From theory to practice: insights and hurdles in collecting social media data for social science research [0.03%]
从理论到实践:社会科学中的社交媒体数据采集的启示与障碍
Yan Chen,Kate Sherren,Kyung Young Lee et al.
Yan Chen et al.
Social media has profoundly changed our modes of self-expression, communication, and participation in public discourse, generating volumes of conversations and content that cover every aspect of our social lives. Social media platforms have...
Cedric Waterschoot,Antal van den Bosch
Cedric Waterschoot
Introduction: Recently, content moderators on news platforms face the challenging task to select high-quality comments to feature on the webpage, a manual and time-consuming task exacerbated by platform growth. This paper...
Big data and its impact on the 3Rs: a home cage monitoring oriented review [0.03%]
大数据及其对3R的影响:以笼养监测为导向的回顾性研究
Sara Fuochi,Mara Rigamonti,Eoin C OConnor et al.
Sara Fuochi et al.
Undisturbed home cage recording of mouse activity and behavior has received increasing attention in recent years. In parallel, several technologies have been developed in a bid to automate data collection and interpretation. Thanks to these...
Development and application of a machine learning-based predictive model for obstructive sleep apnea screening [0.03%]
一种基于机器学习的阻塞性睡眠呼吸暂停筛查预测模型的研究与应用
Kang Liu,Shi Geng,Ping Shen et al.
Kang Liu et al.
Objective: To develop a robust machine learning prediction model for the automatic screening and diagnosis of obstructive sleep apnea (OSA) using five advanced algorithms, namely Extreme Gradient Boosting (XGBoost), Logis...
Tradescantia response to air and soil pollution, stamen hair cells dataset and ANN color classification [0.03%]
空气和土壤污染下的 tradescantia 反应及花药毛细胞数据集和ANN颜色分类
Leatrice Talita Rodrigues,Barbara Sanches Antunes Goeldner,Emílio Graciliano Ferreira Mercuri et al.
Leatrice Talita Rodrigues et al.
Tradescantia plant is a complex system that is sensible to environmental factors such as water supply, pH, temperature, light, radiation, impurities, and nutrient availability. It can be used as a biomonitor for environmental changes; howev...
A systematic literature review on the impact of AI models on the security of code generation [0.03%]
关于AI模型对代码生成安全性影响的系统性文献回顾
Claudia Negri-Ribalta,Rémi Geraud-Stewart,Anastasia Sergeeva et al.
Claudia Negri-Ribalta et al.
Introduction: Artificial Intelligence (AI) is increasingly used as a helper to develop computing programs. While it can boost software development and improve coding proficiency, this practice offers no guarantee of secur...
Challenges and efforts in managing AI trustworthiness risks: a state of knowledge [0.03%]
人工智能可信风险的管理挑战与努力:现状与展望
Nineta Polemi,Isabel Praça,Kitty Kioskli et al.
Nineta Polemi et al.
This paper addresses the critical gaps in existing AI risk management frameworks, emphasizing the neglect of human factors and the absence of metrics for socially related or human threats. Drawing from insights provided by NIST AI RFM and E...
Visualization as irritation: producing knowledge about medieval courts through uncertainty [0.03%]
不确定性视角下的中世纪王权知识生产与视觉思维
Silke Schwandt,Christian Wachter
Silke Schwandt
Visualizations are ubiquitous in data-driven research, serving as both tools for knowledge production and genuine means of knowledge communication. Despite criticisms targeting the alleged objectivity of visualizations in the digital humani...
Multi-modal recommender system for predicting project manager performance within a competency-based framework [0.03%]
基于能力的框架下预测项目经理绩效的多模推荐系统
Imene Jemal,Wilfried Armand Naoussi Sijou,Belkacem Chikhaoui
Imene Jemal
The evaluation of performance using competencies within a structured framework holds significant importance across various professional domains, particularly in roles like project manager. Typically, this assessment process, overseen by sen...
A comprehensive investigation of clustering algorithms for User and Entity Behavior Analytics [0.03%]
用于用户和实体行为分析的聚类算法全面调查
Pierpaolo Artioli,Antonio Maci,Alessio Magrì
Pierpaolo Artioli
Introduction: Government agencies are now encouraging industries to enhance their security systems to detect and respond proactively to cybersecurity incidents. Consequently, equipping with a security operation center tha...