Personensuche
X
?
Communications in Computer and Information Science; Technologies and Applications of Artificial Intelligence ,
1
Deep Learning for Journalism: The Bibliometric Analysis of ..:
, In:
?
2023 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) ,
2
A Mixed Approach to Determine the Factors Affecting the Cus..:
, In:
?
2023 12th International Conference on Awareness Science and Technology (iCAST) ,
3
Constructing Depression Prediction Model using ChatGPT and ..:
, In:
?
2023 12th International Conference on Awareness Science and Technology (iCAST) ,
4
Identifying Crucial Factors for E-students' Satisfaction in..:
, In:
?
2023 14th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI) ,
5
Classifying Game Reviews by Using Natural Language Processi..:
, In:
?
2022 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM) ,
6
Exploring the Relationship Among Experience Marketing, Cust..:
, In:
?
Proceedings of the 2020 International Conference on Management of e-Commerce and e-Government ,
7
Using Data Mining Methods to Detect Medical Fraud:
, In:
?
2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI) ,
8
Customer Needs Analysis for Overseas Purchasing in Taiwan:
, In:
?
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) ,
9
A Study of Social Media Reviews Effects on the Success of C..:
, In:
?
Proceedings of the 1st International Electronics Communication Conference ,
10
Secure Authentication Scheme with Conditional Privacy Prese..:
, In:
?
2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST) ,
11
Comparison of Sentiment Analysis of Review Comments by Unsu..:
, In:
?
Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing; Smart Innovation, Systems and Technologies ,
12
The Keywords of Affecting Performance for Live Streaming:
, In:
?
2018 7th International Congress on Advanced Applied Informatics (IIAI-AAI) ,
13
Apply Data Mining Approach to Identify Non-revisit Factors ..:
, In:
?
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City ,
14
On the Security of a Secure Anonymous Authentication Protoc..:
, In:
?
Proceedings of the 3rd International Conference on Industrial and Business Engineering ,
15