Artículos de revistas sobre el tema "Popularity detection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Popularity detection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Zhang, Xiaoming, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li y Jiali Xia. "Event detection and popularity prediction in microblogging". Neurocomputing 149 (febrero de 2015): 1469–80. http://dx.doi.org/10.1016/j.neucom.2014.08.045.
Texto completoNN, Mrs Deepti. "D-SCAN : DEPRESSION DETECTION". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (23 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31462.
Texto completoMiao, Zhongchen, Kai Chen, Yi Fang, Jianhua He, Yi Zhou, Wenjun Zhang y Hongyuan Zha. "Cost-Effective Online Trending Topic Detection and Popularity Prediction in Microblogging". ACM Transactions on Information Systems 35, n.º 3 (9 de junio de 2017): 1–36. http://dx.doi.org/10.1145/3001833.
Texto completoWolcott, M. J. "Advances in nucleic acid-based detection methods." Clinical Microbiology Reviews 5, n.º 4 (octubre de 1992): 370–86. http://dx.doi.org/10.1128/cmr.5.4.370.
Texto completoHao, Yaojun, Peng Zhang y Fuzhi Zhang. "Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems". Security and Communication Networks 2018 (11 de octubre de 2018): 1–33. http://dx.doi.org/10.1155/2018/8174603.
Texto completoSkaperas, Sotiris, Lefteris Mamatas y Arsenia Chorti. "Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis". IEEE Access 7 (2019): 142246–60. http://dx.doi.org/10.1109/access.2019.2940816.
Texto completoSingha, Subroto y Burchan Aydin. "Automated Drone Detection Using YOLOv4". Drones 5, n.º 3 (11 de septiembre de 2021): 95. http://dx.doi.org/10.3390/drones5030095.
Texto completoMadana Mohana, R., Paramjeet Singh, Vishal Kumar y Sohail Shariff. "Brutality detection and rendering of brutal frames". MATEC Web of Conferences 392 (2024): 01072. http://dx.doi.org/10.1051/matecconf/202439201072.
Texto completoSatwik, Pallerla. "Hate Speech Detection". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de marzo de 2024): 1646–49. http://dx.doi.org/10.22214/ijraset.2024.59053.
Texto completoPatil, Vaibhavi, Sakshi Patil, Krishna Ganjegi y Pallavi Chandratre. "Face and Eye Detection for Interpreting Malpractices in Examination Hall". International Journal for Research in Applied Science and Engineering Technology 10, n.º 4 (30 de abril de 2022): 1119–23. http://dx.doi.org/10.22214/ijraset.2022.41456.
Texto completoThanvanthri, Srinedhi y Shivani Ramakrishnan. "Performance of Text Classification Methods in Detection of Hate Speech in Media". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de marzo de 2022): 354–58. http://dx.doi.org/10.22214/ijraset.2022.40567.
Texto completoHaimovich, Daniel, Dima Karamshuk, Thomas J. Leeper, Evgeniy Riabenko y Milan Vojnovic. "Popularity prediction for social media over arbitrary time horizons". Proceedings of the VLDB Endowment 15, n.º 4 (diciembre de 2021): 841–49. http://dx.doi.org/10.14778/3503585.3503593.
Texto completoPattanaik, Debasish, Sarat Chandra Swain, Indu Sekhar Samanta, Ritesh Dash y Kunjabihari Swain. "Power Quality Disturbance Detection and Monitoring of Solar Integrated Micro-Grid". WSEAS TRANSACTIONS ON POWER SYSTEMS 17 (6 de octubre de 2022): 306–15. http://dx.doi.org/10.37394/232016.2022.17.31.
Texto completoLiu, Xiao, Wenjun Wang, Dongxiao He, Pengfei Jiao, Di Jin y Carlo Vittorio Cannistraci. "Semi-supervised community detection based on non-negative matrix factorization with node popularity". Information Sciences 381 (marzo de 2017): 304–21. http://dx.doi.org/10.1016/j.ins.2016.11.028.
Texto completoShaheer, Rizana y Malu U. "Real-Time Video Violence Detection Using CNN". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 2586–90. http://dx.doi.org/10.22214/ijraset.2023.52182.
Texto completoShyla y Vishal Bhatnagar. "Comprehensive Examination of Network Intrusion Detection Models on Data Science". International Journal of Information Retrieval Research 11, n.º 4 (octubre de 2021): 14–40. http://dx.doi.org/10.4018/ijirr.2021100102.
Texto completoIqbal, Nafees, Syed Abid Ali, Iqra Munir, Saima Khan, Khurshid Ayub, Mariya al-Rashida, Muhammad Islam, Zahid Shafiq, Ralf Ludwig y Abdul Hameed. "Acridinedione as selective flouride ion chemosensor: a detailed spectroscopic and quantum mechanical investigation". RSC Advances 8, n.º 4 (2018): 1993–2003. http://dx.doi.org/10.1039/c7ra11974g.
Texto completoRamotsoela, Daniel T., Gerhard P. Hancke y Adnan M. Abu-Mahfouz. "Practical Challenges of Attack Detection in Microgrids Using Machine Learning". Journal of Sensor and Actuator Networks 12, n.º 1 (18 de enero de 2023): 7. http://dx.doi.org/10.3390/jsan12010007.
Texto completoHuang, Hsin Haou y Chun Kun Chiang. "Damage Localization in Plate Structures Based on Baseline-Free Method of Lamb Wave Using Mobile Transducer Set". Key Engineering Materials 970 (15 de diciembre de 2023): 119–23. http://dx.doi.org/10.4028/p-kvttx1.
Texto completoAlKhonaini, Arwa, Tarek Sheltami, Ashraf Mahmoud y Muhammad Imam. "UAV Detection Using Reinforcement Learning". Sensors 24, n.º 6 (14 de marzo de 2024): 1870. http://dx.doi.org/10.3390/s24061870.
Texto completoC, Saranya, Santosh Kumar, Lokesh S y Ram Ratan. "Spam Detection on Social Media Platform". International Journal of Innovative Research in Advanced Engineering 10, n.º 06 (23 de junio de 2023): 355–61. http://dx.doi.org/10.26562/ijirae.2023.v1006.20.
Texto completoWang, Zhen Qi y Dan Kai Zhang. "HIDS and NIDS Hybrid Intrusion Detection System Model Design". Advanced Engineering Forum 6-7 (septiembre de 2012): 991–94. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.991.
Texto completoVanjari, Prof S. P., Priyanka Rekhawar, Ketki Shinde, Sakshi Shinde y Prajkta Shelke. "Fraud Apps Detection Using Sentiment Analysis and Spam Filtering". International Journal for Research in Applied Science and Engineering Technology 11, n.º 3 (31 de marzo de 2023): 1975–77. http://dx.doi.org/10.22214/ijraset.2023.49724.
Texto completoBhaskar, Navaneeth, Priyanka Tupe-Waghmare, Shobha S. Nikam y Rakhi Khedkar. "Computer-aided automated detection of kidney disease using supervised learning technique". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 5 (1 de octubre de 2023): 5932. http://dx.doi.org/10.11591/ijece.v13i5.pp5932-5941.
Texto completoLiang, Chao, Bharanidharan Shanmugam, Sami Azam, Asif Karim, Ashraful Islam, Mazdak Zamani, Sanaz Kavianpour y Norbik Bashah Idris. "Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems". Electronics 9, n.º 7 (10 de julio de 2020): 1120. http://dx.doi.org/10.3390/electronics9071120.
Texto completoZhang, Huaizu, Chengbin Xia, Guangfu Feng y Jun Fang. "Hospitals and Laboratories on Paper-Based Sensors: A Mini Review". Sensors 21, n.º 18 (7 de septiembre de 2021): 5998. http://dx.doi.org/10.3390/s21185998.
Texto completoFang, Tianqi, Xuanyu He y Lizhe Xu. "Pulmonary inflammation region detection algorithms based on deep learning: a review". Highlights in Science, Engineering and Technology 4 (26 de julio de 2022): 273–79. http://dx.doi.org/10.54097/hset.v4i.914.
Texto completoCao, Gaofeng, Huan Zhang, Jianbo Zheng, Li Kuang y Yu Duan. "An Outlier Degree Shilling Attack Detection Algorithm Based on Dynamic Feature Selection". International Journal of Software Engineering and Knowledge Engineering 29, n.º 08 (agosto de 2019): 1159–78. http://dx.doi.org/10.1142/s0218194019500360.
Texto completoSingh, Raman, Harish Kumar, Ravinder Kumar Singla y Ramachandran Ramkumar Ketti. "Internet attacks and intrusion detection system". Online Information Review 41, n.º 2 (10 de abril de 2017): 171–84. http://dx.doi.org/10.1108/oir-12-2015-0394.
Texto completoMasand, Abhishek, Suryansh Chauhan y Tarun Jain. "Depression Identification Through Tweet Clusters". International Journal of Software Innovation 10, n.º 1 (enero de 2022): 1–14. http://dx.doi.org/10.4018/ijsi.297916.
Texto completoWang, Benyou y Li Gu. "Detection of Network Intrusion Threat Based on the Probabilistic Neural Network Model". Information Technology and Control 48, n.º 4 (18 de diciembre de 2019): 618–25. http://dx.doi.org/10.5755/j01.itc.48.4.24036.
Texto completoRevathy, S. y S. Sathya Priya. "Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 4s (3 de abril de 2023): 156–60. http://dx.doi.org/10.17762/ijritcc.v11i4s.6322.
Texto completoSharma, Divyeh. "Facial Landmark Detection with Sentiment Recognition". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junio de 2022): 3488–92. http://dx.doi.org/10.22214/ijraset.2022.44687.
Texto completoAmirul Asyraf Zhahir, Siti Munirah Mohd, Mohd Ilias M Shuhud, Bahari Idrus, Hishamuddin Zainuddin, Nurhidaya Mohamad Jan y Mohamed Ridza Wahiddin. "Entanglement Detection: A Scoping Review". Journal of Advanced Research in Applied Sciences and Engineering Technology 42, n.º 2 (3 de abril de 2024): 209–20. http://dx.doi.org/10.37934/araset.42.2.209220.
Texto completoMuise, Christian. "Characterizing and Computing All Delete-Relaxed Dead-ends". Inteligencia Artificial 21, n.º 62 (18 de septiembre de 2018): 67. http://dx.doi.org/10.4114/intartif.vol21iss62pp67-74.
Texto completoBura, Deepa, Amit Choudhary y Rakesh Kumar Singh. "A Novel UML Based Approach for Early Detection of Change Prone Classes". International Journal of Open Source Software and Processes 8, n.º 3 (julio de 2017): 1–23. http://dx.doi.org/10.4018/ijossp.2017070101.
Texto completoM, Senthil Raja, Arun Raj L y Arun A. "Detection of Depression among Social Media Users with Machine Learning". Webology 19, n.º 1 (20 de enero de 2022): 250–57. http://dx.doi.org/10.14704/web/v19i1/web19019.
Texto completoSharma, Sandeep, Prachi ., Rita Chhikara y Kavita Khanna. "An efficient Android malware detection method using Borutashap algorithm". International Journal of Experimental Research and Review 34, Special Vo (30 de octubre de 2023): 86–96. http://dx.doi.org/10.52756/ijerr.2023.v34spl.009.
Texto completoMazri, Ammar y Merouane Mehdi. "A NEW APPROACH TO DETECT P2P TRAFFIC BASED ON SIGNATURES ANALYSIS". RECIMA21 - Revista Científica Multidisciplinar - ISSN 2675-6218 5, n.º 3 (6 de marzo de 2024): e534994. http://dx.doi.org/10.47820/recima21.v5i3.4994.
Texto completoNashikkar, Siddharth. "Social Network Mental Disorders Detection". International Journal for Research in Applied Science and Engineering Technology 11, n.º 9 (30 de septiembre de 2023): 1683–92. http://dx.doi.org/10.22214/ijraset.2023.55901.
Texto completoMitbavkar, Tejashri, Swarangi Pedamkar, Saloni Kuvalekar y Prof Kumud Wasnik. "Fake Product Detection Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 1879–85. http://dx.doi.org/10.22214/ijraset.2023.50409.
Texto completoRohankar, A. W., Shantanu Pathak, Mrinal K. Naskar y Amitava Mukherjee. "Audio Streaming with Silence Detection Using 802.15.4 Radios". ISRN Sensor Networks 2012 (10 de diciembre de 2012): 1–5. http://dx.doi.org/10.5402/2012/590651.
Texto completoAzrour, Mourade, Mohammed Ouanan y Yousef Farhaoui. "Survey of Detection SIP Malformed Messages". Indonesian Journal of Electrical Engineering and Computer Science 7, n.º 2 (1 de agosto de 2017): 457. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp457-465.
Texto completoTimokhin, Stanislav, Mohammad Sadrani y Constantinos Antoniou. "Predicting Venue Popularity Using Crowd-Sourced and Passive Sensor Data". Smart Cities 3, n.º 3 (6 de agosto de 2020): 818–41. http://dx.doi.org/10.3390/smartcities3030042.
Texto completoZhang, Yuxing, Jinchen Song, Yuehan Jiang y Hongjun Li. "Online Video Anomaly Detection". Sensors 23, n.º 17 (26 de agosto de 2023): 7442. http://dx.doi.org/10.3390/s23177442.
Texto completoMohamed Elmahalwy, Amina, Hayam M. Mousa y Khalid M. Amin. "New hybrid ensemble method for anomaly detection in data science". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 3 (1 de junio de 2023): 3498. http://dx.doi.org/10.11591/ijece.v13i3.pp3498-3508.
Texto completoWahab, Abbas A., N. Fatimah Abdullah y M. A. H. Rasid. "Mechanical Fault Detection on Electrical Machine: Thermal Analysis of Small Brushed DC Motor with Faulty Bearing". MATEC Web of Conferences 225 (2018): 05012. http://dx.doi.org/10.1051/matecconf/201822505012.
Texto completoM. P, Milan. "CHALLENGES IN FACE RECOGNITION TECHNIQUE". Journal of University of Shanghai for Science and Technology 23, n.º 07 (24 de julio de 2021): 1201–4. http://dx.doi.org/10.51201/jusst/21/07253.
Texto completoSingh, Archana y Rakesh Kumar. "Machine Learning and Deep Learning Approaches for detecting Alzheimer’s Disease (AD): A Review". International Journal of Engineering Research in Computer Science and Engineering 9, n.º 7 (21 de julio de 2022): 63–68. http://dx.doi.org/10.36647/ijercse/09.07.art014.
Texto completoMarazqah Btoush, Eyad Abdel Latif, Xujuan Zhou, Raj Gururajan, Ka Ching Chan, Rohan Genrich y Prema Sankaran. "A systematic review of literature on credit card cyber fraud detection using machine and deep learning". PeerJ Computer Science 9 (17 de abril de 2023): e1278. http://dx.doi.org/10.7717/peerj-cs.1278.
Texto completo