Littérature scientifique sur le sujet « Popularity detection »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Popularity detection ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Popularity detection"

1

Zhang, Xiaoming, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li et Jiali Xia. « Event detection and popularity prediction in microblogging ». Neurocomputing 149 (février 2015) : 1469–80. http://dx.doi.org/10.1016/j.neucom.2014.08.045.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

NN, Mrs Deepti. « D-SCAN : DEPRESSION DETECTION ». INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no 04 (23 avril 2024) : 1–5. http://dx.doi.org/10.55041/ijsrem31462.

Texte intégral
Résumé :
Depression is a serious illness that affects millions of people globally. From child to senior citizen are facing depression. Major area is occupied by adults, college going students and teenagers also. In recent years, the task of automation depression detection from speech has gained popularity. We provide a comparative analyses of various features for depression detection by evaluating how a system built on text-based, voice-based, and speech-based system. Detecting texts that express negativity in the data is one of the best ways to detect depression. In this paper, this problem of depression detection on social media and various machine learning algorithms that can be used to detect depression have been discussed. Key Words: Depression, Face detection, Audio detection, Video detection, Healthcare innovation, Result.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Miao, Zhongchen, Kai Chen, Yi Fang, Jianhua He, Yi Zhou, Wenjun Zhang et Hongyuan Zha. « Cost-Effective Online Trending Topic Detection and Popularity Prediction in Microblogging ». ACM Transactions on Information Systems 35, no 3 (9 juin 2017) : 1–36. http://dx.doi.org/10.1145/3001833.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Wolcott, M. J. « Advances in nucleic acid-based detection methods. » Clinical Microbiology Reviews 5, no 4 (octobre 1992) : 370–86. http://dx.doi.org/10.1128/cmr.5.4.370.

Texte intégral
Résumé :
Laboratory techniques based on nucleic acid methods have increased in popularity over the last decade with clinical microbiologists and other laboratory scientists who are concerned with the diagnosis of infectious agents. This increase in popularity is a result primarily of advances made in nucleic acid amplification and detection techniques. Polymerase chain reaction, the original nucleic acid amplification technique, changed the way many people viewed and used nucleic acid techniques in clinical settings. After the potential of polymerase chain reaction became apparent, other methods of nucleic acid amplification and detection were developed. These alternative nucleic acid amplification methods may become serious contenders for application to routine laboratory analyses. This review presents some background information on nucleic acid analyses that might be used in clinical and anatomical laboratories and describes some recent advances in the amplification and detection of nucleic acids.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hao, Yaojun, Peng Zhang et Fuzhi Zhang. « Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems ». Security and Communication Networks 2018 (11 octobre 2018) : 1–33. http://dx.doi.org/10.1155/2018/8174603.

Texte intégral
Résumé :
Faced with the evolving attacks in collaborative recommender systems, the conventional shilling detection methods rely mainly on one kind of user-generated information (i.e., single view) such as rating values, rating time, and item popularity. However, these methods often suffer from poor precision when detecting different attacks due to ignoring other potentially relevant information. To address this limitation, in this paper we propose a multiview ensemble method to detect shilling attacks in collaborative recommender systems. Firstly, we extract 17 user features by considering the temporal effects of item popularity and rating values in different popular item sets. Secondly, we devise a multiview ensemble detection framework by integrating base classifiers from different classification views. Particularly, we use a feature set partition algorithm to divide the features into several subsets to construct multiple optimal classification views. We introduce a repartition strategy to increase the diversity of views and reduce the influence of feature order. Finally, the experimental results on the Netflix and Amazon review datasets indicate that the proposed method has better performance than benchmark methods when detecting various synthetic attacks and real-world attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Skaperas, Sotiris, Lefteris Mamatas et Arsenia Chorti. « Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis ». IEEE Access 7 (2019) : 142246–60. http://dx.doi.org/10.1109/access.2019.2940816.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Singha, Subroto, et Burchan Aydin. « Automated Drone Detection Using YOLOv4 ». Drones 5, no 3 (11 septembre 2021) : 95. http://dx.doi.org/10.3390/drones5030095.

Texte intégral
Résumé :
Drones are increasing in popularity and are reaching the public faster than ever before. Consequently, the chances of a drone being misused are multiplying. Automated drone detection is necessary to prevent unauthorized and unwanted drone interventions. In this research, we designed an automated drone detection system using YOLOv4. The model was trained using drone and bird datasets. We then evaluated the trained YOLOv4 model on the testing dataset, using mean average precision (mAP), frames per second (FPS), precision, recall, and F1-score as evaluation parameters. We next collected our own two types of drone videos, performed drone detections, and calculated the FPS to identify the speed of detection at three altitudes. Our methodology showed better performance than what has been found in previous similar studies, achieving a mAP of 74.36%, precision of 0.95, recall of 0.68, and F1-score of 0.79. For video detection, we achieved an FPS of 20.5 on the DJI Phantom III and an FPS of 19.0 on the DJI Mavic Pro.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Madana Mohana, R., Paramjeet Singh, Vishal Kumar et Sohail Shariff. « Brutality detection and rendering of brutal frames ». MATEC Web of Conferences 392 (2024) : 01072. http://dx.doi.org/10.1051/matecconf/202439201072.

Texte intégral
Résumé :
The popularity of anime is increasing exponentially in every part of the world due to its unique storyline, nonstop entertainment, fights, and similar type of content that can hold viewers and keeps them at the edge of their seats. However, with the increase of popularity in anime there has also been an exponential increase in violence and brutality in anime videos. Violent scenes have become much more common in anime videos when compared to generic cinema. This survey paper presents a comprehensive view on the detection of violence in movies and different scenarios using various techniques. Most commonly to automate detection of violence, machine learning is used for training the machine to detect violence. Convolution neural networks (CNN) are used very commonly to understand image pattern recognition with high accuracy. Moreover, use of other different methods such as LSTM and Markov models are also used to detect violence. The main goals kept in mind while working is to detect violence with high accuracy and to use less computation or to perform the action at a high-speed rate.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Satwik, Pallerla. « Hate Speech Detection ». International Journal for Research in Applied Science and Engineering Technology 12, no 3 (31 mars 2024) : 1646–49. http://dx.doi.org/10.22214/ijraset.2024.59053.

Texte intégral
Résumé :
Abstract: The rise in popularity of microblogging sites such as Facebook, Instagram, and Twitter has resulted in more people from different backgrounds indirectly communicating with one another. Our study aims to design an autonomous Deep Neural Network (DNN) algorithm for social media hate speech detection to tackle this problem. Using cutting-edge Natural Language Processing (NLP) techniques, the objective is to build a strong system that can recognize and categorize hate speech material in text data with accuracy. Our DNN algorithm allows for the real-time detection and moderation of offensive information, providing a proactive strategy against online hate speech. With the deployment of this technology, everyone will be able to access a safer and more welcoming online environment.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Patil, Vaibhavi, Sakshi Patil, Krishna Ganjegi et Pallavi Chandratre. « Face and Eye Detection for Interpreting Malpractices in Examination Hall ». International Journal for Research in Applied Science and Engineering Technology 10, no 4 (30 avril 2022) : 1119–23. http://dx.doi.org/10.22214/ijraset.2022.41456.

Texte intégral
Résumé :
Abstract: One of the most difficult problems in computer vision is detecting faces and eyes. The purpose of this work is to give a review of the available literature on face and eye detection, as well as assessment of gaze. With the growing popularity of systems based on face and eye detection in a range of disciplines in recent years, academia and industry have paid close attention to this topic. Face and eye identification has been the subject of numerous investigations. Face and eye detection systems have made significant process despite numerous challenges such as varying illumination conditions, wearing glasses, having facial hair or moustache on the face, and varying orientation poses or occlusion of the face. We categorize face detection models and look at basic face detection methods in this paper. We categorize face detection models and look at basic face detection methos in this paper. Then we’ll go through eye detection and estimation techniques. Keywords: Image Processing, Face Detection, Eye Detection, Gaze Estimation
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Popularity detection"

1

Hsu, Yu-Song, et 許煜松. « A Fast Detection Algorithm on Popularity Modeling ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/03362414636695668535.

Texte intégral
Résumé :
碩士
國立清華大學
資訊工程學系
95
Popularity of publications, such as CDs, books, and movies, is critical to circulations and incomes. However, an erroneous prediction of popularity of publications causes unnecessary costs, or lost due to underproduction. Hence, the analysis of popularity of products has become an important issue. Our purpose in this research was to detect the trend before a publication becomes popular. Generally, the time series of popularity of a product can be divided into three phases – the slow-start phase, the fast-growing phase, and the slow-end phase. We proposed a two-stages detecting algorithm, which monitored the popularity with a CUSUM mechanism, verified the monitoring by comparing the distributions of past and future data to find the outbreak point, predicted the future trend of popularity, and then detected the time that the growth slows down. Thus, the data series was divided into the three mentioned phases. Through some simulation results with real data, the rate of accuracy on detecting outbreak points was over 90%, and over 80% on detecting cool-down points. This exhibits that the proposed algorithm improves efficiency and accuracy while predicting popularity of publications.
Styles APA, Harvard, Vancouver, ISO, etc.
2

« Social Media Analytics for Crisis Response ». Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.29691.

Texte intégral
Résumé :
abstract: Crises or large-scale emergencies such as earthquakes and hurricanes cause massive damage to lives and property. Crisis response is an essential task to mitigate the impact of a crisis. An effective response to a crisis necessitates information gathering and analysis. Traditionally, this process has been restricted to the information collected by first responders on the ground in the affected region or by official agencies such as local governments involved in the response. However, the ubiquity of mobile devices has empowered people to publish information during a crisis through social media, such as the damage reports from a hurricane. Social media has thus emerged as an important channel of information which can be leveraged to improve crisis response. Twitter is a popular medium which has been employed in recent crises. However, it presents new challenges: the data is noisy and uncurated, and it has high volume and high velocity. In this work, I study four key problems in the use of social media for crisis response: effective monitoring and analysis of high volume crisis tweets, detecting crisis events automatically in streaming data, identifying users who can be followed to effectively monitor crisis, and finally understanding user behavior during crisis to detect tweets inside crisis regions. To address these problems I propose two systems which assist disaster responders or analysts to collaboratively collect tweets related to crisis and analyze it using visual analytics to identify interesting regions, topics, and users involved in disaster response. I present a novel approach to detecting crisis events automatically in noisy, high volume Twitter streams. I also investigate and introduce novel methods to tackle information overload through the identification of information leaders in information diffusion who can be followed for efficient crisis monitoring and identification of messages originating from crisis regions using user behavior analysis.
Dissertation/Thesis
Doctoral Dissertation Computer Science 2015
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Popularity detection"

1

Copyright Paperback Collection (Library of Congress), dir. Play it again. New York : Volo, 2001.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Identität ermitteln : Ethnische und postkoloniale Kriminalromane zwischen Popularität und Subversion. Würzburg : Königshausen & Neumann, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Revenge of the homecoming queen. New York : Berkley Jam, 2007.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Gildersleeve, Jessica, et Kate Cantrell. Screening the Gothic in Australia and New Zealand. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland : Amsterdam University Press, 2022. http://dx.doi.org/10.5117/9789463721141.

Texte intégral
Résumé :
The persistent popularity of the detective narrative, new obsessions with psychological and supernatural disturbances, as well as the resurgence of older narratives of mystery or the Gothic all constitute a vast proportion of contemporary film and television productions. New ways of watching film and television have also seen a reinvigoration of this ‘most domestic of media’. But what does this ‘domesticity’ of genre and media look like ‘Down Under’ in the twenty.first century? This collection traces representations of the Gothic on both the small and large screens in Australia and New Zealand in the twenty.first century. It attends to the development and mutation of the Gothic in these post. or neo.colonial contexts, concentrating on the generic innovations of this temporal and geographical focus.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Henderson, Lauren. Nụ hôn thần chết. Hà Nội : NXB Văn hóa thông tin, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Scripted. New York, NY : G. P. Putnam's Sons, an imprint of Penguin Group (USA), 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Henderson, Lauren. Kiss me kill me. New York : Delacorte Press, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Henderson, Lauren. Kiss Me Kill Me. New York : Random House Children's Books, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Stine, R. L. The dare. London : Pocket Books, 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Stine, R. L. The dare. New York : Archway Paperbacks, 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Popularity detection"

1

Schedl, Markus, Peter Knees et Gerhard Widmer. « Improving Prototypical Artist Detection by Penalizing Exorbitant Popularity ». Dans Computer Music Modeling and Retrieval, 196–200. Berlin, Heidelberg : Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751069_18.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sahoo, Somya Ranjan, et B. B. Gupta. « Popularity-Based Detection of Malicious Content in Facebook Using Machine Learning Approach ». Dans First International Conference on Sustainable Technologies for Computational Intelligence, 163–76. Singapore : Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0029-9_13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Tolosana, Ruben, Ruben Vera-Rodriguez, Julian Fierrez, Aythami Morales et Javier Ortega-Garcia. « An Introduction to Digital Face Manipulation ». Dans Handbook of Digital Face Manipulation and Detection, 3–26. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_1.

Texte intégral
Résumé :
AbstractDigital manipulation has become a thriving topic in the last few years, especially after the popularity of the term DeepFakes. This chapter introduces the prominent digital manipulations with special emphasis on the facial content due to their large number of possible applications. Specifically, we cover the principles of six types of digital face manipulations: (i) entire face synthesis, (ii) identity swap, (iii) face morphing, (iv) attribute manipulation, (v) expression swap (a.k.a. face reenactment or talking faces), and (vi) audio- and text-to-video. These six main types of face manipulation are well established by the research community, having received the most attention in the last few years. In addition, we highlight in this chapter publicly available databases and code for the generation of digital fake content.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Devaraj, Jayanthi. « A Comparative Analysis of Deep Learning Models for Fake News Detection and Popularity Prediction of Articles ». Dans Intelligent Systems and Sustainable Computational Models, 246–65. Boca Raton : Auerbach Publications, 2024. http://dx.doi.org/10.1201/9781003407959-16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Chu, Quanquan, Zhenhao Cao, Xiaofeng Gao, Peng He, Qianni Deng et Guihai Chen. « Cease with Bass : A Framework for Real-Time Topic Detection and Popularity Prediction Based on Long-Text Contents ». Dans Computational Data and Social Networks, 53–65. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04648-4_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zhu, Chengang, Guang Cheng et Kun Wang. « Program Popularity Prediction Approach for Internet TV Based on Trend Detecting ». Dans Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 142–54. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74176-5_14.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Narayan, Shaifali, et Brij B. Gupta. « Study of Smartcards Technology ». Dans Handbook of Research on Intrusion Detection Systems, 341–56. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch017.

Texte intégral
Résumé :
Smart cards have gained popularity in many domains by providing different facilities in every domain. Such cards are beneficial for storing credentials and access information. The cards are easy to carry and provides easy and fast computations. The cards have certain limitations due to the possible attacks on them. This chapter gives an overview of the smartcards including its history, physical design, life cycle. It also provides an overview of the possible threats on smartcards and its application area.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Martinez, Marcos E., Francisco López-Orozco, Karla Olmos-Sánchez et Julia Patricia Sánchez-Solís. « Mispronunciation Detection and Diagnosis Through a Chatbot ». Dans Handbook of Research on Natural Language Processing and Smart Service Systems, 31–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4730-4.ch002.

Texte intégral
Résumé :
The interaction between humans and machines has evolved; thus, the idea of being able to communicate with computers as we usually do with other people is becoming increasingly closer to coming true. Nowadays, it is common to come across intelligent systems named chatbots, which allow people to communicate by using natural language to hold conversations related to a specific domain. Chatbots have gained popularity in different kinds of sectors, such as customer service, marketing, sales, e-commerce, e-learning, travel, and even in education itself. This chapter aims to present a chatbot-based approach to learning English as a second language by using computer-assisted language learning systems.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Gautam, Shikha, et Anand Singh Jalal. « An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties ». Dans Cyber Warfare and Terrorism, 712–22. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch044.

Texte intégral
Résumé :
Digital images are found everywhere from cell phones to the pages of online news sites. With the rapid growth of the Internet and the popularity of digital image capturing devices, images have become major source of information. Now-a-days fudge of images has become easy due to powerful advanced photo-editing software and high-resolution cameras. In this article, the authors present a method for detecting forgery, which is detected by estimating camera's intrinsic noise properties. Differences in noise parameters of the image are used as evidence of Image tampering. The method works in two steps. In the first step, the given image is classified as forge or non-forge. In the second step, the forged region in the image is detected. Results show that the proposed method outperforms the previous methods and shows a detection accuracy of 85.76%.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Gautam, Shikha, et Anand Singh Jalal. « An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties ». Dans Digital Forensics and Forensic Investigations, 92–102. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3025-2.ch008.

Texte intégral
Résumé :
Digital images are found everywhere from cell phones to the pages of online news sites. With the rapid growth of the Internet and the popularity of digital image capturing devices, images have become major source of information. Now-a-days fudge of images has become easy due to powerful advanced photo-editing software and high-resolution cameras. In this article, the authors present a method for detecting forgery, which is detected by estimating camera's intrinsic noise properties. Differences in noise parameters of the image are used as evidence of Image tampering. The method works in two steps. In the first step, the given image is classified as forge or non-forge. In the second step, the forged region in the image is detected. Results show that the proposed method outperforms the previous methods and shows a detection accuracy of 85.76%.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Popularity detection"

1

Abbink, Jasper, et Christian Doerr. « Popularity-based Detection of Domain Generation Algorithms ». Dans ARES '17 : International Conference on Availability, Reliability and Security. New York, NY, USA : ACM, 2017. http://dx.doi.org/10.1145/3098954.3107008.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

zhu, xinyi, et yu zhang. « An auxiliary edge cache strategy based on content popularity in NDN ». Dans Ninth Symposium on Novel Photoelectronic Detection Technology and Applications (NDTA2022), sous la direction de Wenqing Liu, Hongxing Xu et Junhao Chu. SPIE, 2023. http://dx.doi.org/10.1117/12.2664524.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Skaperas, Sotiris, Lefteris Mamatas et Arsenia Chorti. « Early Video Content Popularity Detection with Change Point Analysis ». Dans GLOBECOM 2018 - 2018 IEEE Global Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/glocom.2018.8648121.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Yang, Tianbao, Prakash Mandaym Comar et Linli Xu. « Community detection by popularity based models for authored networked data ». Dans ASONAM '13 : Advances in Social Networks Analysis and Mining 2013. New York, NY, USA : ACM, 2013. http://dx.doi.org/10.1145/2492517.2492520.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Yang, Tianbao, Yun Chi, Shenghuo Zhu, Yihong Gong et Rong Jin. « Directed Network Community Detection : A Popularity and Productivity Link Model ». Dans Proceedings of the 2010 SIAM International Conference on Data Mining. Philadelphia, PA : Society for Industrial and Applied Mathematics, 2010. http://dx.doi.org/10.1137/1.9781611972801.65.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Steuber, Florian, Sinclair Schneider, João A. G. Schneider et Gabi Dreo Rodosek. « Real-Time Anomaly Detection and Popularity Prediction for Emerging Events on Twitter ». Dans ASONAM '23 : International Conference on Advances in Social Networks Analysis and Mining. New York, NY, USA : ACM, 2023. http://dx.doi.org/10.1145/3625007.3627517.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zhang, Weifeng, Ting Zhong, Ce Li, Kunpeng Zhang et Fan Zhou. « CausalRD : A Causal View of Rumor Detection via Eliminating Popularity and Conformity Biases ». Dans IEEE INFOCOM 2022 - IEEE Conference on Computer Communications. IEEE, 2022. http://dx.doi.org/10.1109/infocom48880.2022.9796678.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Sparks, Kevin A., Roger G. Li, Gautam S. Thakur, Robert N. Stewart et Marie L. Urban. « Facility detection and popularity assessment from text classification of social media and crowdsourced data ». Dans SIGSPATIAL'16 : 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York, NY, USA : ACM, 2016. http://dx.doi.org/10.1145/3003464.3003466.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Ilić, Velibor, et Milovan Medojević. « DETECTION OF ANOMALIES ON THE SURFACE OF WORKPIECES PRODUCED ON CNC MACHINES ». Dans 19th International Scientific Conference on Industrial Systems. Faculty of Technical Sciences, 2023. http://dx.doi.org/10.24867/is-2023-t3.1-2_11141.

Texte intégral
Résumé :
Poor working conditions, insufficient technology, and other factors can all have a substantial impact on the quality of manufactured components throughout the CNC manufacturing process. Poor quality is usually obvious in the form of surface abnormalities among work item flaws. Detecting these flaws guarantees both a defined quality and a high qualifying percentage. A non-manual visual inspection strategy for anomaly identification is necessary to overcome these challenges. Visual inspection automation in industrial products, such as defect inspection and anomaly recognition, is a crucial task in computer vision. As a result, ASAD (Autonomous workpiece surface anomalies detection) based approaches have grown in popularity among manufacturers for surface anomaly detection because they provide an efficient solution to address the disadvantages of human inspection such as low accuracy, poor real-time performance, subjectivity, and labor intensity. This paper describes the application of the Segment Anything Model (SAM) and Convolutional Neural Networks (CNN) to the analysis and image processing of workpieces produced on CNC machines to detect surface scratches and anomalies.
Styles APA, Harvard, Vancouver, ISO, etc.
10

S. B, Abilash, et Sujitha R. « Instagram Fake and Automated Account Detection : A Review ». Dans The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/dpaz6258/ngcesi23p29.

Texte intégral
Résumé :
Fake engagement is one of the significant problems in Online Social Networks (OSNs) which is used to increase the popularity of an account in an inorganic manner. The detection of fake engagement is crucial because it leads to loss of money for businesses, wrong audience targeting in advertising, wrong product predictions systems, and unhealthy social network environment. This study is related with the detection of fake and automated accounts which leads to fake engagement on Instagram. Prior to this work, there were no publicly available dataset for fake and automated accounts. For this purpose, two datasets have been published for the detection of fake and automated accounts. For the detection of these accounts, machine learning algorithms like Naive Bayes, Logistic Regression, Support Vector Machines and Neural Networks are applied. Additionally, for the detection of automated accounts, cost sensitive genetic algorithm is proposed to handle the unnatural bias in the dataset. To deal with the unevenness problem in the fake dataset, Smote-nc algorithm is implemented. In this paper investigating various methods used in the existing work for the Instagram fake account detection.
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Popularity detection"

1

Bielinskyi, Andrii, Vladimir Soloviev, Serhiy Semerikov et Viktoria Solovieva. Detecting Stock Crashes Using Levy Distribution. [б. в.], août 2019. http://dx.doi.org/10.31812/123456789/3210.

Texte intégral
Résumé :
In this paper we study the possibility of construction indicators-precursors relying on one of the most power-law tailed distributions – Levy’s stable distribution. Here, we apply Levy’s parameters for 29 stock indices for the period from 1 March 2000 to 28 March 2019 daily values and show their effectiveness as indicators of crisis states on the example of Dow Jones Industrial Average index for the period from 2 January 1920 to 2019. In spite of popularity of the Gaussian distribution in financial modeling, we demonstrated that Levy’s stable distribution is more suitable due to its theoretical reasons and analysis results. And finally, we conclude that stability α and skewness β parameters of Levy’s stable distribution which demonstrate characteristic behavior for crash and critical states, can serve as an indicator-precursors of unstable states.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie