Artigos de revistas sobre o tema "Popularity detection"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Popularity detection".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Zhang, Xiaoming, Xiaoming Chen, Yan Chen, Senzhang Wang, Zhoujun Li e Jiali Xia. "Event detection and popularity prediction in microblogging". Neurocomputing 149 (fevereiro de 2015): 1469–80. http://dx.doi.org/10.1016/j.neucom.2014.08.045.
Texto completo da fonteNN, Mrs Deepti. "D-SCAN : DEPRESSION DETECTION". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (23 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem31462.
Texto completo da fonteMiao, Zhongchen, Kai Chen, Yi Fang, Jianhua He, Yi Zhou, Wenjun Zhang e Hongyuan Zha. "Cost-Effective Online Trending Topic Detection and Popularity Prediction in Microblogging". ACM Transactions on Information Systems 35, n.º 3 (9 de junho de 2017): 1–36. http://dx.doi.org/10.1145/3001833.
Texto completo da fonteWolcott, M. J. "Advances in nucleic acid-based detection methods." Clinical Microbiology Reviews 5, n.º 4 (outubro de 1992): 370–86. http://dx.doi.org/10.1128/cmr.5.4.370.
Texto completo da fonteHao, Yaojun, Peng Zhang e Fuzhi Zhang. "Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems". Security and Communication Networks 2018 (11 de outubro de 2018): 1–33. http://dx.doi.org/10.1155/2018/8174603.
Texto completo da fonteSkaperas, Sotiris, Lefteris Mamatas e Arsenia Chorti. "Real-Time Video Content Popularity Detection Based on Mean Change Point Analysis". IEEE Access 7 (2019): 142246–60. http://dx.doi.org/10.1109/access.2019.2940816.
Texto completo da fonteSingha, Subroto, e Burchan Aydin. "Automated Drone Detection Using YOLOv4". Drones 5, n.º 3 (11 de setembro de 2021): 95. http://dx.doi.org/10.3390/drones5030095.
Texto completo da fonteMadana Mohana, R., Paramjeet Singh, Vishal Kumar e Sohail Shariff. "Brutality detection and rendering of brutal frames". MATEC Web of Conferences 392 (2024): 01072. http://dx.doi.org/10.1051/matecconf/202439201072.
Texto completo da fonteSatwik, Pallerla. "Hate Speech Detection". International Journal for Research in Applied Science and Engineering Technology 12, n.º 3 (31 de março de 2024): 1646–49. http://dx.doi.org/10.22214/ijraset.2024.59053.
Texto completo da fontePatil, Vaibhavi, Sakshi Patil, Krishna Ganjegi e Pallavi Chandratre. "Face and Eye Detection for Interpreting Malpractices in Examination Hall". International Journal for Research in Applied Science and Engineering Technology 10, n.º 4 (30 de abril de 2022): 1119–23. http://dx.doi.org/10.22214/ijraset.2022.41456.
Texto completo da fonteThanvanthri, Srinedhi, e Shivani Ramakrishnan. "Performance of Text Classification Methods in Detection of Hate Speech in Media". International Journal for Research in Applied Science and Engineering Technology 10, n.º 3 (31 de março de 2022): 354–58. http://dx.doi.org/10.22214/ijraset.2022.40567.
Texto completo da fonteHaimovich, Daniel, Dima Karamshuk, Thomas J. Leeper, Evgeniy Riabenko e Milan Vojnovic. "Popularity prediction for social media over arbitrary time horizons". Proceedings of the VLDB Endowment 15, n.º 4 (dezembro de 2021): 841–49. http://dx.doi.org/10.14778/3503585.3503593.
Texto completo da fontePattanaik, Debasish, Sarat Chandra Swain, Indu Sekhar Samanta, Ritesh Dash e Kunjabihari Swain. "Power Quality Disturbance Detection and Monitoring of Solar Integrated Micro-Grid". WSEAS TRANSACTIONS ON POWER SYSTEMS 17 (6 de outubro de 2022): 306–15. http://dx.doi.org/10.37394/232016.2022.17.31.
Texto completo da fonteLiu, Xiao, Wenjun Wang, Dongxiao He, Pengfei Jiao, Di Jin e Carlo Vittorio Cannistraci. "Semi-supervised community detection based on non-negative matrix factorization with node popularity". Information Sciences 381 (março de 2017): 304–21. http://dx.doi.org/10.1016/j.ins.2016.11.028.
Texto completo da fonteShaheer, Rizana, e Malu U. "Real-Time Video Violence Detection Using CNN". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de maio de 2023): 2586–90. http://dx.doi.org/10.22214/ijraset.2023.52182.
Texto completo da fonteShyla e Vishal Bhatnagar. "Comprehensive Examination of Network Intrusion Detection Models on Data Science". International Journal of Information Retrieval Research 11, n.º 4 (outubro de 2021): 14–40. http://dx.doi.org/10.4018/ijirr.2021100102.
Texto completo da fonteIqbal, Nafees, Syed Abid Ali, Iqra Munir, Saima Khan, Khurshid Ayub, Mariya al-Rashida, Muhammad Islam, Zahid Shafiq, Ralf Ludwig e Abdul Hameed. "Acridinedione as selective flouride ion chemosensor: a detailed spectroscopic and quantum mechanical investigation". RSC Advances 8, n.º 4 (2018): 1993–2003. http://dx.doi.org/10.1039/c7ra11974g.
Texto completo da fonteRamotsoela, Daniel T., Gerhard P. Hancke e Adnan M. Abu-Mahfouz. "Practical Challenges of Attack Detection in Microgrids Using Machine Learning". Journal of Sensor and Actuator Networks 12, n.º 1 (18 de janeiro de 2023): 7. http://dx.doi.org/10.3390/jsan12010007.
Texto completo da fonteHuang, Hsin Haou, e Chun Kun Chiang. "Damage Localization in Plate Structures Based on Baseline-Free Method of Lamb Wave Using Mobile Transducer Set". Key Engineering Materials 970 (15 de dezembro de 2023): 119–23. http://dx.doi.org/10.4028/p-kvttx1.
Texto completo da fonteAlKhonaini, Arwa, Tarek Sheltami, Ashraf Mahmoud e Muhammad Imam. "UAV Detection Using Reinforcement Learning". Sensors 24, n.º 6 (14 de março de 2024): 1870. http://dx.doi.org/10.3390/s24061870.
Texto completo da fonteC, Saranya, Santosh Kumar, Lokesh S e Ram Ratan. "Spam Detection on Social Media Platform". International Journal of Innovative Research in Advanced Engineering 10, n.º 06 (23 de junho de 2023): 355–61. http://dx.doi.org/10.26562/ijirae.2023.v1006.20.
Texto completo da fonteWang, Zhen Qi, e Dan Kai Zhang. "HIDS and NIDS Hybrid Intrusion Detection System Model Design". Advanced Engineering Forum 6-7 (setembro de 2012): 991–94. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.991.
Texto completo da fonteVanjari, Prof S. P., Priyanka Rekhawar, Ketki Shinde, Sakshi Shinde e Prajkta Shelke. "Fraud Apps Detection Using Sentiment Analysis and Spam Filtering". International Journal for Research in Applied Science and Engineering Technology 11, n.º 3 (31 de março de 2023): 1975–77. http://dx.doi.org/10.22214/ijraset.2023.49724.
Texto completo da fonteBhaskar, Navaneeth, Priyanka Tupe-Waghmare, Shobha S. Nikam e Rakhi Khedkar. "Computer-aided automated detection of kidney disease using supervised learning technique". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 5 (1 de outubro de 2023): 5932. http://dx.doi.org/10.11591/ijece.v13i5.pp5932-5941.
Texto completo da fonteLiang, Chao, Bharanidharan Shanmugam, Sami Azam, Asif Karim, Ashraful Islam, Mazdak Zamani, Sanaz Kavianpour e Norbik Bashah Idris. "Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems". Electronics 9, n.º 7 (10 de julho de 2020): 1120. http://dx.doi.org/10.3390/electronics9071120.
Texto completo da fonteZhang, Huaizu, Chengbin Xia, Guangfu Feng e Jun Fang. "Hospitals and Laboratories on Paper-Based Sensors: A Mini Review". Sensors 21, n.º 18 (7 de setembro de 2021): 5998. http://dx.doi.org/10.3390/s21185998.
Texto completo da fonteFang, Tianqi, Xuanyu He e Lizhe Xu. "Pulmonary inflammation region detection algorithms based on deep learning: a review". Highlights in Science, Engineering and Technology 4 (26 de julho de 2022): 273–79. http://dx.doi.org/10.54097/hset.v4i.914.
Texto completo da fonteCao, Gaofeng, Huan Zhang, Jianbo Zheng, Li Kuang e Yu Duan. "An Outlier Degree Shilling Attack Detection Algorithm Based on Dynamic Feature Selection". International Journal of Software Engineering and Knowledge Engineering 29, n.º 08 (agosto de 2019): 1159–78. http://dx.doi.org/10.1142/s0218194019500360.
Texto completo da fonteSingh, Raman, Harish Kumar, Ravinder Kumar Singla e Ramachandran Ramkumar Ketti. "Internet attacks and intrusion detection system". Online Information Review 41, n.º 2 (10 de abril de 2017): 171–84. http://dx.doi.org/10.1108/oir-12-2015-0394.
Texto completo da fonteMasand, Abhishek, Suryansh Chauhan e Tarun Jain. "Depression Identification Through Tweet Clusters". International Journal of Software Innovation 10, n.º 1 (janeiro de 2022): 1–14. http://dx.doi.org/10.4018/ijsi.297916.
Texto completo da fonteWang, Benyou, e Li Gu. "Detection of Network Intrusion Threat Based on the Probabilistic Neural Network Model". Information Technology and Control 48, n.º 4 (18 de dezembro de 2019): 618–25. http://dx.doi.org/10.5755/j01.itc.48.4.24036.
Texto completo da fonteRevathy, S., e S. Sathya Priya. "Enhancing the Efficiency of Attack Detection System Using Feature selection and Feature Discretization Methods". International Journal on Recent and Innovation Trends in Computing and Communication 11, n.º 4s (3 de abril de 2023): 156–60. http://dx.doi.org/10.17762/ijritcc.v11i4s.6322.
Texto completo da fonteSharma, Divyeh. "Facial Landmark Detection with Sentiment Recognition". International Journal for Research in Applied Science and Engineering Technology 10, n.º 6 (30 de junho de 2022): 3488–92. http://dx.doi.org/10.22214/ijraset.2022.44687.
Texto completo da fonteAmirul Asyraf Zhahir, Siti Munirah Mohd, Mohd Ilias M Shuhud, Bahari Idrus, Hishamuddin Zainuddin, Nurhidaya Mohamad Jan e Mohamed Ridza Wahiddin. "Entanglement Detection: A Scoping Review". Journal of Advanced Research in Applied Sciences and Engineering Technology 42, n.º 2 (3 de abril de 2024): 209–20. http://dx.doi.org/10.37934/araset.42.2.209220.
Texto completo da fonteMuise, Christian. "Characterizing and Computing All Delete-Relaxed Dead-ends". Inteligencia Artificial 21, n.º 62 (18 de setembro de 2018): 67. http://dx.doi.org/10.4114/intartif.vol21iss62pp67-74.
Texto completo da fonteBura, Deepa, Amit Choudhary e Rakesh Kumar Singh. "A Novel UML Based Approach for Early Detection of Change Prone Classes". International Journal of Open Source Software and Processes 8, n.º 3 (julho de 2017): 1–23. http://dx.doi.org/10.4018/ijossp.2017070101.
Texto completo da fonteM, Senthil Raja, Arun Raj L e Arun A. "Detection of Depression among Social Media Users with Machine Learning". Webology 19, n.º 1 (20 de janeiro de 2022): 250–57. http://dx.doi.org/10.14704/web/v19i1/web19019.
Texto completo da fonteSharma, Sandeep, Prachi ., Rita Chhikara e Kavita Khanna. "An efficient Android malware detection method using Borutashap algorithm". International Journal of Experimental Research and Review 34, Special Vo (30 de outubro de 2023): 86–96. http://dx.doi.org/10.52756/ijerr.2023.v34spl.009.
Texto completo da fonteMazri, Ammar, e Merouane Mehdi. "A NEW APPROACH TO DETECT P2P TRAFFIC BASED ON SIGNATURES ANALYSIS". RECIMA21 - Revista Científica Multidisciplinar - ISSN 2675-6218 5, n.º 3 (6 de março de 2024): e534994. http://dx.doi.org/10.47820/recima21.v5i3.4994.
Texto completo da fonteNashikkar, Siddharth. "Social Network Mental Disorders Detection". International Journal for Research in Applied Science and Engineering Technology 11, n.º 9 (30 de setembro de 2023): 1683–92. http://dx.doi.org/10.22214/ijraset.2023.55901.
Texto completo da fonteMitbavkar, Tejashri, Swarangi Pedamkar, Saloni Kuvalekar e Prof Kumud Wasnik. "Fake Product Detection Using Blockchain". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 1879–85. http://dx.doi.org/10.22214/ijraset.2023.50409.
Texto completo da fonteRohankar, A. W., Shantanu Pathak, Mrinal K. Naskar e Amitava Mukherjee. "Audio Streaming with Silence Detection Using 802.15.4 Radios". ISRN Sensor Networks 2012 (10 de dezembro de 2012): 1–5. http://dx.doi.org/10.5402/2012/590651.
Texto completo da fonteAzrour, Mourade, Mohammed Ouanan e Yousef Farhaoui. "Survey of Detection SIP Malformed Messages". Indonesian Journal of Electrical Engineering and Computer Science 7, n.º 2 (1 de agosto de 2017): 457. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp457-465.
Texto completo da fonteTimokhin, Stanislav, Mohammad Sadrani e Constantinos Antoniou. "Predicting Venue Popularity Using Crowd-Sourced and Passive Sensor Data". Smart Cities 3, n.º 3 (6 de agosto de 2020): 818–41. http://dx.doi.org/10.3390/smartcities3030042.
Texto completo da fonteZhang, Yuxing, Jinchen Song, Yuehan Jiang e Hongjun Li. "Online Video Anomaly Detection". Sensors 23, n.º 17 (26 de agosto de 2023): 7442. http://dx.doi.org/10.3390/s23177442.
Texto completo da fonteMohamed Elmahalwy, Amina, Hayam M. Mousa e Khalid M. Amin. "New hybrid ensemble method for anomaly detection in data science". International Journal of Electrical and Computer Engineering (IJECE) 13, n.º 3 (1 de junho de 2023): 3498. http://dx.doi.org/10.11591/ijece.v13i3.pp3498-3508.
Texto completo da fonteWahab, Abbas A., N. Fatimah Abdullah e M. A. H. Rasid. "Mechanical Fault Detection on Electrical Machine: Thermal Analysis of Small Brushed DC Motor with Faulty Bearing". MATEC Web of Conferences 225 (2018): 05012. http://dx.doi.org/10.1051/matecconf/201822505012.
Texto completo da fonteM. P, Milan. "CHALLENGES IN FACE RECOGNITION TECHNIQUE". Journal of University of Shanghai for Science and Technology 23, n.º 07 (24 de julho de 2021): 1201–4. http://dx.doi.org/10.51201/jusst/21/07253.
Texto completo da fonteSingh, Archana, e Rakesh Kumar. "Machine Learning and Deep Learning Approaches for detecting Alzheimer’s Disease (AD): A Review". International Journal of Engineering Research in Computer Science and Engineering 9, n.º 7 (21 de julho de 2022): 63–68. http://dx.doi.org/10.36647/ijercse/09.07.art014.
Texto completo da fonteMarazqah Btoush, Eyad Abdel Latif, Xujuan Zhou, Raj Gururajan, Ka Ching Chan, Rohan Genrich e Prema Sankaran. "A systematic review of literature on credit card cyber fraud detection using machine and deep learning". PeerJ Computer Science 9 (17 de abril de 2023): e1278. http://dx.doi.org/10.7717/peerj-cs.1278.
Texto completo da fonte