The rapid growth of social networks has produced an unprecedented amount of user-generated data, which provides an excellent opportunity for text mining. Author
Support Vector-based learning methods are an important part of Computational Intelligence techniques. Recent efforts have been dealing with the problem of learn
An RFID (Radio Frequency Identification) based security and access control system is proposed in this paper. Recently, a crime against children is increasing in
One of the most useful Information Extraction (IE) solutions to Web information harnessing is Named Entity Recognition (NER). Hand-coded rule methods are still
Cognitive Radios (CRs) use dynamic threshold estimation (DTE) techniques to better detect primary user signals under noise uncertainty regimes. However, DTE tec
Data Mining (DM) methods are being increasingly used in prediction with time series data, in addition to traditional statistical approaches. This paper presents
Quickly extraction of building information technology is an important application in urban development planning, electronic information, national defense and ot
This study utilized Data Envelopment Analysis (DEA) in assessing the efficiency of health center in tuberculosis (TB) treatment. Assessing the efficiency of hea
Footwear impression marks on the outside surface of shoes are distinctive patterns and an important forensic clue often found at offense scenes. However, in man