Author of the publication

Automatic Construction and Global Optimization of a Multisentiment Lexicon.

, , , , , , and . Comput. Intell. Neurosci., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality and efficiency of model building for genetic algorithms, , , and . Proceedings of Genetic and Evolutionary Computation Conference 2004 (GECCO-2004, (2004)Enabling seamless WiGig/WiFi handovers in tri-band wireless systems., , , , and . ICNP, page 1-2. IEEE Computer Society, (2017)Analysis of Significant Cell Differences Between Cancer Patients and Healthy Individuals., , , , , , and . TAAI (2), volume 2075 of Communications in Computer and Information Science, page 224-227. Springer, (2023)An 85 dB SNDR third-order ΔΣ modulator for audio applications., , , , , , and . SII, page 505-510. IEEE, (2017)Spiritual health, clinical practice stress, depressive tendency and health-promoting behaviours among nursing students, , , , and . J Adv Nurs, 66 (7): 1612-22 (July 2010)Theoretical Study of a Two-Photon Fluorescent Probe Based on Nile Red Derivatives with Controllable Fluorescence Wavelength and Water Solubility., , , , , , , , , and . J. Chem. Inf. Model., 61 (10): 5082-5097 (2021)Tour Routes Planning with Matrix-based Differential Evolution., , , , , , and . ICTC, page 909-911. IEEE, (2023)Ghost calls from operational 4G call systems: IMS vulnerability, call DoS attack, and countermeasure., , , , , , and . MobiCom, page 8:1-8:14. ACM, (2020)Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures., , , , , , , and . IEEE/ACM Trans. Netw., 31 (2): 800-815 (April 2023)Deep Semantic Matching with Foreground Detection and Cycle-Consistency., , , , , and . CoRR, (2020)