Browse Items (6 total)

  • Tags: Electronic mail

Imbalanced data become an obstacle in data mining nowadays, minority class sometimes are more important than majority class, just like in medical diagnosis, credit card fraud and etc. This paper focuses on the imbalanced data problem that adaboost…

Field-pipelines leakage detection based on the negative pressure wave theory is mainly aiming to effectively process pressure sample signal in time domain. Previous methods often perform well for detecting large leakage but poorly for small leakage.…

Phishing is the most-used malicious attempt in which attackers, commonly via emails, impersonate trusted persons or entities to obtain private information from a victim. Even though phishing email attacks are a known cybercriminal strategy for…

The Deep Water Horizon well blowout on April 20th 2010 discharged between 40,000-1.2 million tons of crude oil into the Gulf of Mexico. In order to understand the fate and impact of the discharged oil, particularly on the environmentally sensitive…

On November 4, 2003, the Board of the International Finance Corporation (IFC), the private sector arm of the World Bank Group, approved lending to the Baku-Tbilisi-Ceyhan (BTC) oil pipeline and the Azeri-Chirag-Deepwater Gunashli (ACG) Phase 1 oil…

On November 4, 2003, the Board of the International Finance Corporation (IFC), the private sector arm of the World Bank Group, approved lending to the Baku-Tbilisi-Ceyhan (BTC) oil pipeline and the Azeri-Chirag-Deepwater Gunashli (ACG) Phase 1 oil…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2