Data mining is a process where we can extract relevant information or patterns from the collection of data. In this era of big data, every organization aims to handle huge amounts of data and perform data mining techn...
详细信息
the supervised learning algorithm is exactly what in which we've input as well as output variable which is able to be A or maybe B which uses an algorithm to find out the mapping feature from the feedback to the o...
详细信息
Every year, companies and financial institutions worldwide lose billions due to credit card fraud. Withthe advancement in electronic commerce and communication technology and the development of modern technology, the...
详细信息
Considering the advanced nature of computational abilities, task scheduling is a measure of success in any multiprocessing environment performing many different tasks in real-time and effective scheduling process and ...
详细信息
Glaucoma disease becomes a more common eye disease that occurs due to pressure on eye cells. Many image processing based methods have been applied earlier for the detection of glaucoma disease but their accuracy of cl...
详细信息
the proceedings contain 27 papers. the special focus in this conference is on Intelligence Science. the topics include: Trilevel Multi-criteria Decision Analysis Based on three-Way Decision;Recurrent Self-evolving Tak...
ISBN:
(纸本)9783030748258
the proceedings contain 27 papers. the special focus in this conference is on Intelligence Science. the topics include: Trilevel Multi-criteria Decision Analysis Based on three-Way Decision;Recurrent Self-evolving Takagi–Sugeno–Kan Fuzzy Neural Network (RST-FNN) Based Type-2 Diabetic Modeling;granulated Tables with Frequency by Discretization and their Application;person Authentication by Gait Data from Smartphone Sensors Using Convolutional Autoencoder;research on Personal Credit Risk Assessment Model Based on Instance-Based Transfer learning;from Texts to Classification Knowledge;ANAS: Sentence Similarity Calculation Based on Automatic Neural Architecture Search;fully Interval Integer Transhipment Problem- A Solution Approach;Novel Image Compression and Deblocking Approach Using BPN and Deep Neural Network Architecture;characterization of Orderly Behavior of Human Crowd in Videos Using Deep learning;some Discussions on Subjectivity of machine and its Function;stability Analysis of Imprecise Prey-Predator Model;comparative Performance Study on Human Activity Recognition with Deep Neural Networks;beam and Ball Plant System Controlling Using Intuitionistic Fuzzy Control;application of Pinching Method to Quantify Sensitivity of Reactivity Coefficients on Power Defect;computation with Democracy: An Intelligent System;Economy and Unemployment Due to COVID19: Secondary Research;optimal Control of Dengue-Chikungunya Co-infection: A Mathematical Study;comparative Analysis of machinelearning Algorithms for Categorizing Eye Diseases;hexagon of Intelligence;interactive Granular computing Model for Intelligent Systems;a Framework for the Approximation of Relations;logical Treatment of Incomplete/Uncertain Information Relying on Different Systems of Rough Sets;possibility theory and Possibilistic Logic: Tools for Reasoning Under and About Incomplete Information;similarity-Based Rough Sets with Annotation Using Deep learning.
Plants are the most important for the living of human beings as well as for our environment. Agriculture plays an important role in the economy of our country, so it becomes important to save the plants from diseases....
详细信息
the goal of multi-label learning with missing labels (MLML) is assigning each testing instance multiple labels given training instances that have a partial set of labels. the most challenging issue is to complete the ...
详细信息
Fake news means false facts generated for deceiving the readers. the generation of fake news has become very easy which can mislead people and cause panic. therefore, fake news detection is gaining prominence in resea...
详细信息
the last decade has seen an explosion in the use of online social networks (OSNs), with many people relying on them for the majority of their social contacts. they use OSNs to maintain relationships, disseminate infor...
the last decade has seen an explosion in the use of online social networks (OSNs), with many people relying on them for the majority of their social contacts. they use OSNs to maintain relationships, disseminate information, plan events, and even do business online. Attackers and imposters looking to steal personal information, distribute fake news, or engage in other forms of bad behavior have taken notice of the explosive expansion of OSNs and the wealth of information about its members. However, academics have begun exploring effective approaches to identify suspicious or fraudulent accounts by analyzing account data and applying classification algorithms. In addition, results from stand-alone categorization algorithms aren’t always accurate, and some of the exploited account attributes actually have a detrimental impact on the final conclusions or have no impact at all. the solution provided makes use of preprocessing methods like tokenization and the removal of stop words. Chi-squared features are used to select and extract features before an LS TM-ELM model is trained. the proposed method outperforms the previous two models significantly.
暂无评论