標(biāo)題: Titlebook: Intelligent Data Engineering and Automated Learning – IDEAL 2018; 19th International C Hujun Yin,David Camacho,Antonio J. Tallón-Balleste C [打印本頁] 作者: 使醉 時間: 2025-3-21 18:16
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018影響因子(影響力)
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018影響因子(影響力)學(xué)科排名
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018網(wǎng)絡(luò)公開度
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018被引頻次
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018被引頻次學(xué)科排名
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018年度引用
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018年度引用學(xué)科排名
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018讀者反饋
書目名稱Intelligent Data Engineering and Automated Learning – IDEAL 2018讀者反饋學(xué)科排名
作者: Cognizance 時間: 2025-3-21 21:06 作者: 狂熱語言 時間: 2025-3-22 03:44 作者: 充滿裝飾 時間: 2025-3-22 06:23
Wolfgang Koehler,Yanguo Jing: das seiner Gr??e nach bei jeder Tourenstufe ann?hernd konstante, synchron umlaufende Drehfeld kann von einer gesonderten Erregerwicklung erzeugt werden, die dann naturgem?? nur den Erregerstrom zu führen hat, oder die transformatorische Wechselwirkung zwischen Stator und Rotor kann dazu benutzt we作者: 杠桿 時間: 2025-3-22 10:03
S?awomir Nowaczyk,Anita Sant’Anna,Ece Calikus,Yuantao Fan: das seiner Gr??e nach bei jeder Tourenstufe ann?hernd konstante, synchron umlaufende Drehfeld kann von einer gesonderten Erregerwicklung erzeugt werden, die dann naturgem?? nur den Erregerstrom zu führen hat, oder die transformatorische Wechselwirkung zwischen Stator und Rotor kann dazu benutzt we作者: 疏遠(yuǎn)天際 時間: 2025-3-22 14:04
Martin Atzmueller,Benjamin Kloepperens. Was die Zusammenfassung dieser Linien ergibt, das ist vielmehr Struktur; Gegenstand der Untersuchung ist die Struktur des gerichtlichen Verfahrens als eines Rechtsanwendungsprozesses. Die gerichtliche Entscheidung wird als Erkenntnis, der Proze? als das auf die Erlangung dieser Erkenntnis geric作者: 鉗子 時間: 2025-3-22 17:04 作者: reptile 時間: 2025-3-22 23:23 作者: Ingrained 時間: 2025-3-23 05:01
Ontology Uses for Radicalisation Detection on Social Networksizing and recruiting them to commit violent acts of terrorism. Fortunately, radicalization on social networks has warning signals and indicators that can be detected at the early stages of the radicalization process. In this paper, we explore the use of the semantic web and domain ontologies to auto作者: Androgen 時間: 2025-3-23 08:18
Measuring Extremism: Validating an Alt-Right Twitter Accounts Datasetolitical groups attempting to gain influence. Among these groups is the alt-right; a modern far-right extremist movement that gained notoriety in the 2016 US presidential election and the infamous Charlottesville Unite the Right rally. This article details the process used to create a database on Tw作者: 宇宙你 時間: 2025-3-23 13:07
RiskTrack: Assessing the Risk of Jihadi Radicalization on Twitter Using Linguistic Factorsisk of Jihadi radicalization of an individual (or a group of people). To determine the risk of radicalization of an individual, it uses information extracted from its Twitter account. Specifically, the tool uses a combination of linguistic factors to establish a risk value, in order to help the anal作者: PON 時間: 2025-3-23 16:42 作者: nephritis 時間: 2025-3-23 19:27
Automated, Nomenclature Based Data Point Selection for Industrial Event Log GenerationPLCs to an upper system. Not only does this require programmers’ efforts to collect and provide the data, but it is also prone to errors or even intentional manipulation. External monitoring, is available through Open Platform Communication (OPC), but it is time consuming to set up and requires expe作者: prostate-gland 時間: 2025-3-23 22:54
Monitoring Equipment Operation Through Model and Event Discoverying productivity requires autonomous methods that work without extensive human supervision. One way to automatically detect deviating operation is to identify groups of peers, or similar systems, and evaluate how well each individual conforms with the group..We propose a monitoring approach that can作者: eucalyptus 時間: 2025-3-24 06:10
Creation of an Event Log from a Low-Level Machinery Monitoring System for Process Mining Purposes.e. process mining). Such a structure should contain three main elements for process analysis, namely: timestamp of activity, activity name and case id..In this paper we present example data from a low-level machinery monitoring system used in underground mine, which can be used for the modelling an作者: diabetes 時間: 2025-3-24 10:05 作者: 晚來的提名 時間: 2025-3-24 14:31 作者: BIDE 時間: 2025-3-24 15:04
A Taxonomy for Combining Activity Recognition and Process Discovery in Industrial Environments importance. Retaining this knowledge by formally capturing it is a challenge for industrial organisations. This paper explores research on automatically capturing this knowledge by using methods from activity recognition and process mining on data obtained from sensorised workers and environments. 作者: Blazon 時間: 2025-3-24 21:30 作者: 裝入膠囊 時間: 2025-3-25 01:24 作者: Colonoscopy 時間: 2025-3-25 04:46 作者: corporate 時間: 2025-3-25 11:00 作者: CHARM 時間: 2025-3-25 15:10
Constructing Bibliometric Networks from Spanish Doctoral Theses interaction between the participants of the network. In this contribution we have built a fairly large bibliometric network based on data from Spanish doctoral theses. Specifically, we have used the data of each theses defense committee to build the network with its members and we have conducted a 作者: 楓樹 時間: 2025-3-25 16:30 作者: 精確 時間: 2025-3-25 22:50
Measuring Extremism: Validating an Alt-Right Twitter Accounts Datasetd using a scoring method created for this process, in order to eliminate any accounts that were not supportive of the alt-right. Finally, a total amount of 422 accounts were found to belong to followers of this extremist movement, with a total amount of 123.295 tweets.作者: JAMB 時間: 2025-3-26 03:43 作者: 按時間順序 時間: 2025-3-26 05:20 作者: 拱形面包 時間: 2025-3-26 10:20
Bibliometric Network Analysis to Identify the Intellectual Structure and Evolution of the Big Data Rtries and research themes that are directly related to Big Data. Finally, a science map is developed to understand the evolution of the intellectual structure and the main research themes related to Big Data.作者: Accomplish 時間: 2025-3-26 12:52 作者: LAIR 時間: 2025-3-26 16:52 作者: fetter 時間: 2025-3-26 21:29 作者: abduction 時間: 2025-3-27 03:46 作者: 同來核對 時間: 2025-3-27 09:14 作者: Coronation 時間: 2025-3-27 10:19 作者: 胰島素 時間: 2025-3-27 16:13 作者: 兇兆 時間: 2025-3-27 19:12
Martin Atzmueller,Benjamin Kloepper KLUG schulde ich herzlichen Dank; er hat mir den Ansto? zur Anwendung der mathematischen Logik gegeben und mir in gro?zügiger Weise Gelegenheit zu eigener Forschung geboten. Herrn Prof. Dr. F. RITTNER bin ich vor allem verpflichtet, was den zivil- rechtlichen Einschlag der Arbeit betrifft. Das Interesse am V978-3-642-65599-9978-3-642-65598-2作者: Enervate 時間: 2025-3-27 23:45
KLUG schulde ich herzlichen Dank; er hat mir den Ansto? zur Anwendung der mathematischen Logik gegeben und mir in gro?zügiger Weise Gelegenheit zu eigener Forschung geboten. Herrn Prof. Dr. F. RITTNER bin ich vor allem verpflichtet, was den zivil- rechtlichen Einschlag der Arbeit betrifft. Das Interesse am V978-3-642-65599-9978-3-642-65598-2作者: 性上癮 時間: 2025-3-28 02:39
P. García-Sánchez,M. J. Cobon organisieren (in gegenw?rtigen Gesellschaften sind dies vor allem die Aktivit?ten des Staates); zweitens im formalen Rechtssystem; drittens auf dem kapitalistischen Markt. Eines der wichtigsten Mittel externer Kontrolle, gleich ob im Hinblick auf die Beherrschung der Natur oder anderer Nationen, a作者: craving 時間: 2025-3-28 07:57
Mahmoud Barhamgi,Raúl Lara-Cabrera,Djamal Benslimane,David Camacho作者: kindred 時間: 2025-3-28 10:59
Felix Mannhardt,Riccardo Bovo,Manuel Fradinho Oliveira,Simon Julier作者: Flagging 時間: 2025-3-28 16:46
Iván Ruiz-Rube,Tatiana Person,José Miguel Mota,Juan Manuel Dodero,ángel Rafael González-Toro作者: Certainty 時間: 2025-3-28 22:06 作者: Seizure 時間: 2025-3-29 00:55 作者: AGGER 時間: 2025-3-29 03:22
0302-9743 Intelligent Data Engineering and Automated Learning, IDEAL 2018, held in Madrid, Spain, in November 2018. The 125 full papers presented were carefully reviewed and selected from 204 submissions. These papers provided a timely sample of the latest advances in data engineering and automated learning,作者: Agronomy 時間: 2025-3-29 09:40 作者: 詞匯表 時間: 2025-3-29 13:21
RiskTrack: Assessing the Risk of Jihadi Radicalization on Twitter Using Linguistic Factorsalong with the way of calculating them and their contribution to the final risk value, will be presented in this paper. Also, some comments about the tool and the next updates will be suggested at the end of this paper.作者: Addictive 時間: 2025-3-29 16:46
On Detecting Online Radicalization Using Natural Language Processingnd phase, a machine learning approach based on hybrid KNN-SVM and a variety of features, which include 1, 2 and 3-g, personality traits, emotions, as well as other linguistic and network related features were employed. The approach is validated using both Twitter and Tumblr dataset.作者: 割公牛膨脹 時間: 2025-3-29 20:10 作者: Cognizance 時間: 2025-3-30 02:52 作者: Sarcoma 時間: 2025-3-30 07:51
Evidence-Based Systematic Literature Reviews in the Cloudegration with other systems, The flexible data scheme of the tool enables the integration of bibliographic databases of common use in Computer Science and can be easily extended to support additional sources. It can be used as a service in a cloud environment or as on-premises software.作者: alliance 時間: 2025-3-30 10:40 作者: neutralize 時間: 2025-3-30 14:20 作者: exostosis 時間: 2025-3-30 18:19
Ontology Uses for Radicalisation Detection on Social Networkscan be detected at the early stages of the radicalization process. In this paper, we explore the use of the semantic web and domain ontologies to automatically mine the radicalisation indicators from messages and posts on social networks.作者: 愛管閑事 時間: 2025-3-30 22:58
Causal Rules Detection in Streams of Unlabeled, Mixed Type Values with Finit Domainsern approaches either use representation that is flat in time domain, or follow black-box model paradigm. This reduces the expressiveness of models and limits the intelligibility of the system. In this paper we present an algorithm for rule discovery that allows to capture temporal causalities between numeric and symbolic attributes.作者: Alcove 時間: 2025-3-31 02:58