Gotowa bibliografia na temat „Popularity detection”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Popularity detection”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Popularity detection"

1

Zhang, Xiaoming, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li i Jiali Xia. "Event detection and popularity prediction in microblogging". Neurocomputing 149 (luty 2015): 1469–80. http://dx.doi.org/10.1016/j.neucom.2014.08.045.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

NN, Mrs Deepti. "D-SCAN : DEPRESSION DETECTION". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (23.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem31462.

Pełny tekst źródła
Streszczenie:
Depression is a serious illness that affects millions of people globally. From child to senior citizen are facing depression. Major area is occupied by adults, college going students and teenagers also. In recent years, the task of automation depression detection from speech has gained popularity. We provide a comparative analyses of various features for depression detection by evaluating how a system built on text-based, voice-based, and speech-based system. Detecting texts that express negativity in the data is one of the best ways to detect depression. In this paper, this problem of depression detection on social media and various machine learning algorithms that can be used to detect depression have been discussed. Key Words: Depression, Face detection, Audio detection, Video detection, Healthcare innovation, Result.
Style APA, Harvard, Vancouver, ISO itp.
3

Miao, Zhongchen, Kai Chen, Yi Fang, Jianhua He, Yi Zhou, Wenjun Zhang i Hongyuan Zha. "Cost-Effective Online Trending Topic Detection and Popularity Prediction in Microblogging". ACM Transactions on Information Systems 35, nr 3 (9.06.2017): 1–36. http://dx.doi.org/10.1145/3001833.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Wolcott, M. J. "Advances in nucleic acid-based detection methods." Clinical Microbiology Reviews 5, nr 4 (październik 1992): 370–86. http://dx.doi.org/10.1128/cmr.5.4.370.

Pełny tekst źródła
Streszczenie:
Laboratory techniques based on nucleic acid methods have increased in popularity over the last decade with clinical microbiologists and other laboratory scientists who are concerned with the diagnosis of infectious agents. This increase in popularity is a result primarily of advances made in nucleic acid amplification and detection techniques. Polymerase chain reaction, the original nucleic acid amplification technique, changed the way many people viewed and used nucleic acid techniques in clinical settings. After the potential of polymerase chain reaction became apparent, other methods of nucleic acid amplification and detection were developed. These alternative nucleic acid amplification methods may become serious contenders for application to routine laboratory analyses. This review presents some background information on nucleic acid analyses that might be used in clinical and anatomical laboratories and describes some recent advances in the amplification and detection of nucleic acids.
Style APA, Harvard, Vancouver, ISO itp.
5

Hao, Yaojun, Peng Zhang i Fuzhi Zhang. "Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems". Security and Communication Networks 2018 (11.10.2018): 1–33. http://dx.doi.org/10.1155/2018/8174603.

Pełny tekst źródła
Streszczenie:
Faced with the evolving attacks in collaborative recommender systems, the conventional shilling detection methods rely mainly on one kind of user-generated information (i.e., single view) such as rating values, rating time, and item popularity. However, these methods often suffer from poor precision when detecting different attacks due to ignoring other potentially relevant information. To address this limitation, in this paper we propose a multiview ensemble method to detect shilling attacks in collaborative recommender systems. Firstly, we extract 17 user features by considering the temporal effects of item popularity and rating values in different popular item sets. Secondly, we devise a multiview ensemble detection framework by integrating base classifiers from different classification views. Particularly, we use a feature set partition algorithm to divide the features into several subsets to construct multiple optimal classification views. We introduce a repartition strategy to increase the diversity of views and reduce the influence of feature order. Finally, the experimental results on the Netflix and Amazon review datasets indicate that the proposed method has better performance than benchmark methods when detecting various synthetic attacks and real-world attacks.
Style APA, Harvard, Vancouver, ISO itp.
6

Skaperas, Sotiris, Lefteris Mamatas i Arsenia Chorti. "Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis". IEEE Access 7 (2019): 142246–60. http://dx.doi.org/10.1109/access.2019.2940816.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Singha, Subroto, i Burchan Aydin. "Automated Drone Detection Using YOLOv4". Drones 5, nr 3 (11.09.2021): 95. http://dx.doi.org/10.3390/drones5030095.

Pełny tekst źródła
Streszczenie:
Drones are increasing in popularity and are reaching the public faster than ever before. Consequently, the chances of a drone being misused are multiplying. Automated drone detection is necessary to prevent unauthorized and unwanted drone interventions. In this research, we designed an automated drone detection system using YOLOv4. The model was trained using drone and bird datasets. We then evaluated the trained YOLOv4 model on the testing dataset, using mean average precision (mAP), frames per second (FPS), precision, recall, and F1-score as evaluation parameters. We next collected our own two types of drone videos, performed drone detections, and calculated the FPS to identify the speed of detection at three altitudes. Our methodology showed better performance than what has been found in previous similar studies, achieving a mAP of 74.36%, precision of 0.95, recall of 0.68, and F1-score of 0.79. For video detection, we achieved an FPS of 20.5 on the DJI Phantom III and an FPS of 19.0 on the DJI Mavic Pro.
Style APA, Harvard, Vancouver, ISO itp.
8

Madana Mohana, R., Paramjeet Singh, Vishal Kumar i Sohail Shariff. "Brutality detection and rendering of brutal frames". MATEC Web of Conferences 392 (2024): 01072. http://dx.doi.org/10.1051/matecconf/202439201072.

Pełny tekst źródła
Streszczenie:
The popularity of anime is increasing exponentially in every part of the world due to its unique storyline, nonstop entertainment, fights, and similar type of content that can hold viewers and keeps them at the edge of their seats. However, with the increase of popularity in anime there has also been an exponential increase in violence and brutality in anime videos. Violent scenes have become much more common in anime videos when compared to generic cinema. This survey paper presents a comprehensive view on the detection of violence in movies and different scenarios using various techniques. Most commonly to automate detection of violence, machine learning is used for training the machine to detect violence. Convolution neural networks (CNN) are used very commonly to understand image pattern recognition with high accuracy. Moreover, use of other different methods such as LSTM and Markov models are also used to detect violence. The main goals kept in mind while working is to detect violence with high accuracy and to use less computation or to perform the action at a high-speed rate.
Style APA, Harvard, Vancouver, ISO itp.
9

Satwik, Pallerla. "Hate Speech Detection". International Journal for Research in Applied Science and Engineering Technology 12, nr 3 (31.03.2024): 1646–49. http://dx.doi.org/10.22214/ijraset.2024.59053.

Pełny tekst źródła
Streszczenie:
Abstract: The rise in popularity of microblogging sites such as Facebook, Instagram, and Twitter has resulted in more people from different backgrounds indirectly communicating with one another. Our study aims to design an autonomous Deep Neural Network (DNN) algorithm for social media hate speech detection to tackle this problem. Using cutting-edge Natural Language Processing (NLP) techniques, the objective is to build a strong system that can recognize and categorize hate speech material in text data with accuracy. Our DNN algorithm allows for the real-time detection and moderation of offensive information, providing a proactive strategy against online hate speech. With the deployment of this technology, everyone will be able to access a safer and more welcoming online environment.
Style APA, Harvard, Vancouver, ISO itp.
10

Patil, Vaibhavi, Sakshi Patil, Krishna Ganjegi i Pallavi Chandratre. "Face and Eye Detection for Interpreting Malpractices in Examination Hall". International Journal for Research in Applied Science and Engineering Technology 10, nr 4 (30.04.2022): 1119–23. http://dx.doi.org/10.22214/ijraset.2022.41456.

Pełny tekst źródła
Streszczenie:
Abstract: One of the most difficult problems in computer vision is detecting faces and eyes. The purpose of this work is to give a review of the available literature on face and eye detection, as well as assessment of gaze. With the growing popularity of systems based on face and eye detection in a range of disciplines in recent years, academia and industry have paid close attention to this topic. Face and eye identification has been the subject of numerous investigations. Face and eye detection systems have made significant process despite numerous challenges such as varying illumination conditions, wearing glasses, having facial hair or moustache on the face, and varying orientation poses or occlusion of the face. We categorize face detection models and look at basic face detection methods in this paper. We categorize face detection models and look at basic face detection methos in this paper. Then we’ll go through eye detection and estimation techniques. Keywords: Image Processing, Face Detection, Eye Detection, Gaze Estimation
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Popularity detection"

1

Hsu, Yu-Song, i 許煜松. "A Fast Detection Algorithm on Popularity Modeling". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/03362414636695668535.

Pełny tekst źródła
Streszczenie:
碩士
國立清華大學
資訊工程學系
95
Popularity of publications, such as CDs, books, and movies, is critical to circulations and incomes. However, an erroneous prediction of popularity of publications causes unnecessary costs, or lost due to underproduction. Hence, the analysis of popularity of products has become an important issue. Our purpose in this research was to detect the trend before a publication becomes popular. Generally, the time series of popularity of a product can be divided into three phases – the slow-start phase, the fast-growing phase, and the slow-end phase. We proposed a two-stages detecting algorithm, which monitored the popularity with a CUSUM mechanism, verified the monitoring by comparing the distributions of past and future data to find the outbreak point, predicted the future trend of popularity, and then detected the time that the growth slows down. Thus, the data series was divided into the three mentioned phases. Through some simulation results with real data, the rate of accuracy on detecting outbreak points was over 90%, and over 80% on detecting cool-down points. This exhibits that the proposed algorithm improves efficiency and accuracy while predicting popularity of publications.
Style APA, Harvard, Vancouver, ISO itp.
2

"Social Media Analytics for Crisis Response". Doctoral diss., 2015. http://hdl.handle.net/2286/R.I.29691.

Pełny tekst źródła
Streszczenie:
abstract: Crises or large-scale emergencies such as earthquakes and hurricanes cause massive damage to lives and property. Crisis response is an essential task to mitigate the impact of a crisis. An effective response to a crisis necessitates information gathering and analysis. Traditionally, this process has been restricted to the information collected by first responders on the ground in the affected region or by official agencies such as local governments involved in the response. However, the ubiquity of mobile devices has empowered people to publish information during a crisis through social media, such as the damage reports from a hurricane. Social media has thus emerged as an important channel of information which can be leveraged to improve crisis response. Twitter is a popular medium which has been employed in recent crises. However, it presents new challenges: the data is noisy and uncurated, and it has high volume and high velocity. In this work, I study four key problems in the use of social media for crisis response: effective monitoring and analysis of high volume crisis tweets, detecting crisis events automatically in streaming data, identifying users who can be followed to effectively monitor crisis, and finally understanding user behavior during crisis to detect tweets inside crisis regions. To address these problems I propose two systems which assist disaster responders or analysts to collaboratively collect tweets related to crisis and analyze it using visual analytics to identify interesting regions, topics, and users involved in disaster response. I present a novel approach to detecting crisis events automatically in noisy, high volume Twitter streams. I also investigate and introduce novel methods to tackle information overload through the identification of information leaders in information diffusion who can be followed for efficient crisis monitoring and identification of messages originating from crisis regions using user behavior analysis.
Dissertation/Thesis
Doctoral Dissertation Computer Science 2015
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Popularity detection"

1

Copyright Paperback Collection (Library of Congress), red. Play it again. New York: Volo, 2001.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Identität ermitteln: Ethnische und postkoloniale Kriminalromane zwischen Popularität und Subversion. Würzburg: Königshausen & Neumann, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Revenge of the homecoming queen. New York: Berkley Jam, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Gildersleeve, Jessica, i Kate Cantrell. Screening the Gothic in Australia and New Zealand. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2022. http://dx.doi.org/10.5117/9789463721141.

Pełny tekst źródła
Streszczenie:
The persistent popularity of the detective narrative, new obsessions with psychological and supernatural disturbances, as well as the resurgence of older narratives of mystery or the Gothic all constitute a vast proportion of contemporary film and television productions. New ways of watching film and television have also seen a reinvigoration of this ‘most domestic of media’. But what does this ‘domesticity’ of genre and media look like ‘Down Under’ in the twenty.first century? This collection traces representations of the Gothic on both the small and large screens in Australia and New Zealand in the twenty.first century. It attends to the development and mutation of the Gothic in these post. or neo.colonial contexts, concentrating on the generic innovations of this temporal and geographical focus.
Style APA, Harvard, Vancouver, ISO itp.
5

Henderson, Lauren. Nụ hôn thần chết. Hà Nội: NXB Văn hóa thông tin, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Scripted. New York, NY: G. P. Putnam's Sons, an imprint of Penguin Group (USA), 2015.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Henderson, Lauren. Kiss me kill me. New York: Delacorte Press, 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Henderson, Lauren. Kiss Me Kill Me. New York: Random House Children's Books, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Stine, R. L. The dare. London: Pocket Books, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Stine, R. L. The dare. New York: Archway Paperbacks, 1994.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Popularity detection"

1

Schedl, Markus, Peter Knees i Gerhard Widmer. "Improving Prototypical Artist Detection by Penalizing Exorbitant Popularity". W Computer Music Modeling and Retrieval, 196–200. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11751069_18.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Sahoo, Somya Ranjan, i B. B. Gupta. "Popularity-Based Detection of Malicious Content in Facebook Using Machine Learning Approach". W First International Conference on Sustainable Technologies for Computational Intelligence, 163–76. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0029-9_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Tolosana, Ruben, Ruben Vera-Rodriguez, Julian Fierrez, Aythami Morales i Javier Ortega-Garcia. "An Introduction to Digital Face Manipulation". W Handbook of Digital Face Manipulation and Detection, 3–26. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_1.

Pełny tekst źródła
Streszczenie:
AbstractDigital manipulation has become a thriving topic in the last few years, especially after the popularity of the term DeepFakes. This chapter introduces the prominent digital manipulations with special emphasis on the facial content due to their large number of possible applications. Specifically, we cover the principles of six types of digital face manipulations: (i) entire face synthesis, (ii) identity swap, (iii) face morphing, (iv) attribute manipulation, (v) expression swap (a.k.a. face reenactment or talking faces), and (vi) audio- and text-to-video. These six main types of face manipulation are well established by the research community, having received the most attention in the last few years. In addition, we highlight in this chapter publicly available databases and code for the generation of digital fake content.
Style APA, Harvard, Vancouver, ISO itp.
4

Devaraj, Jayanthi. "A Comparative Analysis of Deep Learning Models for Fake News Detection and Popularity Prediction of Articles". W Intelligent Systems and Sustainable Computational Models, 246–65. Boca Raton: Auerbach Publications, 2024. http://dx.doi.org/10.1201/9781003407959-16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chu, Quanquan, Zhenhao Cao, Xiaofeng Gao, Peng He, Qianni Deng i Guihai Chen. "Cease with Bass: A Framework for Real-Time Topic Detection and Popularity Prediction Based on Long-Text Contents". W Computational Data and Social Networks, 53–65. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04648-4_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Zhu, Chengang, Guang Cheng i Kun Wang. "Program Popularity Prediction Approach for Internet TV Based on Trend Detecting". W Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 142–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74176-5_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Narayan, Shaifali, i Brij B. Gupta. "Study of Smartcards Technology". W Handbook of Research on Intrusion Detection Systems, 341–56. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch017.

Pełny tekst źródła
Streszczenie:
Smart cards have gained popularity in many domains by providing different facilities in every domain. Such cards are beneficial for storing credentials and access information. The cards are easy to carry and provides easy and fast computations. The cards have certain limitations due to the possible attacks on them. This chapter gives an overview of the smartcards including its history, physical design, life cycle. It also provides an overview of the possible threats on smartcards and its application area.
Style APA, Harvard, Vancouver, ISO itp.
8

Martinez, Marcos E., Francisco López-Orozco, Karla Olmos-Sánchez i Julia Patricia Sánchez-Solís. "Mispronunciation Detection and Diagnosis Through a Chatbot". W Handbook of Research on Natural Language Processing and Smart Service Systems, 31–45. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-4730-4.ch002.

Pełny tekst źródła
Streszczenie:
The interaction between humans and machines has evolved; thus, the idea of being able to communicate with computers as we usually do with other people is becoming increasingly closer to coming true. Nowadays, it is common to come across intelligent systems named chatbots, which allow people to communicate by using natural language to hold conversations related to a specific domain. Chatbots have gained popularity in different kinds of sectors, such as customer service, marketing, sales, e-commerce, e-learning, travel, and even in education itself. This chapter aims to present a chatbot-based approach to learning English as a second language by using computer-assisted language learning systems.
Style APA, Harvard, Vancouver, ISO itp.
9

Gautam, Shikha, i Anand Singh Jalal. "An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties". W Cyber Warfare and Terrorism, 712–22. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch044.

Pełny tekst źródła
Streszczenie:
Digital images are found everywhere from cell phones to the pages of online news sites. With the rapid growth of the Internet and the popularity of digital image capturing devices, images have become major source of information. Now-a-days fudge of images has become easy due to powerful advanced photo-editing software and high-resolution cameras. In this article, the authors present a method for detecting forgery, which is detected by estimating camera's intrinsic noise properties. Differences in noise parameters of the image are used as evidence of Image tampering. The method works in two steps. In the first step, the given image is classified as forge or non-forge. In the second step, the forged region in the image is detected. Results show that the proposed method outperforms the previous methods and shows a detection accuracy of 85.76%.
Style APA, Harvard, Vancouver, ISO itp.
10

Gautam, Shikha, i Anand Singh Jalal. "An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties". W Digital Forensics and Forensic Investigations, 92–102. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3025-2.ch008.

Pełny tekst źródła
Streszczenie:
Digital images are found everywhere from cell phones to the pages of online news sites. With the rapid growth of the Internet and the popularity of digital image capturing devices, images have become major source of information. Now-a-days fudge of images has become easy due to powerful advanced photo-editing software and high-resolution cameras. In this article, the authors present a method for detecting forgery, which is detected by estimating camera's intrinsic noise properties. Differences in noise parameters of the image are used as evidence of Image tampering. The method works in two steps. In the first step, the given image is classified as forge or non-forge. In the second step, the forged region in the image is detected. Results show that the proposed method outperforms the previous methods and shows a detection accuracy of 85.76%.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Popularity detection"

1

Abbink, Jasper, i Christian Doerr. "Popularity-based Detection of Domain Generation Algorithms". W ARES '17: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3098954.3107008.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

zhu, xinyi, i yu zhang. "An auxiliary edge cache strategy based on content popularity in NDN". W Ninth Symposium on Novel Photoelectronic Detection Technology and Applications (NDTA2022), redaktorzy Wenqing Liu, Hongxing Xu i Junhao Chu. SPIE, 2023. http://dx.doi.org/10.1117/12.2664524.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Skaperas, Sotiris, Lefteris Mamatas i Arsenia Chorti. "Early Video Content Popularity Detection with Change Point Analysis". W GLOBECOM 2018 - 2018 IEEE Global Communications Conference. IEEE, 2018. http://dx.doi.org/10.1109/glocom.2018.8648121.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Yang, Tianbao, Prakash Mandaym Comar i Linli Xu. "Community detection by popularity based models for authored networked data". W ASONAM '13: Advances in Social Networks Analysis and Mining 2013. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2492517.2492520.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Yang, Tianbao, Yun Chi, Shenghuo Zhu, Yihong Gong i Rong Jin. "Directed Network Community Detection: A Popularity and Productivity Link Model". W Proceedings of the 2010 SIAM International Conference on Data Mining. Philadelphia, PA: Society for Industrial and Applied Mathematics, 2010. http://dx.doi.org/10.1137/1.9781611972801.65.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Steuber, Florian, Sinclair Schneider, João A. G. Schneider i Gabi Dreo Rodosek. "Real-Time Anomaly Detection and Popularity Prediction for Emerging Events on Twitter". W ASONAM '23: International Conference on Advances in Social Networks Analysis and Mining. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3625007.3627517.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhang, Weifeng, Ting Zhong, Ce Li, Kunpeng Zhang i Fan Zhou. "CausalRD: A Causal View of Rumor Detection via Eliminating Popularity and Conformity Biases". W IEEE INFOCOM 2022 - IEEE Conference on Computer Communications. IEEE, 2022. http://dx.doi.org/10.1109/infocom48880.2022.9796678.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sparks, Kevin A., Roger G. Li, Gautam S. Thakur, Robert N. Stewart i Marie L. Urban. "Facility detection and popularity assessment from text classification of social media and crowdsourced data". W SIGSPATIAL'16: 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3003464.3003466.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ilić, Velibor, i Milovan Medojević. "DETECTION OF ANOMALIES ON THE SURFACE OF WORKPIECES PRODUCED ON CNC MACHINES". W 19th International Scientific Conference on Industrial Systems. Faculty of Technical Sciences, 2023. http://dx.doi.org/10.24867/is-2023-t3.1-2_11141.

Pełny tekst źródła
Streszczenie:
Poor working conditions, insufficient technology, and other factors can all have a substantial impact on the quality of manufactured components throughout the CNC manufacturing process. Poor quality is usually obvious in the form of surface abnormalities among work item flaws. Detecting these flaws guarantees both a defined quality and a high qualifying percentage. A non-manual visual inspection strategy for anomaly identification is necessary to overcome these challenges. Visual inspection automation in industrial products, such as defect inspection and anomaly recognition, is a crucial task in computer vision. As a result, ASAD (Autonomous workpiece surface anomalies detection) based approaches have grown in popularity among manufacturers for surface anomaly detection because they provide an efficient solution to address the disadvantages of human inspection such as low accuracy, poor real-time performance, subjectivity, and labor intensity. This paper describes the application of the Segment Anything Model (SAM) and Convolutional Neural Networks (CNN) to the analysis and image processing of workpieces produced on CNC machines to detect surface scratches and anomalies.
Style APA, Harvard, Vancouver, ISO itp.
10

S. B, Abilash, i Sujitha R. "Instagram Fake and Automated Account Detection: A Review". W The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/dpaz6258/ngcesi23p29.

Pełny tekst źródła
Streszczenie:
Fake engagement is one of the significant problems in Online Social Networks (OSNs) which is used to increase the popularity of an account in an inorganic manner. The detection of fake engagement is crucial because it leads to loss of money for businesses, wrong audience targeting in advertising, wrong product predictions systems, and unhealthy social network environment. This study is related with the detection of fake and automated accounts which leads to fake engagement on Instagram. Prior to this work, there were no publicly available dataset for fake and automated accounts. For this purpose, two datasets have been published for the detection of fake and automated accounts. For the detection of these accounts, machine learning algorithms like Naive Bayes, Logistic Regression, Support Vector Machines and Neural Networks are applied. Additionally, for the detection of automated accounts, cost sensitive genetic algorithm is proposed to handle the unnatural bias in the dataset. To deal with the unevenness problem in the fake dataset, Smote-nc algorithm is implemented. In this paper investigating various methods used in the existing work for the Instagram fake account detection.
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Popularity detection"

1

Bielinskyi, Andrii, Vladimir Soloviev, Serhiy Semerikov i Viktoria Solovieva. Detecting Stock Crashes Using Levy Distribution. [б. в.], sierpień 2019. http://dx.doi.org/10.31812/123456789/3210.

Pełny tekst źródła
Streszczenie:
In this paper we study the possibility of construction indicators-precursors relying on one of the most power-law tailed distributions – Levy’s stable distribution. Here, we apply Levy’s parameters for 29 stock indices for the period from 1 March 2000 to 28 March 2019 daily values and show their effectiveness as indicators of crisis states on the example of Dow Jones Industrial Average index for the period from 2 January 1920 to 2019. In spite of popularity of the Gaussian distribution in financial modeling, we demonstrated that Levy’s stable distribution is more suitable due to its theoretical reasons and analysis results. And finally, we conclude that stability α and skewness β parameters of Levy’s stable distribution which demonstrate characteristic behavior for crash and critical states, can serve as an indicator-precursors of unstable states.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii