Domain knowledge-based security bug reports prediction
To eliminate security attack risks of software products, the security bug report (SBR)
prediction has been increasingly investigated. However, there is still much room for …
prediction has been increasingly investigated. However, there is still much room for …
Clustering-based EMT model for predicting student performance
Predicting students' performance has emerged as an attractive task among researchers.
They use supervised and unsupervised educational data mining (EDM) techniques to build …
They use supervised and unsupervised educational data mining (EDM) techniques to build …
Graph-based extractive text summarization sentence scoring scheme for Big Data applications
The recent advancements in big data and natural language processing (NLP) have
necessitated proficient text mining (TM) schemes that can interpret and analyze voluminous …
necessitated proficient text mining (TM) schemes that can interpret and analyze voluminous …
[PDF][PDF] Research supervisor recommendation system based on topic conformity
R Rismanto, AR Syulistyo… - International Journal of …, 2020 - mecs-press.org
In a higher education such as universities, final project are under supervision of one or more
supervisors with a similar research interest or topic. The determination of the final project …
supervisors with a similar research interest or topic. The determination of the final project …
A realistic model extraction attack against graph neural networks
Abstract Model extraction attacks are considered to be a significant avenue of vulnerability in
machine learning. In model extraction attacks, the attacker repeatedly queries a victim model …
machine learning. In model extraction attacks, the attacker repeatedly queries a victim model …
Multi-View Discrete Clustering: A Concise Model
In most existing graph-based multi-view clustering methods, the eigen-decomposition of the
graph Laplacian matrix followed by a post-processing step is a standard configuration to …
graph Laplacian matrix followed by a post-processing step is a standard configuration to …
[PDF][PDF] Towards an intelligent machine learning-based business approach
MN Omri, W Mribah - International Journal of Intelligent Systems …, 2022 - researchgate.net
With the constant increase of data induced by stakeholders throughout a product life cycle,
companies tend to rely on project management tools for guidance. Business intelligence …
companies tend to rely on project management tools for guidance. Business intelligence …
[PDF][PDF] Towards an intelligent approach to workflow integration in a quality management system
MN OMRI, HBEN AONNE - International Journal of Intelligent …, 2022 - researchgate.net
Among the most important activities within a company, we find that of quality management.
This activity represents reflects the most rigorous way possible for a better organization of …
This activity represents reflects the most rigorous way possible for a better organization of …
Comparative analysis of different vectorizing techniques for document similarity using cosine similarity
K Goyal, M Sharma - 2022 Second International Conference on …, 2022 - ieeexplore.ieee.org
In this paper, multiple methods to vectorize documents were compared, and cosine
similarities were calculated for the corresponding documents. Some of the vectorizing …
similarities were calculated for the corresponding documents. Some of the vectorizing …
Exploiting Content-Based Filtering for Publication Venue Recommendations
Academic activities in a wide variety of subjects have increased significantly, leading to the
publication of thousands of scholarly articles worldwide. This amount of published data …
publication of thousands of scholarly articles worldwide. This amount of published data …