Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on social media anomaly detection
Social media anomaly detection is of critical importance to prevent malicious activities such
as bullying, terrorist attack planning, and fraud information dissemination. With the recent …
as bullying, terrorist attack planning, and fraud information dissemination. With the recent …
A comparative analysis of large-scale network visualization tools
Network (Graph) is a powerful abstraction for representing underlying relations and
structures in large complex systems. Network visualization provides a convenient way to …
structures in large complex systems. Network visualization provides a convenient way to …
Current and future challenges in mining large networks: Report on the second sdm workshop on mining networks and graphs
We report on the Second Workshop on Mining Networks and Graphs held at the 2015 SIAM
International Conference on Data Mining. This half-day workshop consisted of a keynote …
International Conference on Data Mining. This half-day workshop consisted of a keynote …
Intelligent digital libraries and tailored services
A next generation of intelligent information systems will emerge from recent digital library
(DL) research. One aspect of this is based on intelligent technologies and applications in the …
(DL) research. One aspect of this is based on intelligent technologies and applications in the …
Scalable mining, analysis and visualisation of protein-protein interaction networks
S Arifuzzaman, B Pandey - International Journal of Big Data …, 2019 - inderscienceonline.com
Proteins are linear chain biomolecules that are the basis of functional networks in all
organisms. Protein-protein interaction (PPI) networks are networks of protein complexes …
organisms. Protein-protein interaction (PPI) networks are networks of protein complexes …
A parallel algorithm for generating a random graph with a prescribed degree sequence
Random graphs (or networks) have gained a significant increase of interest due to its
popularity in modeling and simulating many complex real-world systems. Degree sequence …
popularity in modeling and simulating many complex real-world systems. Degree sequence …
Anti-reverse-engineering tool of executable files on the windows platform
L Chenke, Y Feng, G Qiyuan… - … and Engineering (CSE …, 2017 - ieeexplore.ieee.org
In response to the problems of the Windows executable being reverse-analyzed easily, we
introduce the technology of INT3 breakpoint detection and characteristics detection in the tail …
introduce the technology of INT3 breakpoint detection and characteristics detection in the tail …
CINET 2.0: A cyberinfrastructure for network science
S Abdelhamid, M Alam, R Alo… - 2014 IEEE 10th …, 2014 - ieeexplore.ieee.org
Analysis of structural properties and dynamics of networks is currently a central topic in
many disciplines including Social Sciences, Biology and Business. CINET, a cyber …
many disciplines including Social Sciences, Biology and Business. CINET, a cyber …
Design and implementation of new planar massive MIMO systems for 5G wireless networks extending OMNeT++ simulator
The progress accomplished in the modern wireless network are leading to the development
of efficient antenna devices that are able to achieve high level requirements with regard to …
of efficient antenna devices that are able to achieve high level requirements with regard to …
An algorithm for influence maximization and target set selection for the deterministic linear threshold model
A Swaminathan - 2014 - vtechworks.lib.vt.edu
The problem of influence maximization has been studied extensively with applications that
include viral marketing, recommendations, and feed ranking. The optimization problem, first …
include viral marketing, recommendations, and feed ranking. The optimization problem, first …