Skip to main content

previous disabled Page of 7
and
  1. No Access

    Chapter and Conference Paper

    Enabling PII Discovery in Textual Data via Outlier Detection

    Discovering Personal Identifying Information (PII) in textual data is an important pre-processing step to enabling privacy preserving data analytics. One approach to PII discovery in textual data is to charact...

    Md. Rakibul Islam, Anne V. D. M. Kayem in Database and Expert Systems Applications (2023)

  2. No Access

    Chapter and Conference Paper

    A Machine Learning Supervised Model to Detect Cyber-Begging in Social Media

    The misuse of social media leads many of the users to fall into crimes that they are not aware of it especially financial ones. Recently, cyber-begging has grown significantly on social platforms, impacting us...

    Abdulrhman M. Alshareef in Emerging Technologies in Data Mining and Information Security (2023)

  3. No Access

    Chapter and Conference Paper

    A Novel Bangla Font Recognition Approach Using Deep Learning

    Font detection is an essential pre-processing step for printed character recognition. In this era of computerization and automation, computer composed documents such as official documents, bank checks, loan ap...

    Md. Majedul Islam in Emerging Technologies in Data Mining and I… (2021)

  4. No Access

    Chapter and Conference Paper

    Automatic Medicinal Plant Recognition Using Random Forest Classifier

    A fully automated technique for the acknowledgment of medicinal plants utilizing computer system vision as well as artificial intelligence strategies has existed. Leaves from 24 different medical plants specie...

    P. Siva Krishna, M. K. Mariam Bee in Emerging Technologies in Data Mining and I… (2021)

  5. No Access

    Chapter and Conference Paper

    A Global Data Pre-processing Technique for Automatic Speech Recognition

    speech recognition (ASR) is one of the major research field in computer science. ASR is one of the most necessary tools, which is required for, almost every languages. But every language has its own techn...

    Akteruzzaman, S. M Zahidul Islam in Emerging Technologies in Data Mining and I… (2021)

  6. No Access

    Chapter and Conference Paper

    A Language-Independent Speech Data Collection and Preprocessing Technique

    Virtual assistant or human-like robot has become the most attractive technology nowadays., where we badly need communication. And verbal communication is the most comfortable one. Here, it comes with the neces...

    S. M. Saiful Islam Badhon in Emerging Technologies in Data Mining and I… (2021)

  7. No Access

    Chapter and Conference Paper

    Position: GDPR Compliance by Construction

    New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...

    Malte Schwarzkopf, Eddie Kohler in Heterogeneous Data Management, Polystores,… (2019)

  8. No Access

    Chapter and Conference Paper

    An Experimental Evaluation of BFT Protocols for Blockchains

    Byzantine Fault Tolerant (BFT) protocols have been used in blockchains due to their high performance and fast block acceptance

    Mohammad M. Jalalzai, Golden Richard III, Costas Busch in Blockchain – ICBC 2019 (2019)

  9. No Access

    Chapter and Conference Paper

    Evaluation Methods of Hierarchical Models

    In this paper, we consider the problem of evaluating the quality of hierarchical models. This task arises due to the current researchers use subjective evaluation, such as a survey to test the goodness of a hi...

    Abdulqader M. Almars, Ibrahim A. Ibrahim, **n Zhao in Advanced Data Mining and Applications (2018)

  10. No Access

    Chapter and Conference Paper

    Mixed Membership Sparse Gaussian Conditional Random Fields

    Building statistical models to explain the association between responses (output) and predictors (input) is critical in many real applications. In reality, responses may not be independent. A promising directi...

    Jie Yang, Henry C. M. Leung, S. M. Yiu in Advanced Data Mining and Applications (2017)

  11. No Access

    Chapter and Conference Paper

    Cuttle: Enabling Cross-Column Compression in Distributed Column Stores

    We observe that, in real-world distributed data warehouse systems, data columns from different sources often exhibit redundancy. Even though these systems can employ both general and column-oriented compressio...

    Hao Liu, Jiang **ao, **anjun Guo, Haoyu Tan, Qiong Luo, Lionel M. Ni in Web and Big Data (2017)

  12. No Access

    Chapter

    New Word Detection and Tagging on Chinese Twitter Stream

    Twitter becomes one of the critical channels for disseminating up-to-date information. The volume of tweets can be huge. It is desirable to have an automatic system to analyze tweets. The obstacle is that Twit...

    Yuzhi Liang, Pengcheng Yin, S. M. Yiu in Transactions on Large-Scale Data- and Know… (2017)

  13. No Access

    Chapter and Conference Paper

    An Investigation into the Use of Document Scores for Optimisation over Rank-Biased Precision

    When a Document Retrieval system receives a query, a Relevance model is used to provide a score to each document based on its relevance to the query. Relevance models have parameters that should be tuned to op...

    Sunil Randeni, Kenan M. Matawie, Laurence A. F. Park in Information Retrieval Technology (2017)

  14. No Access

    Chapter and Conference Paper

    Realizing Inclusive Digital Library Environments: Opportunities and Challenges

    Universal design, also known as inclusive design, envisions the design of products and services to be accessible and usable to all irrespective of their disability status, cultural background, age, etc. Librar...

    Wondwossen M. Beyene in Research and Advanced Technology for Digital Libraries (2016)

  15. No Access

    Chapter and Conference Paper

    Mining Source Code Topics Through Topic Model and Words Embedding

    Developers nowadays can leverage existing systems to build their own applications. However, a lack of documentation hinders the process of software system reuse. We examine the problem of mining topics (i.e., ...

    Wei Emma Zhang, Quan Z. Sheng, Ermyas Abebe in Advanced Data Mining and Applications (2016)

  16. No Access

    Chapter and Conference Paper

    Offline Text and Non-text Segmentation for Hand-Drawn Diagrams

    Writing and drawing are basic forms of human communication. Handwritten and hand-drawn documents are often used at initial stages of a project. For storage and later usage, handwritten documents are often conv...

    Buntita Pravalpruk, Matthew M. Dailey in PRICAI 2016: Trends in Artificial Intelligence (2016)

  17. No Access

    Chapter and Conference Paper

    On the distributive nature of adverbial quan in Mandarin Chinese

    The Chinese adverbial quan is analysed as an event predicate modifier that can force a distributive reading on a sentence by targetting a nominal that expresses a plural participant in the event, and encapsulatin...

    Lucia M. Tovena, Yan Li in Chinese Lexical Semantics (2016)

  18. Chapter and Conference Paper

    User Perceptions of a Virtual Human Over Mobile Video Chat Interactions

    We believe that virtual humans, presented over video chat services, such as Skype, and delivered using smartphones, can be an effective way to deliver innovative applications where social interactions are impo...

    Sin-Hwa Kang, Thai Phan, Mark Bolas in Human-Computer Interaction. Novel User Exp… (2016)

  19. No Access

    Chapter and Conference Paper

    Company Name Disambiguation in Tweets: A Two-Step Filtering Approach

    Using Twitter as an effective marketing tool has become a gold mine for companies interested in their online reputation. A quite significant research challenge related to the above issue is to disambiguate twe...

    M. Atif Qureshi, Arjumand Younus, Colm O’Riordan in Information Retrieval Technology (2015)

  20. No Access

    Chapter and Conference Paper

    General Overview of ImageCLEF at the CLEF 2015 Labs

    This paper presents an overview of the ImageCLEF 2015 evaluation campaign, an event that was organized as part of the CLEF labs 2015. ImageCLEF is an ongoing initiative that promotes the evaluation of technolo...

    Mauricio Villegas, Henning Müller in Experimental IR Meets Multilinguality, Mul… (2015)

previous disabled Page of 7