Artificial intelligence methodologies for data management
This study analyses the main challenges, trends, technological approaches, and artificial
intelligence methods developed by new researchers and professionals in the field of …
intelligence methods developed by new researchers and professionals in the field of …
Web-based e-learning in elementary School: A systematic literature review
This article presents literature review on web-based e-learning in elementary school in the
latest literature. SLR method and PRISMA protocol with the stages of identification …
latest literature. SLR method and PRISMA protocol with the stages of identification …
[HTML][HTML] Efficient on-the-fly Web bot detection
A large fraction of traffic on present-day Web servers is generated by bots—intelligent
agents able to traverse the Web and execute various advanced tasks. Since bots' activity …
agents able to traverse the Web and execute various advanced tasks. Since bots' activity …
Recurrent neural networks with TF-IDF embedding technique for detection and classification in tweets of dengue disease
With the increased usage of Web 2.0 and data-affluent tools such as social media platforms
and web blog services, the challenge of extracting public sentiment and disseminating …
and web blog services, the challenge of extracting public sentiment and disseminating …
[HTML][HTML] Identifying legitimate Web users and bots with different traffic profiles—an Information Bottleneck approach
Recent studies reported that about half of Web users nowadays are intelligent agents (Web
bots). Many bots are impersonators operating at a very high sophistication level, trying to …
bots). Many bots are impersonators operating at a very high sophistication level, trying to …
[HTML][HTML] Bot datasets on twitter: Analysis and challenges
The reach and influence of social networks over modern society and its functioning have
created new challenges and opportunities to prevent the misuse or tampering of such …
created new challenges and opportunities to prevent the misuse or tampering of such …
Exploring visual representations of computer mouse movements for bot detection using deep learning approaches
Nowadays, bots can be seen everywhere on the Internet and are responsible for a large
percentage of website traffic. The problem of bot detection has increasingly gained attention …
percentage of website traffic. The problem of bot detection has increasingly gained attention …
Feature extractions and selection of bot detection on Twitter A systematic literature review: Feature extractions and selection of bot detection on Twitter A systematic …
R Al-azawi, O Safaa - Inteligencia Artificial, 2022 - journal.iberamia.org
Automated or semiautomated computer programs that imitate humans and/or human
behavior in online social networks are known as social bots. Users can be attacked by social …
behavior in online social networks are known as social bots. Users can be attacked by social …
A data-driven air quality assessment method based on unsupervised machine learning and median statistical analysis: The case of China
X Wang, L Wang, Y Liu, S Hu, X Liu, Z Dong - Journal of Cleaner …, 2021 - Elsevier
Because the equation for calculating the air quality index (AQI) only considers the most
serious pollutants, it remains controversial, and a comprehensive AQI has been a focus of …
serious pollutants, it remains controversial, and a comprehensive AQI has been a focus of …
Blockchain-oriented approach for detecting cyber-attack transactions
Z Feng, Y Li, X Ma - Financial Innovation, 2023 - Springer
With the high-speed development of decentralized applications, account-based blockchain
platforms have become a hotbed of various financial scams and hacks due to their …
platforms have become a hotbed of various financial scams and hacks due to their …