Btoush, Eyad Abdel Latif, Xujuan Zhou, Raj Gururajan, Ka Ching Chan, Rohan Genrich, and Prema Sankaran. "A systematic review of literature on credit card cyber fraud detection using machine and deep learning." PeerJ Computer Science 9 (April 17, 2023): e1278. http://dx.doi.org/10.7717/peerj-cs.1278.
Full text