派博傳思國際中心

標題: Titlebook: Computational Data and Social Networks; 11th International C Thang N. Dinh,Minming Li Conference proceedings 2023 The Editor(s) (if applica [打印本頁]

作者: invoke    時間: 2025-3-21 19:58
書目名稱Computational Data and Social Networks影響因子(影響力)




書目名稱Computational Data and Social Networks影響因子(影響力)學科排名




書目名稱Computational Data and Social Networks網(wǎng)絡公開度




書目名稱Computational Data and Social Networks網(wǎng)絡公開度學科排名




書目名稱Computational Data and Social Networks被引頻次




書目名稱Computational Data and Social Networks被引頻次學科排名




書目名稱Computational Data and Social Networks年度引用




書目名稱Computational Data and Social Networks年度引用學科排名




書目名稱Computational Data and Social Networks讀者反饋




書目名稱Computational Data and Social Networks讀者反饋學科排名





作者: Albinism    時間: 2025-3-21 20:59

作者: 狂熱語言    時間: 2025-3-22 03:20

作者: OREX    時間: 2025-3-22 07:59
We will fight them on the Beachesstance for group recommendation system. The proposed recommendation model is evaluated on the Jester5k and the MovieLens datasets. The experiment result shows the feasibility of applying the potential energy for the group recommendation problems.
作者: 語源學    時間: 2025-3-22 10:07
Carl Friedrich Graumann,Margret Wintermantelrotocol. An evaluation of the implementation is also conducted. Experimental results show that the cost of transactions decreases depending on the batch size, with the gas cost decreasing by more than 85% for a batch size of 50 transactions. Other evaluation results reveal that deposits incur the most cost and increase faster with the batch size.
作者: 迫擊炮    時間: 2025-3-22 14:24
0302-9743 held as a Virtual Event, during December 5–7, 2022.?The 17 full papers and 7 short papers included in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows:?Machine Learning and Prediction,?Security and Blockchain,?Fact-checking, Fake
作者: 迫擊炮    時間: 2025-3-22 19:03

作者: 投票    時間: 2025-3-23 00:52
We will fight them on the Beachesand the word alignment process’s performance, so the proposed strategy can be extended and applied to another low-resource language as long as there is a large bilingual corpus with a rich resource language.
作者: Crumple    時間: 2025-3-23 05:11
https://doi.org/10.1007/978-1-4612-3582-8 Results show that the degree-based attack on the global component is more effective than the classical attack on the entire network. In contrast, the classical Betweenness attack slightly outperforms the Betweenness attack on the global component. However, the latter is more efficient.
作者: 不法行為    時間: 2025-3-23 05:49
Incorporating Neighborhood Information and?Sentence Embedding Similarity into?a?Repost Prediction Mothe-art machine learning methods, e.g., Logistic Regression, K-nearest Neighbors, Gaussian Naive Bayes, Deep Neural Network, Random Forest, XGBoosting and Stacking Model to predict repost probability. We evaluate our model on real dataset Weibo to compare the performance with different features and machine learning methods.
作者: 修改    時間: 2025-3-23 10:01

作者: 尖    時間: 2025-3-23 14:51
Targeted Attack of?the?Air Transportation Network Global Component Results show that the degree-based attack on the global component is more effective than the classical attack on the entire network. In contrast, the classical Betweenness attack slightly outperforms the Betweenness attack on the global component. However, the latter is more efficient.
作者: Estrogen    時間: 2025-3-23 20:13
Conference proceedings 2023Virtual Event, during December 5–7, 2022.?The 17 full papers and 7 short papers included in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows:?Machine Learning and Prediction,?Security and Blockchain,?Fact-checking, Fake News, and
作者: BARGE    時間: 2025-3-24 00:43
We will fight them on the Beachesve experiments are conducted on thirteen real networks originating from diverse domains. The experimental results indicate that the proposed index improves the prediction accuracy measured by AUC and has achieved a competitive result on Precision compared to the existing state-of-the-art link prediction methods.
作者: thrombus    時間: 2025-3-24 05:26

作者: 吊胃口    時間: 2025-3-24 07:06

作者: 共和國    時間: 2025-3-24 11:32

作者: Graphite    時間: 2025-3-24 17:18
Link Prediction of?Complex Networks Based on?Local Path and?Closeness Centralityve experiments are conducted on thirteen real networks originating from diverse domains. The experimental results indicate that the proposed index improves the prediction accuracy measured by AUC and has achieved a competitive result on Precision compared to the existing state-of-the-art link prediction methods.
作者: exhilaration    時間: 2025-3-24 21:52

作者: 卷發(fā)    時間: 2025-3-25 01:38
Do Content Management Systems Impact the?Security of?Free Content Websites? Moreover, we find that, despite the significant number of custom code websites, the use of CMS’s is pervasive, with varying trends across types and categories. Finally, we find that even a small number of unpatched vulnerabilities in popular CMS’s could be a potential cause for significant maliciousness.
作者: 教義    時間: 2025-3-25 04:16

作者: 美麗的寫    時間: 2025-3-25 07:37

作者: 真繁榮    時間: 2025-3-25 14:12

作者: 叫喊    時間: 2025-3-25 18:17
Analyzing Scientometric Indicators of?Journals and?Chief Editors: A Case Study in?Artificial IntelliL) classifiers can predict the SJR and IF of journals utilizing EIC’s scholarly reputation metrics. It is observed that the comparative rankings (based on various metrics) of top AI journals do not correlate with the EiC’s scholarly achievements. The high prediction errors of ML classifiers indicate
作者: 毛細血管    時間: 2025-3-25 20:55

作者: phlegm    時間: 2025-3-26 01:00

作者: 流出    時間: 2025-3-26 06:49
BNnetXtreme: An Enhanced Methodology for?Bangla Fake News Detection Onlinee news detection introduced previously. The BNnetXtreme especially BERT Bangla base model performed with an accuracy score of 91% and an AUC score of 98%. Our proposed BNnetXtreme has been successful in improving the performance by an increase of 1.1% in accuracy score, 5.6% in precision, 1.1% in F1
作者: Parabola    時間: 2025-3-26 11:51

作者: 攀登    時間: 2025-3-26 13:17

作者: bleach    時間: 2025-3-26 19:57
Stereotypes and National Identity in Euro 96 that pro-Russia memes fall into thematic categories that seek to undermine specific elements of US and their allies’ policy and culture. Pro-Ukraine memes are far more diffuse thematically, highlighting admiration for Ukraine’s people and its leadership. Stakeholders may utilize our findings to dev
作者: Condescending    時間: 2025-3-26 23:06
https://doi.org/10.1057/9781403919465L) classifiers can predict the SJR and IF of journals utilizing EIC’s scholarly reputation metrics. It is observed that the comparative rankings (based on various metrics) of top AI journals do not correlate with the EiC’s scholarly achievements. The high prediction errors of ML classifiers indicate
作者: Outshine    時間: 2025-3-27 02:13
Stereotypes, Language and the Media: ,?the largest number of subtheories was born. For this day it is taken as the base for teaching artists. We utilize novel dataset of 3,885 paintings collected from Christie’s and Sotheby’s and find that color harmony has a little explanatory power, color complexity metrics are impact price negatively
作者: 令人作嘔    時間: 2025-3-27 05:41

作者: temperate    時間: 2025-3-27 12:29

作者: 工作    時間: 2025-3-27 16:39
V. Austel,A. T. Balaban,I. Motocwas annotated in two ways; either it condemned or condoned anti-Asian bias, and whether it was offensive or non-offensive. A rich set of features both from the text and accompanying numerical data were extracted. These features were used to train conventional machine learning and deep learning model
作者: 親愛    時間: 2025-3-27 20:04
Incorporating Neighborhood Information and?Sentence Embedding Similarity into?a?Repost Prediction Mong. Traditional methods for repost prediction can be categorized into stochastic diffusion based models and user profile or content features based machine learning models. In this paper, we propose a new framework combining user profile, content similarity and the neighborhood information around eac
作者: 移植    時間: 2025-3-28 00:40
Driving Factors of?Polarization on?Twitter During Protests Against COVID-19 Mitigation Measures in?Vinfections in Austria (particularly in Vienna). We focus on predicting users’ protest activity by leveraging machine learning methods and individual driving factors such as language features of users supporting/opposing Corona protests. For evaluation of our methods we utilize novel datasets, collec
作者: 不溶解    時間: 2025-3-28 02:46
Categorizing Memes About the?Ukraine Conflict critical for governments and similar stakeholders to identify pro-Russia memes, countering them with evidence-based information. Identifying broad meme themes is crucial for developing a targeted and strategic counter response. There are also a range of pro-Ukraine memes that bolster support for th
作者: 地名表    時間: 2025-3-28 09:10
Analyzing Scientometric Indicators of?Journals and?Chief Editors: A Case Study in?Artificial Intelli mining various scientometric data. The associations between these two types of entities are studied with respect to the top AI journals (selected based on Google Scholar ranking) and journals from various quartiles (based on Scimago quartile ranking). Three quantitative reputation metrics (i.e., ci
作者: faction    時間: 2025-3-28 14:30

作者: aristocracy    時間: 2025-3-28 16:56
The Influence of?Color on?Prices of?Abstract Paintings a painting have on its price. We construct a number of visual features in CIELAB color space measuring complexity of the painting, its points of interest using Discrete symmetry transform, segmentation-based features using Felzenszwalb segmentation and Regions adjacency graph merging, local color f
作者: 上流社會    時間: 2025-3-28 18:58

作者: Jacket    時間: 2025-3-29 02:39
Knowledge Transfer via?Word Alignment and?Its Application to?Vietnamese POS Tagging Vietnamese. Due to the development and investment in research, there is no large and high-accuracy annotated corpus. This paper proposes a transfer learning strategy to build a high-quality tagger for Vietnamese using a bilingual corpus Vietnamese-English. Particularly, We inherit the strength of a
作者: Gleason-score    時間: 2025-3-29 03:43

作者: Relinquish    時間: 2025-3-29 08:27

作者: choroid    時間: 2025-3-29 12:11
Targeted Attack of?the?Air Transportation Network Global Componentven centrality measure. Although most real-world networks exhibit a mesoscopic structure, strategies proposed in the literature do not exploit this ubiquitous property. We introduce an attack strategy based on the network component structure to overcome these drawbacks. The component structure of a
作者: 狂怒    時間: 2025-3-29 16:43
Measuring Cryptocurrency Mining in?Public Cloud Services: A Security Perspectivety in cryptocurrencies is “mining pools”, groups of cooperating cryptocurrency miners who agree to share block rewards in proportion to their contributed mining hash power. Despite the many promised benefits of cryptocurrencies, they are equally utilized for malicious activities, e.g., ransomware pa
作者: 改革運動    時間: 2025-3-29 22:28
Do Content Management Systems Impact the?Security of?Free Content Websites?1,500 websites with free and premium content, we identify their content management system (CMS) and malicious attributes. We use frequency analysis at both the aggregate and per category of content (books, games, movies, music, and software), utilizing the unpatched vulnerabilities, total vulnerabil
作者: Metastasis    時間: 2025-3-30 02:53
BNnetXtreme: An Enhanced Methodology for?Bangla Fake News Detection Onlineas there have been significant events in various cities due to unjustifiable rumors. But the overall progress in study and innovation in the detection of Bangla fake and misleading news is still not adequate in light of the prospects for policymakers in Bangladesh. In this study, an enhanced methodo
作者: 很像弓]    時間: 2025-3-30 07:37
Heuristic Gradient Optimization Approach to?Controlling Susceptibility to?Manipulation in?Online Soceir interactions with the network. Since some users have a higher propensity for disclosure than others, a one-size-fits-all technique for limiting manipulation proves insufficient. In this work, we propose a model that allows the user to adjust their online persona to limit their susceptibility to
作者: 高興去去    時間: 2025-3-30 08:40
Identifying Targeted and?Generalized Offensive Speech from?Anti-asian Social Media Conversationsondemning this jaundiced attitude. Ironically, however, the dialogue on both sides is filled with offensive and abusive language. While abusive language directed at Asians encourages violence and hate crimes against this ethnic group, the use of derogatory language to insult alternative points of vi
作者: reaching    時間: 2025-3-30 13:57

作者: 變化無常    時間: 2025-3-30 20:27

作者: 水汽    時間: 2025-3-30 21:23

作者: infantile    時間: 2025-3-31 03:45

作者: 彩色的蠟筆    時間: 2025-3-31 08:48

作者: 有發(fā)明天才    時間: 2025-3-31 12:08
https://doi.org/10.1007/978-3-319-40676-3ng. Traditional methods for repost prediction can be categorized into stochastic diffusion based models and user profile or content features based machine learning models. In this paper, we propose a new framework combining user profile, content similarity and the neighborhood information around eac
作者: 審問    時間: 2025-3-31 15:49





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
北票市| 讷河市| 灌云县| 孙吴县| 徐闻县| 右玉县| 灵宝市| 惠水县| 长治县| 桦川县| 铜陵市| 沂源县| 永康市| 邳州市| 盘山县| 凉山| 登封市| 绍兴市| 休宁县| 大关县| 滨州市| 本溪市| 正阳县| 上思县| 白山市| 德昌县| 广德县| 田阳县| 双鸭山市| 凉山| 乡宁县| 资中县| 定结县| 赤城县| 沙洋县| 龙海市| 岳西县| 永和县| 合作市| 论坛| 房山区|