UP - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 109
1.
  • Finding Influential Users i... Finding Influential Users in Social Media Using Association Rule Learning
    Erlandsson, Fredrik; Bródka, Piotr; Borg, Anton ... Entropy (Basel, Switzerland), 05/2016, Volume: 18, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the proposed work analyzes users and their behavior in order to identify ...
Full text

PDF
2.
  • Using VADER sentiment and S... Using VADER sentiment and SVM for predicting customer response sentiment
    Borg, Anton; Boldt, Martin Expert systems with applications, 12/2020, Volume: 162
    Journal Article
    Peer reviewed

    •A LinearSVM model was able to extract e-mail sentiment with a mean AUC of 0.896.•The model could also predict sentiment for e-mail responses with a mean AUC of 0.805.•The results suggests ...
Full text
3.
  • All Burglaries Are Not the ... All Burglaries Are Not the Same: Predicting Near-Repeat Burglaries in Cities Using Modus Operandi
    Borg, Anton; Svensson, Martin ISPRS international journal of geo-information, 02/2022, Volume: 11, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    The evidence that burglaries cluster spatio-temporally is strong. However, research is unclear on whether clustered burglaries (repeats/near-repeats) should be treated as qualitatively different ...
Full text

PDF
4.
  • Recent Developments in Low-... Recent Developments in Low-Power AI Accelerators: A Survey
    Åleskog, Christoffer; Grahn, Håkan; Borg, Anton Algorithms, 11/2022, Volume: 15, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    As machine learning and AI continue to rapidly develop, and with the ever-closer end of Moore’s law, new avenues and novel ideas in architecture design are being created and utilized. One avenue is ...
Full text
5.
  • Improving anomaly detection... Improving anomaly detection in SCADA network communication with attribute extension
    Anwar, Mahwish; Lundberg, Lars; Borg, Anton Energy Informatics, 12/2022, Volume: 5, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Network anomaly detection for critical infrastructure supervisory control and data acquisition (SCADA) systems is the first line of defense against cyber-attacks. Often hybrid methods, such as ...
Full text
6.
  • Bibliometric Mining of Rese... Bibliometric Mining of Research Trends in Machine Learning
    Lundberg, Lars; Boldt, Martin; Borg, Anton ... AI (Basel), 2024, Volume: 5, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    We present a method, including tool support, for bibliometric mining of trends in large and dynamic research areas. The method is applied to the machine learning research area for the years 2013 to ...
Full text
7.
  • Evaluating Temporal Analysi... Evaluating Temporal Analysis Methods Using Residential Burglary Data
    Boldt, Martin; Borg, Anton ISPRS international journal of geo-information, 09/2016, Volume: 5, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    Law enforcement agencies, as well as researchers rely on temporal analysis methods in many crime analyses, e.g., spatio-temporal analyses. A number of temporal analysis methods are being used, but a ...
Full text

PDF
8.
  • Non-Hodgkin Lymphoma Causin... Non-Hodgkin Lymphoma Causing Hypopituitarism Can Imaging Help Diagnosis and Management?
    Khan, Uzma; Borg, Anton; Beltechi, Radu ... European journal of case reports in internal medicine, 12/2021, Volume: 8, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    Non-Hodgkin lymphomas of the hypothalamus and pituitary are rare. They usually remain clinically silent until onset of compressive features affecting surrounding structures. When symptomatic, ...
Full text

PDF
9.
  • Severe Cytomegalovirus Reac... Severe Cytomegalovirus Reactivation in Patient with Low-Grade Non-Hodgkin’s Lymphoma after Standard Chemotherapy
    Modvig, Lena; Boyle, Ciaran; Randall, Katie ... Case reports in hematology, 01/2017, Volume: 2017
    Journal Article
    Peer reviewed
    Open access

    Clinically significant cytomegalovirus (CMV) reactivation is not uncommon in patients with severe immunodeficiency secondary to underlying medical disorders or following aggressive immunosuppressive ...
Full text

PDF
10.
  • Steroid Refractory Autoimmu... Steroid Refractory Autoimmune Haemolytic Anaemia Secondary to Sarcoidosis Successfully Treated with Rituximab and Mycophenolate Mofetil
    Green, Sarah; Partridge, Erica; Idedevbo, Edore ... Case reports in hematology, 01/2016, Volume: 2016
    Journal Article
    Peer reviewed
    Open access

    Autoimmune haemolytic anaemia is not a well-recognised complication of sarcoidosis. We describe the case of a 30-year-old female who presented with acute warm haemolytic anaemia and widespread ...
Full text

PDF
1 2 3 4 5
hits: 109

Load filters