-
- Abstract (2-3 lines)
The concepts, characteristics and study techniques of hate speech on social media, particularly on Twitter. Prevalent research and future scenario.
- Brief Description and C…
-
Also known as: captcha, recaptcha, honeypot, rate limiting, bot detection
## What
A consistent approach to filtering out spam form submissions across GOV.UK - especially if the approach requires…
-
### example
```dockerfile
FROM rockylinux/rockylinux:9
RUN touch /tmp/foo.txt
# check if the file exists
# test: RUN test -f /tmp/foo.txt
```
```makefile
.PHONY:
test:
grep -v '^# test:' Dockerfi…
-
Is it possible to save each character detected in an image to a separate file?
-
For a single 1000 m depth profile we go from a ~30 MB p file, to a ~110 MB p2mat file to a ~ 500 MB profile file... a whopping order of magnitude increase in storage requirements. 0.5 GB per profile i…
-
This began as a path forward priority from analysis of non-detect errors in donor focused borrowing detection. i.e., Many errors were due to lack of the known donor word from WOLD in the donor source…
-
The package DDOutlier is a great job. In the searching for sophisticated outlier detection algorithms, I find the DDOutlier by accident. It proves the codes together with the associated papers, which …
-
To test the orthography profiles, we need to make sure that there are no empty morphemes in the data, which may result, if a segmented word starts with a `+` or ends with it or has two `+` one after t…
-
This issue is a collection for experiments and show cases to run.
- [ ] Contextual change of a term by getting embeddings for all instances as in [Computation of semantic change in scientific concept…
-
As a Data Engineer, it is important for me to have a solid understanding of system requirements, high availability, disaster recovery, and deployment flow. To develop a learning plan to improve my kno…