|
|
|
Florin Leon, Marius Gavrilescu, Sabina-Adriana Floria and Alina Adriana Minea
This paper proposes a classification methodology aimed at identifying correlations between job ad requirements and transversal skill sets, with a focus on predicting the necessary skills for individual job descriptions using a deep learning model. The ap...
ver más
|
|
|
|
|
|
|
Yilei Wang, Yuelin Hu, Wenliang Xu and Futai Zou
Dark web vendor identification can be seen as an authorship aliasing problem, aiming to determine whether different accounts on different markets belong to the same real-world vendor, in order to locate cybercriminals involved in dark web market transact...
ver más
|
|
|
|
|
|
|
Shanghao Liu, Chunjiang Zhao, Hongming Zhang, Qifeng Li, Shuqin Li, Yini Chen, Ronghua Gao, Rong Wang and Xuwen Li
A clear understanding of the number of pigs plays a crucial role in breeding management. Computer vision technology possesses several advantages, as it is harmless and labour-saving compared to traditional counting methods. Nevertheless, the existing met...
ver más
|
|
|
|
|
|
|
Geonju Lee, Dabin Park and Hayoung Oh
Depression disorder is a disease that causes a deterioration of daily function and can induce thoughts of suicide. The Diagnostic and Statistical Manual of Mental Disorders Fifth Edition (DSM-5), which is the official reference of the American Psychiatry...
ver más
|
|
|
|
|
|
|
Nasir Ayub, Tayyaba, Saddam Hussain, Syed Sajid Ullah and Jawaid Iqbal
Sentiment analysis holds great importance within the domain of natural language processing as it examines both the expressed and underlying emotions conveyed through review content. Furthermore, researchers have discovered that relying solely on the over...
ver más
|
|
|
|
|
|
|
Bernardo Panichi and Alessandro Lazzeri
This paper addresses the time-intensive task of assigning accurate account labels to invoice entries within corporate bookkeeping. Despite the advent of electronic invoicing, many software solutions still rely on rule-based approaches that fail to addres...
ver más
|
|
|
|
|
|
|
Xiaoyu Tang, Sijia Xu and Hui Ye
In network edge computing scenarios, close monitoring of network data and anomaly detection is critical for Internet services. Although a variety of anomaly detectors have been proposed by many scholars, few of these take into account the anomalies of th...
ver más
|
|
|
|
|
|
|
Qi Meng, Xixiang Zhang, Yun Dong, Yan Chen and Dezhao Lin
Relationship extraction is a crucial step in the construction of a knowledge graph. In this research, the grid field entity relationship extraction was performed via a labeling approach that used span representation. The subject entity and object entity ...
ver más
|
|
|
|
|
|
|
Abid Mehmood, Muneer Ahmad and Qazi Mudassar Ilyas
Fruits are considered among the most nutrient-dense cash crops around the globe. Since fruits come in different types, sizes, shapes, colors, and textures, the manual classification and disease identification of a large quantity of fruit is time-consumin...
ver más
|
|
|
|
|
|
|
Teng Xue, Tianchi Zhang and Jing Zhang
Underwater images are crucial in various underwater applications, including marine engineering, underwater robotics, and subsea coral farming. However, obtaining paired data for these images is challenging due to factors such as light absorption and scat...
ver más
|
|
|
|