Results 21 to 30 of about 32,474 (200)

Unstructured Text Documents Summarization With Multi-Stage Clustering

open access: yesIEEE Access, 2020
In natural language processing, text summarization is an important application used to extract desired information by reducing large text. Existing studies use keyword-based algorithms for grouping text, which do not give the documents' actual theme. Our
Muhammad Yahya Saeed   +3 more
doaj   +1 more source

Study on Title Encoding Methods for e-Commerce Downstream Tasks

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference, 2022
In an e-Commerce marketplace there are usually many downstream tasks which have (relatively) less available resources than the few mainstream priority tasks, like recommendation or search.
Cristian Cardellino, Rafael Carrascosa
doaj   +1 more source

Large scale text mining for deriving useful insights: A case study focused on microbiome

open access: yesFrontiers in Physiology, 2022
Text mining has been shown to be an auxiliary but key driver for modeling, data harmonization, and interpretation in bio-medicine. Scientific literature holds a wealth of information and embodies cumulative knowledge and remains the core basis on which ...
Syed Ashif Jardary Al Ahmed   +8 more
doaj   +1 more source

MANNWARE: A Malware Classification Approach with a Few Samples Using a Memory Augmented Neural Network

open access: yesInformation, 2020
The ability to stop malware as soon as they start spreading will always play an important role in defending computer systems. It must be a huge benefit for organizations as well as society if intelligent defense systems could themselves detect and ...
Kien Tran, Hiroshi Sato, Masao Kubo
doaj   +1 more source

A Sentiment-Statistical Approach for Identifying Problematic Mobile App Updates Based on User Reviews

open access: yesInformation, 2020
Mobile applications (apps) on IOS and Android devices are mostly maintained and updated via Apple Appstore and Google Play, respectively, where the users are allowed to provide reviews regarding their satisfaction towards particular apps.
Xiaozhou Li   +3 more
doaj   +1 more source

iCDI-W2vCom: Identifying the Ion Channel–Drug Interaction in Cellular Networking Based on word2vec and node2vec

open access: yesFrontiers in Genetics, 2021
Ion channels are the second largest drug target family. Ion channel dysfunction may lead to a number of diseases such as Alzheimer’s disease, epilepsy, cephalagra, and type II diabetes.
Jie Zheng, Xuan Xiao, Wang-Ren Qiu
doaj   +1 more source

Word2Vec [PDF]

open access: yesNatural Language Engineering, 2016
AbstractMy last column ended with some comments about Kuhn and word2vec. Word2vec has racked up plenty of citations because it satisifies both of Kuhn’s conditions for emerging trends: (1) a few initial (promising, if not convincing) successes that motivate early adopters (students) to do more, as well as (2) leaving plenty of room for early adopters ...
openaire   +1 more source

Vietnamese Text Classification Algorithm using Long Short Term Memory and Word2Vec

open access: yesИнформатика и автоматизация, 2020
In the context of the ongoing forth industrial revolution and fast computer science development the amount of textual information becomes huge. So, prior to applying the seemingly appropriate methodologies and techniques to the above data processing ...
Huu Nguyen Phat, Nguyen Thi Minh Anh
doaj   +1 more source

A Reliable Prediction Algorithm Based on Genre2Vec for Item-Side Cold-Start Problems in Recommender Systems with Smart Contracts

open access: yesMathematics, 2023
Personalized recommender systems are used not only in e-commerce companies but also in various web applications. These systems conventionally use collaborative filtering (CF) and content-based filtering approaches. CF operates using memory-based or model-
Yong Eui Kim   +4 more
doaj   +1 more source

Intelligent auditing techniques for enterprise finance

open access: yesJournal of Intelligent Systems, 2023
With the need of social and economic development, the audit method is also continuously reformed and improved. Traditional audit methods have defects of comprehensively considering various risk factors, and cannot meet the needs of enterprise financial ...
Peng Chen, Tian Guixian
doaj   +1 more source

Home - About - Disclaimer - Privacy