-
1
المؤلفون: Ajit Kr. Singh Yadav, Marpe Sora
المصدر: 3C Empresa. Investigación y pensamiento crítico. 10:77-105
مصطلحات موضوعية: Artificial neural network, Computer science, Financial ratio, Feature selection, General Medicine, Audit, Python (programming language), computer.software_genre, Support vector machine, ComputingMethodologies_PATTERNRECOGNITION, Tokenization (data security), Data mining, computer, Financial statement, computer.programming_language
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::1b2482aab18783544153bbda26af8fadTest
https://doi.org/10.17993/3cemp.2021.100448.77-105Test -
2
المؤلفون: Kok Keong Tan, Yuen Leng Chow
المصدر: Journal of Property Investment & Finance. 40:284-290
مصطلحات موضوعية: Tokenization (data security), Database, Computer science, Lift (data mining), General Engineering, Real estate, computer.software_genre, General Economics, Econometrics and Finance, General Business, Management and Accounting, computer, Finance
-
3
المؤلفون: Shuheng Wang, Heyan Huang, Shumin Shi
المصدر: Machine Translation. 35:595-609
مصطلحات موضوعية: Linguistics and Language, Speedup, Machine translation, Computer science, computer.software_genre, Translation (geometry), Language and Linguistics, Tokenization (data security), Autoregressive model, Artificial Intelligence, Encoder, computer, Algorithm, Software, Decoding methods, Transformer (machine learning model)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::44f8f9c9ccbad58bf920a098c6617c8bTest
https://doi.org/10.1007/s10590-021-09285-xTest -
4
المؤلفون: Jamil Ahmad, Najeeb Ur Rehman, Rukhma Qasim, Laiqa Rukhsar, Zeeshan Ahmad, Hafsa Dar, Zahra Aman, Waqas Haider Bangyal
المصدر: Computational and Mathematical Methods in Medicine
Computational and Mathematical Methods in Medicine, Vol 2021 (2021)مصطلحات موضوعية: Support Vector Machine, Article Subject, Databases, Factual, Computer science, Computer applications to medicine. Medical informatics, R858-859.7, Decision tree, Machine learning, computer.software_genre, General Biochemistry, Genetics and Molecular Biology, Social Networking, Deep Learning, Humans, Disinformation, AdaBoost, tf–idf, Natural Language Processing, Models, Statistical, General Immunology and Microbiology, SARS-CoV-2, business.industry, Applied Mathematics, Deep learning, Decision Trees, Sentiment analysis, COVID-19, Computational Biology, Confusion matrix, Bayes Theorem, General Medicine, Logistic Models, Tokenization (data security), Modeling and Simulation, Neural Networks, Computer, Artificial intelligence, Data pre-processing, business, Social Media, computer, Algorithms, Research Article
وصف الملف: text/xhtml
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::91910c94ed0335831905242fd9772fa7Test
https://doi.org/10.1155/2021/5514220Test -
5
المؤلفون: Ossama Al-Maliki, Hisham Al-Assam
المصدر: Information Security Journal: A Global Perspective. 31:511-526
مصطلحات موضوعية: Information Systems and Management, Tokenization (data security), Computer science, business.industry, Embedded system, business, Contactless smart card, Software, Computer Science Applications
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::de96fab175d2306f414c5c7c90104adcTest
https://doi.org/10.1080/19393555.2021.2001120Test -
6
المؤلفون: Rizka Safitri Lutfiyani, Niken Retnowati
المصدر: J-ICON : Jurnal Komputer dan Informatika; Vol 9 No 2 (2021): October 2021; 244-252
J-ICON : Jurnal Komputer dan Informatika; Vol 9 No 2 (2021): Oktober 2021; 244-252مصطلحات موضوعية: Bayes estimator, business.industry, Computer science, Decision tree learning, Decision tree, Feature selection, Machine learning, computer.software_genre, Naive Bayes classifier, ComputingMethodologies_PATTERNRECOGNITION, C4.5 algorithm, Tokenization (data security), sort, Artificial intelligence, business, computer
وصف الملف: application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::505d1e87022448e0ba4c46c280cfe79bTest
https://doi.org/10.35508/jicon.v9i2.5304Test -
7
المؤلفون: Mega Christy Silalahi, Rezky Prayitno Simanjuntak, Siti Berliana Manurung, Parmonangan R. Togatorop
المصدر: Jurnal Komputer dan Informatika. 9:196-206
مصطلحات موضوعية: Parsing, business.industry, Computer science, Software requirements specification, computer.software_genre, Technical documentation, Automation, Tokenization (data security), Chunking (psychology), Entity–relationship model, Systems design, Artificial intelligence, business, computer, Natural language processing
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::0d3d32e20360c7673d74083808c322daTest
https://doi.org/10.35508/jicon.v9i2.5051Test -
8
المؤلفون: Sevukan Rathinam, Aasif Ahmad Mir, Sumeer Gul
المصدر: Library Hi Tech. 40:340-356
مصطلحات موضوعية: business.industry, Microblogging, media_common.quotation_subject, Internet privacy, Sentiment analysis, Library and Information Sciences, Public domain, Popularity, Tokenization (data security), Conversation, Social media, Valence (psychology), Psychology, business, Information Systems, media_common
-
9
المؤلفون: Vaibhav Kumar Seth, B. S. Prithvi, H. S. Sanjay, Subojit Mohanty
المصدر: Journal of The Institution of Engineers (India): Series B. 103:375-384
مصطلحات موضوعية: Stop words, General Computer Science, Computer science, business.industry, Lemmatisation, Sentiment analysis, Filter (signal processing), computer.software_genre, Tokenization (data security), Preprocessor, Word2vec, Artificial intelligence, Electrical and Electronic Engineering, business, computer, Natural language processing, Word (computer architecture)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::285e41503684bd45cd13295fdef9cef6Test
https://doi.org/10.1007/s40031-021-00677-4Test -
10
المؤلفون: Volkan Sevindik
المصدر: ITU Journal on Future and Evolving Technologies. 2:93-100
مصطلحات موضوعية: Tokenization (data security), Resource (project management), Computer science, business.industry, Wireless network, business, Computer network
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::dac795419cfeb6b66a8d09dec4dd0060Test
https://doi.org/10.52953/mgnt1205Test