![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
128 Result(s)
-
Chapter and Conference Paper
Enabling PII Discovery in Textual Data via Outlier Detection
Discovering Personal Identifying Information (PII) in textual data is an important pre-processing step to enabling privacy preserving data analytics. One approach to PII discovery in textual data is to charact...
-
Chapter and Conference Paper
A Machine Learning Supervised Model to Detect Cyber-Begging in Social Media
The misuse of social media leads many of the users to fall into crimes that they are not aware of it especially financial ones. Recently, cyber-begging has grown significantly on social platforms, impacting us...
-
Chapter and Conference Paper
A Novel Bangla Font Recognition Approach Using Deep Learning
Font detection is an essential pre-processing step for printed character recognition. In this era of computerization and automation, computer composed documents such as official documents, bank checks, loan ap...
-
Chapter and Conference Paper
Automatic Medicinal Plant Recognition Using Random Forest Classifier
A fully automated technique for the acknowledgment of medicinal plants utilizing computer system vision as well as artificial intelligence strategies has existed. Leaves from 24 different medical plants specie...
-
Chapter and Conference Paper
A Global Data Pre-processing Technique for Automatic Speech Recognition
speech recognition (ASR) is one of the major research field in computer science. ASR is one of the most necessary tools, which is required for, almost every languages. But every language has its own techn...
-
Chapter and Conference Paper
A Language-Independent Speech Data Collection and Preprocessing Technique
Virtual assistant or human-like robot has become the most attractive technology nowadays., where we badly need communication. And verbal communication is the most comfortable one. Here, it comes with the neces...
-
Chapter and Conference Paper
Position: GDPR Compliance by Construction
New laws such as the European Union’s General Data Protection Regulation (GDPR) grant users unprecedented control over personal data stored and processed by businesses. Compliance can require expensive manual...
-
Chapter and Conference Paper
An Experimental Evaluation of BFT Protocols for Blockchains
Byzantine Fault Tolerant (BFT) protocols have been used in blockchains due to their high performance and fast block acceptance
-
Chapter and Conference Paper
Evaluation Methods of Hierarchical Models
In this paper, we consider the problem of evaluating the quality of hierarchical models. This task arises due to the current researchers use subjective evaluation, such as a survey to test the goodness of a hi...
-
Chapter and Conference Paper
Mixed Membership Sparse Gaussian Conditional Random Fields
Building statistical models to explain the association between responses (output) and predictors (input) is critical in many real applications. In reality, responses may not be independent. A promising directi...
-
Chapter and Conference Paper
Cuttle: Enabling Cross-Column Compression in Distributed Column Stores
We observe that, in real-world distributed data warehouse systems, data columns from different sources often exhibit redundancy. Even though these systems can employ both general and column-oriented compressio...
-
Chapter
New Word Detection and Tagging on Chinese Twitter Stream
Twitter becomes one of the critical channels for disseminating up-to-date information. The volume of tweets can be huge. It is desirable to have an automatic system to analyze tweets. The obstacle is that Twit...
-
Chapter and Conference Paper
An Investigation into the Use of Document Scores for Optimisation over Rank-Biased Precision
When a Document Retrieval system receives a query, a Relevance model is used to provide a score to each document based on its relevance to the query. Relevance models have parameters that should be tuned to op...
-
Chapter and Conference Paper
Realizing Inclusive Digital Library Environments: Opportunities and Challenges
Universal design, also known as inclusive design, envisions the design of products and services to be accessible and usable to all irrespective of their disability status, cultural background, age, etc. Librar...
-
Chapter and Conference Paper
Mining Source Code Topics Through Topic Model and Words Embedding
Developers nowadays can leverage existing systems to build their own applications. However, a lack of documentation hinders the process of software system reuse. We examine the problem of mining topics (i.e., ...
-
Chapter and Conference Paper
Offline Text and Non-text Segmentation for Hand-Drawn Diagrams
Writing and drawing are basic forms of human communication. Handwritten and hand-drawn documents are often used at initial stages of a project. For storage and later usage, handwritten documents are often conv...
-
Chapter and Conference Paper
On the distributive nature of adverbial quan in Mandarin Chinese
The Chinese adverbial quan is analysed as an event predicate modifier that can force a distributive reading on a sentence by targetting a nominal that expresses a plural participant in the event, and encapsulatin...
-
Chapter and Conference Paper
User Perceptions of a Virtual Human Over Mobile Video Chat Interactions
We believe that virtual humans, presented over video chat services, such as Skype, and delivered using smartphones, can be an effective way to deliver innovative applications where social interactions are impo...
-
Chapter and Conference Paper
Company Name Disambiguation in Tweets: A Two-Step Filtering Approach
Using Twitter as an effective marketing tool has become a gold mine for companies interested in their online reputation. A quite significant research challenge related to the above issue is to disambiguate twe...
-
Chapter and Conference Paper
General Overview of ImageCLEF at the CLEF 2015 Labs
This paper presents an overview of the ImageCLEF 2015 evaluation campaign, an event that was organized as part of the CLEF labs 2015. ImageCLEF is an ongoing initiative that promotes the evaluation of technolo...