Identification of Technology-Relevant Entities Based on Trend Curves |
Sukhwan Jung, Rachana Reddy Kandadi, Rituparna Datta, Ryan Benton and Aviv Segev |
Volume : 10 volume number : 5 pdf |
Contextual Factors Influencing the Design and Management of Health Information Systems’ Interoperability |
Grace Kobusinge |
Volume : 10 volume number : 5 pdf |
Transcript Level Analysis Improves the Understanding of Bladder Cancer |
Xiang Ao and Shuaicheng Li |
Volume : 10 volume number : 5 pdf |
Leading DevOps Practice and Principle Adoption |
Krikor Maroukian and Stephen R. Gulliver |
Volume : 10 volume number : 5 pdf |
Communication between Coroutines on Sunway Many-core Platform |
Shaodi Li, Junmin Wu, Yi Zhang and Yawei Zhou |
Volume : 10 volume number : 5 pdf |
Linking Social Media Posts to News with Siamese Transformers |
Jacob Danovitch |
Volume : 10 volume number : 5 pdf |
Hate Speech Detection of Arabic Shorttext |
Abdullah Aref, Rana Husni Al Mahmoud, Khaled Taha and Mahmoud Al-Sharif |
Volume : 10 volume number : 5 pdf |
Topic Detection from Conversational Dialogue Corpus with Parallel Latent Dirichlet Allocation Model and Elbow Method |
Haider Khalid and Vincent Wade |
Volume : 10 volume number : 5 pdf |
Quantum Criticism: a Tagged news Corpus Analysed for Sentiment and Named Entities |
Ashwini Badgujar, Sheng Cheng, Andrew Wang, Kai Yu, Paul Intrevado and David Guy Brizan |
Volume : 10 volume number : 5 pdf |
VSMbM: A New Metric for Automatically Generated Text Summaries Evaluation |
Alaidine Ben Ayed, Ismaïl Biskri and Jean-Guy Meunier |
Volume : 10 volume number : 5 pdf |
Free-text and Structured Clinical Time Series for Patient Outcome Predictions |
Emilia Apostolova, Joe Morales, Ioannis Koutroulis and Tom Velez |
Volume : 10 volume number : 5 pdf |
A Novel Bit Allocation Algorithm in Multi-view Video |
Tao Yan, In-Ho Ra, Deyang Liu, Jiajun Hong, Jingyu Feng and Shaojie Hou |
Volume : 10 volume number : 5 pdf |
A Semi-supervised Learning Approach to Forecast CPU Usages under Peak Load in an Enterprise Environment |
Nitin Khosla and Dharmendra Sharma |
Volume : 10 volume number : 5 pdf |
Advanced Rate Control Technologies for MVC |
Tao Yan, In-Ho Ra, Na Song, Yu Youhao, Zhicheng Wu and Zhongyu Shi |
Volume : 10 volume number : 5 pdf |
Oversampling Log Messages using A Sequence Generative Adversarial Network for Anomaly Detection and Classification |
Amir Farzad and T. Aaron Gulliver |
Volume : 10 volume number : 5 pdf |
Industrial Duct Fan Maintenance Predictive Approach Based on Random Forest |
Mashael Maashi, Nujood Alwhibi, Fatima Alamr, Rehab Alzahrani, Alanoud Alhamid and Nourah Altawallah |
Volume : 10 volume number : 5 pdf |
Classification of Computer Hardware and Performance Prediction using Statistical Learning and Neural Networks |
Courtney Foots, Palash Pal, Rituparna Datta1 and Aviv Segev |
Volume : 10 volume number : 5 pdf |
Safety Helmet Detection in Industrial Environment using Deep Learning |
Ankit Kamboj and Nilesh Powar |
Volume : 10 volume number : 5 pdf |
Rate Control Based on Similarity Analysis in Multi-view Video Coding |
Tao Yan, In-Ho Ra, Deyang Liu, Deli Chen, Yu Youhao and Shaojie Hou |
Volume : 10 volume number : 5 pdf |
TPM Based Design for Enhanced Trust in SaaS Services |
Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer |
Volume : 10 volume number : 5 pdf |
Design and Hardware Implementation of A Separable Image Steganographic Scheme using Public-key Cryptosystem |
Salah Harb, M. Omair Ahmad and M.N.S Swamy |
Volume : 10 volume number : 5 pdf |
Use of an IoT Technology to Analyse the Inertial Measurement of Smart Ping-pong Paddle |
Rajeev Kanth1, Tuomas Korpi1 and Jukka Heikkonen |
Volume : 10 volume number : 5 pdf |
Multi-task Knowledge Distillation with Rhythm Features for Speaker Verification |
Ruyun Li, Peng Ouyang, Dandan Song and Shaojun Wei |
Volume : 10 volume number : 5 pdf |
An Automatic Detection of Fundamental Postures in Vietnamese Traditional Dances |
Ngan-Khanh Chau and Truong-Thanh Ma |
Volume : 10 volume number : 5 pdf |
Performance Analysis of AODV, DSDV and ZRP Routing Protocols for Wireless Sensor Networks using NS2 Tool |
Faïza Tabbana |
Volume : 10 volume number : 5 pdf |