Artykuły w czasopismach na temat „Popularity detection”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Popularity detection”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Zhang, Xiaoming, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li i Jiali Xia. "Event detection and popularity prediction in microblogging". Neurocomputing 149 (luty 2015): 1469–80. http://dx.doi.org/10.1016/j.neucom.2014.08.045.
Pełny tekst źródłaNN, Mrs Deepti. "D-SCAN : DEPRESSION DETECTION". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (23.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem31462.
Pełny tekst źródłaMiao, Zhongchen, Kai Chen, Yi Fang, Jianhua He, Yi Zhou, Wenjun Zhang i Hongyuan Zha. "Cost-Effective Online Trending Topic Detection and Popularity Prediction in Microblogging". ACM Transactions on Information Systems 35, nr 3 (9.06.2017): 1–36. http://dx.doi.org/10.1145/3001833.
Pełny tekst źródłaWolcott, M. J. "Advances in nucleic acid-based detection methods." Clinical Microbiology Reviews 5, nr 4 (październik 1992): 370–86. http://dx.doi.org/10.1128/cmr.5.4.370.
Pełny tekst źródłaHao, Yaojun, Peng Zhang i Fuzhi Zhang. "Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems". Security and Communication Networks 2018 (11.10.2018): 1–33. http://dx.doi.org/10.1155/2018/8174603.
Pełny tekst źródłaSkaperas, Sotiris, Lefteris Mamatas i Arsenia Chorti. "Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis". IEEE Access 7 (2019): 142246–60. http://dx.doi.org/10.1109/access.2019.2940816.
Pełny tekst źródłaSingha, Subroto, i Burchan Aydin. "Automated Drone Detection Using YOLOv4". Drones 5, nr 3 (11.09.2021): 95. http://dx.doi.org/10.3390/drones5030095.
Pełny tekst źródłaMadana Mohana, R., Paramjeet Singh, Vishal Kumar i Sohail Shariff. "Brutality detection and rendering of brutal frames". MATEC Web of Conferences 392 (2024): 01072. http://dx.doi.org/10.1051/matecconf/202439201072.
Pełny tekst źródłaSatwik, Pallerla. "Hate Speech Detection". International Journal for Research in Applied Science and Engineering Technology 12, nr 3 (31.03.2024): 1646–49. http://dx.doi.org/10.22214/ijraset.2024.59053.
Pełny tekst źródłaPatil, Vaibhavi, Sakshi Patil, Krishna Ganjegi i Pallavi Chandratre. "Face and Eye Detection for Interpreting Malpractices in Examination Hall". International Journal for Research in Applied Science and Engineering Technology 10, nr 4 (30.04.2022): 1119–23. http://dx.doi.org/10.22214/ijraset.2022.41456.
Pełny tekst źródłaThanvanthri, Srinedhi, i Shivani Ramakrishnan. "Performance of Text Classification Methods in Detection of Hate Speech in Media". International Journal for Research in Applied Science and Engineering Technology 10, nr 3 (31.03.2022): 354–58. http://dx.doi.org/10.22214/ijraset.2022.40567.
Pełny tekst źródłaHaimovich, Daniel, Dima Karamshuk, Thomas J. Leeper, Evgeniy Riabenko i Milan Vojnovic. "Popularity prediction for social media over arbitrary time horizons". Proceedings of the VLDB Endowment 15, nr 4 (grudzień 2021): 841–49. http://dx.doi.org/10.14778/3503585.3503593.
Pełny tekst źródłaPattanaik, Debasish, Sarat Chandra Swain, Indu Sekhar Samanta, Ritesh Dash i Kunjabihari Swain. "Power Quality Disturbance Detection and Monitoring of Solar Integrated Micro-Grid". WSEAS TRANSACTIONS ON POWER SYSTEMS 17 (6.10.2022): 306–15. http://dx.doi.org/10.37394/232016.2022.17.31.
Pełny tekst źródłaLiu, Xiao, Wenjun Wang, Dongxiao He, Pengfei Jiao, Di Jin i Carlo Vittorio Cannistraci. "Semi-supervised community detection based on non-negative matrix factorization with node popularity". Information Sciences 381 (marzec 2017): 304–21. http://dx.doi.org/10.1016/j.ins.2016.11.028.
Pełny tekst źródłaShaheer, Rizana, i Malu U. "Real-Time Video Violence Detection Using CNN". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 2586–90. http://dx.doi.org/10.22214/ijraset.2023.52182.
Pełny tekst źródłaShyla i Vishal Bhatnagar. "Comprehensive Examination of Network Intrusion Detection Models on Data Science". International Journal of Information Retrieval Research 11, nr 4 (październik 2021): 14–40. http://dx.doi.org/10.4018/ijirr.2021100102.
Pełny tekst źródłaIqbal, Nafees, Syed Abid Ali, Iqra Munir, Saima Khan, Khurshid Ayub, Mariya al-Rashida, Muhammad Islam, Zahid Shafiq, Ralf Ludwig i Abdul Hameed. "Acridinedione as selective flouride ion chemosensor: a detailed spectroscopic and quantum mechanical investigation". RSC Advances 8, nr 4 (2018): 1993–2003. http://dx.doi.org/10.1039/c7ra11974g.
Pełny tekst źródłaRamotsoela, Daniel T., Gerhard P. Hancke i Adnan M. Abu-Mahfouz. "Practical Challenges of Attack Detection in Microgrids Using Machine Learning". Journal of Sensor and Actuator Networks 12, nr 1 (18.01.2023): 7. http://dx.doi.org/10.3390/jsan12010007.
Pełny tekst źródłaHuang, Hsin Haou, i Chun Kun Chiang. "Damage Localization in Plate Structures Based on Baseline-Free Method of Lamb Wave Using Mobile Transducer Set". Key Engineering Materials 970 (15.12.2023): 119–23. http://dx.doi.org/10.4028/p-kvttx1.
Pełny tekst źródłaAlKhonaini, Arwa, Tarek Sheltami, Ashraf Mahmoud i Muhammad Imam. "UAV Detection Using Reinforcement Learning". Sensors 24, nr 6 (14.03.2024): 1870. http://dx.doi.org/10.3390/s24061870.
Pełny tekst źródłaC, Saranya, Santosh Kumar, Lokesh S i Ram Ratan. "Spam Detection on Social Media Platform". International Journal of Innovative Research in Advanced Engineering 10, nr 06 (23.06.2023): 355–61. http://dx.doi.org/10.26562/ijirae.2023.v1006.20.
Pełny tekst źródłaWang, Zhen Qi, i Dan Kai Zhang. "HIDS and NIDS Hybrid Intrusion Detection System Model Design". Advanced Engineering Forum 6-7 (wrzesień 2012): 991–94. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.991.
Pełny tekst źródłaVanjari, Prof S. P., Priyanka Rekhawar, Ketki Shinde, Sakshi Shinde i Prajkta Shelke. "Fraud Apps Detection Using Sentiment Analysis and Spam Filtering". International Journal for Research in Applied Science and Engineering Technology 11, nr 3 (31.03.2023): 1975–77. http://dx.doi.org/10.22214/ijraset.2023.49724.
Pełny tekst źródłaBhaskar, Navaneeth, Priyanka Tupe-Waghmare, Shobha S. Nikam i Rakhi Khedkar. "Computer-aided automated detection of kidney disease using supervised learning technique". International Journal of Electrical and Computer Engineering (IJECE) 13, nr 5 (1.10.2023): 5932. http://dx.doi.org/10.11591/ijece.v13i5.pp5932-5941.
Pełny tekst źródłaLiang, Chao, Bharanidharan Shanmugam, Sami Azam, Asif Karim, Ashraful Islam, Mazdak Zamani, Sanaz Kavianpour i Norbik Bashah Idris. "Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems". Electronics 9, nr 7 (10.07.2020): 1120. http://dx.doi.org/10.3390/electronics9071120.
Pełny tekst źródłaZhang, Huaizu, Chengbin Xia, Guangfu Feng i Jun Fang. "Hospitals and Laboratories on Paper-Based Sensors: A Mini Review". Sensors 21, nr 18 (7.09.2021): 5998. http://dx.doi.org/10.3390/s21185998.
Pełny tekst źródłaFang, Tianqi, Xuanyu He i Lizhe Xu. "Pulmonary inflammation region detection algorithms based on deep learning: a review". Highlights in Science, Engineering and Technology 4 (26.07.2022): 273–79. http://dx.doi.org/10.54097/hset.v4i.914.
Pełny tekst źródłaCao, Gaofeng, Huan Zhang, Jianbo Zheng, Li Kuang i Yu Duan. "An Outlier Degree Shilling Attack Detection Algorithm Based on Dynamic Feature Selection". International Journal of Software Engineering and Knowledge Engineering 29, nr 08 (sierpień 2019): 1159–78. http://dx.doi.org/10.1142/s0218194019500360.
Pełny tekst źródłaSingh, Raman, Harish Kumar, Ravinder Kumar Singla i Ramachandran Ramkumar Ketti. "Internet attacks and intrusion detection system". Online Information Review 41, nr 2 (10.04.2017): 171–84. http://dx.doi.org/10.1108/oir-12-2015-0394.
Pełny tekst źródłaMasand, Abhishek, Suryansh Chauhan i Tarun Jain. "Depression Identification Through Tweet Clusters". International Journal of Software Innovation 10, nr 1 (styczeń 2022): 1–14. http://dx.doi.org/10.4018/ijsi.297916.
Pełny tekst źródłaWang, Benyou, i Li Gu. "Detection of Network Intrusion Threat Based on the Probabilistic Neural Network Model". Information Technology and Control 48, nr 4 (18.12.2019): 618–25. http://dx.doi.org/10.5755/j01.itc.48.4.24036.
Pełny tekst źródłaRevathy, S., i S. Sathya Priya. "Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods". International Journal on Recent and Innovation Trends in Computing and Communication 11, nr 4s (3.04.2023): 156–60. http://dx.doi.org/10.17762/ijritcc.v11i4s.6322.
Pełny tekst źródłaSharma, Divyeh. "Facial Landmark Detection with Sentiment Recognition". International Journal for Research in Applied Science and Engineering Technology 10, nr 6 (30.06.2022): 3488–92. http://dx.doi.org/10.22214/ijraset.2022.44687.
Pełny tekst źródłaAmirul Asyraf Zhahir, Siti Munirah Mohd, Mohd Ilias M Shuhud, Bahari Idrus, Hishamuddin Zainuddin, Nurhidaya Mohamad Jan i Mohamed Ridza Wahiddin. "Entanglement Detection: A Scoping Review". Journal of Advanced Research in Applied Sciences and Engineering Technology 42, nr 2 (3.04.2024): 209–20. http://dx.doi.org/10.37934/araset.42.2.209220.
Pełny tekst źródłaMuise, Christian. "Characterizing and Computing All Delete-Relaxed Dead-ends". Inteligencia Artificial 21, nr 62 (18.09.2018): 67. http://dx.doi.org/10.4114/intartif.vol21iss62pp67-74.
Pełny tekst źródłaBura, Deepa, Amit Choudhary i Rakesh Kumar Singh. "A Novel UML Based Approach for Early Detection of Change Prone Classes". International Journal of Open Source Software and Processes 8, nr 3 (lipiec 2017): 1–23. http://dx.doi.org/10.4018/ijossp.2017070101.
Pełny tekst źródłaM, Senthil Raja, Arun Raj L i Arun A. "Detection of Depression among Social Media Users with Machine Learning". Webology 19, nr 1 (20.01.2022): 250–57. http://dx.doi.org/10.14704/web/v19i1/web19019.
Pełny tekst źródłaSharma, Sandeep, Prachi ., Rita Chhikara i Kavita Khanna. "An efficient Android malware detection method using Borutashap algorithm". International Journal of Experimental Research and Review 34, Special Vo (30.10.2023): 86–96. http://dx.doi.org/10.52756/ijerr.2023.v34spl.009.
Pełny tekst źródłaMazri, Ammar, i Merouane Mehdi. "A NEW APPROACH TO DETECT P2P TRAFFIC BASED ON SIGNATURES ANALYSIS". RECIMA21 - Revista Científica Multidisciplinar - ISSN 2675-6218 5, nr 3 (6.03.2024): e534994. http://dx.doi.org/10.47820/recima21.v5i3.4994.
Pełny tekst źródłaNashikkar, Siddharth. "Social Network Mental Disorders Detection". International Journal for Research in Applied Science and Engineering Technology 11, nr 9 (30.09.2023): 1683–92. http://dx.doi.org/10.22214/ijraset.2023.55901.
Pełny tekst źródłaMitbavkar, Tejashri, Swarangi Pedamkar, Saloni Kuvalekar i Prof Kumud Wasnik. "Fake Product Detection Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 11, nr 4 (30.04.2023): 1879–85. http://dx.doi.org/10.22214/ijraset.2023.50409.
Pełny tekst źródłaRohankar, A. W., Shantanu Pathak, Mrinal K. Naskar i Amitava Mukherjee. "Audio Streaming with Silence Detection Using 802.15.4 Radios". ISRN Sensor Networks 2012 (10.12.2012): 1–5. http://dx.doi.org/10.5402/2012/590651.
Pełny tekst źródłaAzrour, Mourade, Mohammed Ouanan i Yousef Farhaoui. "Survey of Detection SIP Malformed Messages". Indonesian Journal of Electrical Engineering and Computer Science 7, nr 2 (1.08.2017): 457. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp457-465.
Pełny tekst źródłaTimokhin, Stanislav, Mohammad Sadrani i Constantinos Antoniou. "Predicting Venue Popularity Using Crowd-Sourced and Passive Sensor Data". Smart Cities 3, nr 3 (6.08.2020): 818–41. http://dx.doi.org/10.3390/smartcities3030042.
Pełny tekst źródłaZhang, Yuxing, Jinchen Song, Yuehan Jiang i Hongjun Li. "Online Video Anomaly Detection". Sensors 23, nr 17 (26.08.2023): 7442. http://dx.doi.org/10.3390/s23177442.
Pełny tekst źródłaMohamed Elmahalwy, Amina, Hayam M. Mousa i Khalid M. Amin. "New hybrid ensemble method for anomaly detection in data science". International Journal of Electrical and Computer Engineering (IJECE) 13, nr 3 (1.06.2023): 3498. http://dx.doi.org/10.11591/ijece.v13i3.pp3498-3508.
Pełny tekst źródłaWahab, Abbas A., N. Fatimah Abdullah i M. A. H. Rasid. "Mechanical Fault Detection on Electrical Machine: Thermal Analysis of Small Brushed DC Motor with Faulty Bearing". MATEC Web of Conferences 225 (2018): 05012. http://dx.doi.org/10.1051/matecconf/201822505012.
Pełny tekst źródłaM. P, Milan. "CHALLENGES IN FACE RECOGNITION TECHNIQUE". Journal of University of Shanghai for Science and Technology 23, nr 07 (24.07.2021): 1201–4. http://dx.doi.org/10.51201/jusst/21/07253.
Pełny tekst źródłaSingh, Archana, i Rakesh Kumar. "Machine Learning and Deep Learning Approaches for detecting Alzheimer’s Disease (AD): A Review". International Journal of Engineering Research in Computer Science and Engineering 9, nr 7 (21.07.2022): 63–68. http://dx.doi.org/10.36647/ijercse/09.07.art014.
Pełny tekst źródłaMarazqah Btoush, Eyad Abdel Latif, Xujuan Zhou, Raj Gururajan, Ka Ching Chan, Rohan Genrich i Prema Sankaran. "A systematic review of literature on credit card cyber fraud detection using machine and deep learning". PeerJ Computer Science 9 (17.04.2023): e1278. http://dx.doi.org/10.7717/peerj-cs.1278.
Pełny tekst źródła