Suggested Topics within your search.
Suggested Topics within your search.
-
11641
Multilingual hope speech detection from tweets using transfer learning models
Published 2025-03-01“…This content includes instances where negativity is amplified through hateful speech but also a significant number of posts that provide support and encouragement, commonly known as hope speech. …”
Get full text
Article -
11642
Risk-Aware Suicide Detection in Social Media: A Domain-Guided Framework with Explainable LLMs
Published 2025-07-01“…Nowadays, the close connection between people's lives and social media has led to the emergence of their psychological and emotional states in social media posts. This type of digital footprint creates a rich and novel entry point for early detection of suicide risk. …”
Get full text
Article -
11643
Value orientations of vkontakte users with different strategies for meanings transferring
Published 2021-12-01“…The purpose of this study is to identify the strategies for the translation of meanings that Internet users resort to when commenting on posts on social networks, and to study the value orientations of young people using various strategies for the translation of meanings. …”
Get full text
Article -
11644
“He is my savior, my guiding light in the dark”: imagination and domestication in Chinese women’s romantic relationships with AI companions
Published 2025-06-01“…A thematic analysis was conducted to examine a total of 2,485 posts written by female users.ResultsThe analysis uncovers three distinct themes: exploring romantic communication styles, rethinking romantic relationship roles, and challenging dominant gender hierarchies. …”
Get full text
Article -
11645
Review of communication optimization methods in federated learning
Published 2024-12-01Get full text
Article -
11646
Physical-social attributes integrated Sybil detection for Tor bridge distribution
Published 2023-02-01Get full text
Article -
11647
IKEChecker: grammar-guided stateful fuzzer for IKE protocol implementions
Published 2024-08-01Get full text
Article -
11648
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Get full text
Article -
11649
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01Get full text
Article -
11650
Key-customizable encrypted deduplication with access control for cloud storage
Published 2024-08-01Get full text
Article -
11651
THE PROBLEM OF USING GADGETS AS A MEANS OF FALSIFICATION OF RESULTS CHECK LEVEL OF STUDENTS KNOWLEDGE
Published 2017-01-01“…Besides, the analysis of the relevant information posted at discussion boards, social networks, etc. is carried out. …”
Get full text
Article -
11652
Robust reinforcement learning algorithm based on pigeon-inspired optimization
Published 2022-10-01Get full text
Article -
11653
LLMs in Education: Evaluation GPT and BERT Models in Student Comment Classification
Published 2025-05-01“…The incorporation of artificial intelligence in educational contexts has significantly transformed the support provided to students facing learning difficulties, facilitating both the management of their educational process and their emotions. Additionally, online comments play a vital role in understanding student feelings. …”
Get full text
Article -
11654
Monitoring of transformation of settlement spatial network in the arid zone of Uzbekistan
Published 2024-06-01“…Navy, NGA, GE- BCO April 10, 2013–December 14, 2015, October 4–December 14, 2023, and posted on Google Earth Pro, are used to update data geometry. …”
Get full text
Article -
11655
-
11656
Features of communication in specialized social networks (on the example of Internet sites associated with the practice of “hand-made”)
Published 2023-03-01“…The method of analyzing documents (posts of forum participants on the site of sewers “burdastyle.ru”) has been used in the research. …”
Get full text
Article -
11657
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01Get full text
Article -
11658
Directions for the development of socially oriented taxation of income of Russians
Published 2024-11-01“…The methodological basis of the study is founded on the analysis of scientific publications and open data of public authorities posted on their official websites. The analysis has been conducted using comparison methods, systemic logical and semantic analysis, synthesis of theoretical and practical material. …”
Get full text
Article -
11659
Ethernet Passive Mutual Authentication Scheme on Quantum Networks
Published 2025-01-01Get full text
Article -
11660
Security analysis of the RSSP-II protocol and a novel security enhancement approach
Published 2025-06-01Get full text
Article