http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Cyberbullying Detection in Twitter Using Sentiment Analysis
Theng, Chong Poh, Othman, Nur Fadzilah,Abdullah, Raihana Syahirah,Anawar, Syarulnaziah,Ayop, Zakiah,Ramli, Sofia Najwa International Journal of Computer ScienceNetwork Security 2021 p.1-10
Postolenko, Iryna, Vozniuk, Alla,Kyrychenko, Rymma,Gavran, Iryna,Brukhovetska, Oleksandra,Chausova, Tetiana International Journal of Computer ScienceNetwork Security 2021 p.11-16
Muhammad, Wazir, Hussain, Ayaz,Shah, Syed Ali Raza,Shah, Jalal,Bhutto, Zuhaibuddin,Thaheem, Imdadullah,Ali, Shamshad,Masrour, Salman International Journal of Computer ScienceNetwork Security 2021 p.17-22
Sentiment Orientation Using Deep Learning Sequential and Bidirectional Models
Alyamani, Hasan J. International Journal of Computer ScienceNetwork Security 2021 p.23-30
The Market Orientation from Dual Perspectives: Customers and Managers Perceptions in Tunisian Banks
Najjar, Faouzi, Missaoui, Yosra International Journal of Computer ScienceNetwork Security 2021 p.31-42
Prylipko, Sergii, Vasylieva, Nataliia,Kovalova, Olena,Kulayets, Mariia,Bilous, Yana,Hnatenko, Iryna International Journal of Computer ScienceNetwork Security 2021 p.43-48
DIGITAL TECHNOLOGIES AND RANKINGS AS TOOLS OF THE COMPETITIVENESS IN THE EDUCATIONAL SERVICES MARKET
Djakona, Antonina, Lavrov, Ruslan,Anisimova, Liudmyla,Koval, Oksana,Polkhovska, Maryna,Shumaieva, Svitlana International Journal of Computer ScienceNetwork Security 2021 p.49-58
DetGas: A Carbon Monoxide Gas Leakage Detector Mobile Application
Kamaruddin, Farhan Fikri Mohd, Hadiana, Ana,Lokman, Anitawati Mohd International Journal of Computer ScienceNetwork Security 2021 p.59-66
Khodakivska, Olga, Ramos, Olena Ribeiro,Nechyporenko, Oleksandr,Tsiutsiupa, Svitlana,Krasnoshtan, Olexander,Mayovets, Yaryna International Journal of Computer ScienceNetwork Security 2021 p.67-72
Deep Learning Based Rumor Detection for Arabic Micro-Text
Alharbi, Shada, Alyoubi, Khaled,Alotaibi, Fahd International Journal of Computer ScienceNetwork Security 2021 p.73-80