Search alternatives:
feature » features (Expand Search)
evolution » evaluation (Expand Search)
Showing 901 - 920 results of 3,286 for search 'feature evolution', query time: 0.10s Refine Results
  1. 901
  2. 902
  3. 903

    The behavioural ecology of hominin locomotion: what can we learn from landscapes of fear and primate terrestriality? by Philippa Hammond, René Bobe, René Bobe, René Bobe, Susana Carvalho, Susana Carvalho, Susana Carvalho

    Published 2025-06-01
    “…A defining feature of the hominin clade is bipedality, often parcelled together with terrestriality. …”
    Get full text
    Article
  4. 904
  5. 905

    Research on traffic representation in network anomaly detection by SUN Jianwen, ZHANG Bin, CHANG Heyu

    Published 2025-01-01
    “…Subsequently, the evolution of traffic representation in network anomaly detection was systematically reviewed, providing a comprehensive analysis of its forms, feature learning, and application in anomaly detection both globally and domestically. …”
    Get full text
    Article
  6. 906

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  7. 907

    Nature of the creative class of a cognitive society: conceptual aspect by G.V. Smolonsky

    Published 2024-12-01
    “…The author has revealed the constructive features of the creative class, capable of playing a decisive role in the management segment. …”
    Get full text
    Article
  8. 908

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  9. 909

    Forensic Comparison of Acoustic Voice Samples Recorded in Different Mobile Phone Devices: A Preliminary Study by Bhavya Sharma, Bhuvnesh Yadav, Sanjeev Kumar, Gurvinder Singh Bumbrah, Aman Sharma

    Published 2025-01-01
    “…The widespread accessibility of mobile phone devices, be it Android, iOS, or Feature phone, has significantly increased the prevalence of voice evidence in criminal cases. …”
    Get full text
    Article
  10. 910
  11. 911
  12. 912

    Predictive performance and uncertainty analysis of ensemble models in gully erosion susceptibility assessment by Congtan Liu, Haoming Fan, Yixuan Wang

    Published 2025-06-01
    “…Gully erosion, as a significant natural process in geomorphological evolution, poses serious threats to natural environments and socio-economic stability. …”
    Get full text
    Article
  13. 913

    How (and why) languages became more complex as we evolved more prosocial: the human self-domestication view by Antonio Benítez-Burraco

    Published 2025-01-01
    “…This paper aims to re-examine the problem of the emergence of present-day languages from the specific perspective of the self-domestication account of human evolution. According to this view, our species went through an evolutionary process that parallels the changes experienced by domesticated mammals. …”
    Get full text
    Article
  14. 914

    Youth Language in Bangladesh by Abdul Awal

    Published 2025-04-01
    “…This study explores the dynamic and evolving nature of the youth language in Bangladesh, examining both the linguistic features and the perceptions of young people about their language usage. …”
    Get full text
    Article
  15. 915
  16. 916

    Complete mitogenomes of venomous fish Paracentropogon rubripinnis and Inimicus japonicus elucidate phylogenetic relationships in Scorpaeniformes by Sung-Gwon Lee, Seongmin Kim, Chungoo Park

    Published 2025-08-01
    “…Resolving relationships among venomous fish families is crucial for studying venom evolution and discovering novel bioactive compounds. …”
    Get full text
    Article
  17. 917

    Single-cell sequencing provides clues about the developmental genetic basis of evolutionary adaptations in syngnathid fishes by Hope M Healey, Hayden B Penn, Clayton M Small, Susan Bassham, Vithika Goyal, Micah A Woods, William A Cresko

    Published 2025-02-01
    “…The examined pipefish evolutionary innovations are composed of recognizable cell types, suggesting that derived features originate from changes within existing gene networks. …”
    Get full text
    Article
  18. 918
  19. 919
  20. 920

    Dynamic mechanical behavior of magnesium oxysulfate-based titanogypsum foamed concrete: A macro- and meso-scale investigation by Jian Gong, Aichi Ma, Shuren Wang, Jiaxuan Zhang, Zhenzhen An

    Published 2025-07-01
    “…From macro- and meso-scale perspectives, combined with high-speed photography of specimen failure processes, the structural characteristics, phase composition characteristics, fragment morphology, energy evolution, and constitutive models of TG-MOS foam concrete were analyzed. …”
    Get full text
    Article