Results 11 to 20 of about 566,348 (288)

Semi-Automatic Classification and Duplicate Detection From Human Loss News Corpus

open access: yesIEEE Access, 2020
Automatic news repository collection systems involve a news crawler that extracts news from different news portals, subsequently, these news need to be processed to figure out the category of a news article e.g. sports, politics, showbiz etc.
Adnan Abid   +5 more
doaj   +1 more source

Sentence embedding and fine-tuning to automatically identify duplicate bugs

open access: yesFrontiers in Computer Science, 2023
Industrial software maintenance is critical but burdensome. Activities such as detecting duplicate bug reports are often performed manually. Herein an automated duplicate bug report detection system improves maintenance efficiency using vectorization of ...
Haruna Isotani   +5 more
doaj   +1 more source

Mapping Bibliographic Records with Bibliographic Hash Keys [PDF]

open access: yes, 2009
This poster presents a set of hash keys for bibliographic records called bibkeys. Unlike other methods of duplicate detection, bibkeys can directly be calculated from a set of basic metadata fields (title, authors/editors, year).
Andreas, Hotho   +2 more
core   +1 more source

Duplicate detection of 2D-NMR Spectra

open access: yesJournal of Integrative Bioinformatics, 2007
2D-Nuclear magnetic resonance (NMR) spectra are used in the (structural) analysis of small molecules. In contrast to 1D-NMR spectra, 2D-NMR spectra correlate the chemical shifts of 1H and 13C at the same time.
Hinneburg Alexander   +2 more
doaj   +1 more source

Clone Detection and Elimination for Haskell [PDF]

open access: yes, 2010
Duplicated code is a well known problem in software maintenance and refactoring. Code clones tend to increase program size and several studies have shown that duplicated code makes maintenance and code understanding more complex and time consuming.
Brown, Christopher, Thompson, Simon
core   +1 more source

Omnidirectional object duplicate detection [PDF]

open access: yes2011 Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE), 2011
In this paper, we extend a graph-based approach for omnidirectional object duplicate detection in still images. Objects are detected from several points of view with different distances. The goal of this work is to determine how many training images have to be taken and from which points of view in order to achieve a certain efficiency.
Peter Vajda   +3 more
openaire   +1 more source

Near-Duplicate Web Page Detection: An Efficient Approach Using Clustering, Sentence Feature and Fingerprinting [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2013
Duplicate and near-duplicate web pages are the chief concerns for web search engines. In reality, they incur enormous space to store the indexes, ultimately slowing down and increasing the cost of serving results.
J. Prasanna Kumar, P. Govindarajulu
doaj   +1 more source

The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks

open access: yesJournal of Sensor and Actuator Networks, 2015
A node replication attack against a wireless sensor network involves surreptitious efforts by an adversary to insert duplicate sensor nodes into the network while avoiding detection. Due to the lack of tamper-resistant hardware and the low cost of sensor
Narasimha Shashidhar   +2 more
doaj   +1 more source

A feature-based intelligent deduplication compression system with extreme resemblance detection

open access: yesConnection Science, 2021
With the fast development of various computing paradigms, the amount of data is rapidly increasing that brings the huge storage overhead. However, the existing data deduplication techniques do not make full use of similarity detection to improve the ...
Xiaotong Wu   +5 more
doaj   +1 more source

Quantifying the specificity of near-duplicate image classification functions [PDF]

open access: yes, 2016
There are many published methods for detecting similar and near-duplicate images. Here, we consider their use in the context of unsupervised near-duplicate detection, where the task is to find a (relatively small) near-duplicate intersection of two large
Cardillo, Franco Alberto   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy