Filters








4,162 Hits in 8.2 sec

Chinese User Service Intention Classification Based on Hybrid Neural Network

Shengbin Jia, Yang Xiang
2019 Journal of Physics, Conference Series  
Therefore, a hybrid neural network classification model based on BiLSTM and CNN is proposed to recognize users service intentions.  ...  It is difficult for the intelligent system to understand the semantics of user demand which leads to poor recognition effect, because of the noise in user requirement descriptions.  ...  This work was supported in part by the National Natural Science Foundation of China under Grant 71571136, in part by the National Basic Research Program of China under Grant 2014CB340404, and in part by  ... 
doi:10.1088/1742-6596/1229/1/012054 fatcat:ouwphoquzncivkyeitqxcheptu

Information Filtering and Automatic Keyword Identification by Artificial Neural Networks

Zvi Boger, Tsvi Kuflik, Bracha Shapira, Peretz Shoval
2000 European Conference on Information Systems  
In this study we employ an artificial neural-network (ANN) as an alternative method for both filtering and term selection, and compare its effectiveness to "traditional" methods.  ...  Information filtering (IF) systems usually filter data items by correlating a vector of terms (keywords) that represent the user profile with similar vectors of terms that represent the data items (e.g  ...  Brief Introduction to Artificial Neural Networks Modeling ANN modeling is done by learning from known examples. A network of simple mathematical "neurons" is connected by weights.  ... 
dblp:conf/ecis/BogerKSS00 fatcat:tllwtk2brzdidipfez5m4vdto4

Automatic Code Summarization: A Systematic Literature Review [article]

Yuxiang Zhu, Minxue Pan
2019 arXiv   pre-print
By reading and analyzing relevant articles, we aim at obtaining a comprehensive understanding of the current status of automatic code summarization.  ...  Automatic code summarization is proposed to solve these problems. During the last decade, huge progress has been made in this field, but there is a lack of an up-to-date survey.  ...  The difference of timeframe is significant in the field of automatic code summarization, since the first application of artificial neural network to automatic code summarization was published by Iyer  ... 
arXiv:1909.04352v2 fatcat:xdxfdihcdfhbfnnilc2ofif4le

Handwritten Letter Recognition using Artificial Intelligence

Jeevitha D, Muthu Geethalakshmi S, Nila I, Santhoshi V
2022 International Journal for Research in Applied Science and Engineering Technology  
The image dataset with 530 number of training images and 2756 numbers of testing images are used to experiment the proposed network.  ...  This project proposes the Deep Learning conceptual models based on Convolutional Neural Network (CNN).  ...  We thank the Management, Principal, Head of Computer Science Department and the Professors of Jeppiaar Engineering College for providing the opportunity.  ... 
doi:10.22214/ijraset.2022.42949 fatcat:enhdkmaaxbfdzezjraapgj4ape

SPI: Automated Identification of Security Patches via Commits [article]

Yaqin Zhou, Jing Kai Siow, Chenyu Wang, Shangqing Liu, Yang Liu
2021 arXiv   pre-print
We devise a deep learning-based security patch identification system that consists of two neural networks: one commit-message neural network that utilizes pretrained word representations learned from our  ...  To curate security patches including undisclosed patches at a large scale and low cost, we propose a deep neural-network-based approach built upon commits of open-source repositories.  ...  The keyword filtering phase also filters the other three libraries to 11% to 18% of its total commits. Manual labelling.  ... 
arXiv:2105.14565v2 fatcat:hlfmlekf5zcqtnsj5qugkza5du

Cephalometric Analysis in Orthodontics Using Artificial Intelligence—A Comprehensive Review

Aravind Kumar Subramanian, Yong Chen, Abdullah Almalki, Gautham Sivamurthy, Dashrath Kafle, Mohammad Alam
2022 BioMed Research International  
Current techniques for completely automatic identification of cephalometric landmarks have considerably improved efficiency and growth prospects for their regular use.  ...  The main objective of the AI technique is to make dentists' work more precise and accurate. AI is increasingly being used in the area of orthodontic treatment.  ...  The purpose of this study was to compare the results of an automatic cephalometric analysis using a convolutional neural network with those obtained by a conventional cephalometric approach. 35 Leonardi  ... 
doi:10.1155/2022/1880113 pmid:35757486 pmcid:PMC9225851 fatcat:fixwp6uqozhilimlguen2gri5q

Hoax Detection System on Twitter using Feed-Forward and Back-Propagation Neural Networks Classification Method

Crisanadenta Wintang Kencana, Erwin Budi Setiawan, Isman Kurniawan
2020 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)  
Data collection obtained through crawling used Twitter API and retrieve data according to the keywords and hashtags. The neural networks highest accuracy obtained using TF-IDF by 78.76%.  ...  Our model is designed to automatically learn features for hoax news classification through several hidden layers built into the neural network.  ...  An automatic hoax detection using artificial intelligence can be more helpful. It collects content using a crawler engine to gain a dataset that can be labeled manually.  ... 
doi:10.29207/resti.v4i4.2038 fatcat:ybsjx36menf2rh2fnns5z2gb2e

Attendance Monitoring System Using Face Recognition

Arnav Jain, Rahul Gupta, Mohd. Shariq Ansari, Tanveer Ikram
2022 International Journal for Research in Applied Science and Engineering Technology  
Keywords: Face Recognition, Open CV, Machine Learning, Real and fake face detection, Graphical User Interface  ...  Few students do mark the fake attendance of their classmates by using their digital devices specially phone through which they try to show the picture of their friend to the system but in that case it  ...  Facial recognition system works by comparing facial features from an already existing images.  ... 
doi:10.22214/ijraset.2022.42389 fatcat:zreoiccjjzhurbxbug7nqvzk7e

Implementation of Search Engine Based on Java

Yuxiang Hou
2017 DEStech Transactions on Social Science Education and Human Science  
Search engine is a kind of information retrieval tool based on keyword query, nearly ten years with the popularity of the Internet and the rapid development of the user on the network to find information  ...  to provide a very convenient tool.  ...  On the one hand, the intervention of artificial technology, in the grasp of information by the artificial discovery, identification, in the organization of information by the artificial indexing and with  ... 
doi:10.12783/dtssehs/ssme2017/12977 fatcat:i2bkqrkxpjb4tg4vqid2xshqzu

A systematic literature review on spam content detection and classification

Sanaa Kaddoura, Ganesh Chandrasekaran, Daniela Elena Popescu, Jude Hemanth Duraisamy
2022 PeerJ Computer Science  
To improve social media security, the detection and control of spam text are essential.  ...  The time spent by people using social media is overgrowing, especially in the time of the pandemic.  ...  They were able to construct a spam filtering approach with a precision score of more than 0.90 for spam identification by combining Support Vector Machine (SVM) with n-grams.  ... 
doi:10.7717/peerj-cs.830 pmid:35174265 pmcid:PMC8802784 fatcat:qv74jetor5eddncvkfpfxshln4

Document Clustering using Learning from Examples

G. ThavasiRaja, R. Malmathanraj, M. Arun
2012 International Journal of Computer Applications  
Information filtering (IF) systems usually filter data items by correlating a set of terms representing the user's interest with similar sets of terms representing the data items.  ...  Its novel feature is the identification of an optimal set of documents that are relevant to the user.  ...  INTRODUCTION While searching textual databases by keywords, a large number of the retrieved texts may not be relevant to the searcher/user.  ... 
doi:10.5120/4872-7299 fatcat:gsnr5anizrfy5ggulf3ugsrw7q

De-identification of Emergency Medical Records in French: Survey and Comparison of State-of-the-Art Automated Systems

Loick Bourdois, Marta Avalos, Gabrielle Chenais, Frantz Thiessard, Philippe Revel, Cedric Gil-Jardine, Emmanuel Lagarde
2021 Proceedings of the ... International Florida Artificial Intelligence Research Society Conference  
To exploit these data, an automated de-identification system guaranteeing protection of privacy is required.In this study we review available de-identification tools to de-identify free-text clinical documents  ...  The evaluation is performed on a test set of 3,000 manually annotated notes.Hybrid systems, combining capabilities in complementary tasks, show the best performance.  ...  As manual annotation, manual de-identification is timeconsuming and costly, requiring automatic methods.  ... 
doi:10.32473/flairs.v34i1.128480 fatcat:32alj7g3ofacffyjz6mozhlpem

Product-harm crisis intelligent warning system design based on fine-grained sentiment analysis of automobile complaints

Haiju Hu, Yonghui Wei, Yu Zhou
2021 Complex & Intelligent Systems  
This study contributes to the research and design of automatic crisis warning systems by considering sentiment and improving the accuracy of automobile product-harm crisis prediction.  ...  However, the designs of existing warning systems use the recurrent neural network algorithm, which suffers from gradient disappearance and gradient explosion issues.  ...  Keras is an open source artificial neural network library written in Python that can be used as a highlevel application program interface for TensorFlow, Microsoft-CNTK and Theano to design, debug, evaluate  ... 
doi:10.1007/s40747-021-00306-z fatcat:eqkyucmvpjeydliuwe7ssebxza

Using Project-based Learning in a Hybrid e-Learning System Model

Luis Alfaro, Claudia Rivera, Jorge Luna-Urquizo
2019 International Journal of Advanced Computer Science and Applications  
For the proposal of the Hybrid Architecture of the e-Learning system model, the authors use artificial intelligence techniques, which make it possible to identify the Learning Styles (LS), with the purpose  ...  of automatically assigning the projects, according to the characteristics, interests, expectations and demands of the student, who will interact with an e-Learning environment, with a high capacity of  ...  ACKNOWLEDGMENT The authors would like to thank Universidad Nacional de San Agustín (UNSA) for supporting this research.  ... 
doi:10.14569/ijacsa.2019.0101059 fatcat:jewqkudynjbbrk3zc4pu35e7fq

WNV-Detector: automated and scalable detection of wireless network vulnerabilities

Yanxi Huang, Fangzhou Zhu, Liang Liu, Wezhi Meng, Simin Hu, Renjun Ye, Ting Lv
2021 EURASIP Journal on Wireless Communications and Networking  
Based on semantic analysis and named entities recognition, we design rules for automatic device identification of wireless access points and routers.  ...  AbstractThe security of wireless routers receives much attention given by the increasing security threats.  ...  Abbreviations IoT: Internet of Things; NER: Named entities recognition; NLP: Natural language processing; AP: Access point; WLAN: Wireless Local Area Network; NVD: National Vulnerability Database; CVE:  ... 
doi:10.1186/s13638-021-01978-4 fatcat:ej5logxzrrca3nu24vrxpc7654
« Previous Showing results 1 — 15 out of 4,162 results