Data Technologies and Applications

Papers
(The TQCC of Data Technologies and Applications is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-11-01 to 2025-11-01.)
ArticleCitations
Early identification of high attention content for online mental health community users based on multi-level fusion model19
Educational data mining in the academic setting: employing the data produced by blended learning to ameliorate the learning process19
A graph-based approach for representing, integrating and analysing neuroscience data: the case of the murine basal ganglia11
AsCDPR: a novel framework for ratings and personalized preference hotel recommendation using cross-domain and aspect-based features10
Data repair of density-based data cleaning approach using conditional functional dependencies9
Blockchain solutions for scientific paper peer review: a systematic mapping of the literature9
Roles of topic features in perceived helpfulness of online company reviews9
TCE-DBF: textual context enhanced dynamic bimodal fusion for hate video detection8
Exploring cross-cultural disparities in tourists' perceived images: a text mining and sentiment analysis study using LDA and BERT-BILSTM models8
Tracking the size of the estimation window in time-series data8
Mining the determinants of review helpfulness: a novel approach using intelligent feature engineering and explainable AI8
A collaborative trend prediction method using the crowdsourced wisdom of web search engines7
Ranking the ontology development methodologies using the weighted decision matrix7
Property Assertion Constraints for ontologies and knowledge graphs7
Research on the generalization of social bot detection from two dimensions: feature extraction and detection approaches7
Multi-relation global context learning for session-based recommendation7
Harmonized system code classification using supervised contrastive learning with sentence BERT and multiple negative ranking loss6
Publisher’s Note6
Community relations discovery methods for users in Fancircle based on sentiment analysis in China6
ABEE: automated bio entity extraction from biomedical text documents6
Techniques to detect terrorists/extremists on the dark web: a review6
Analysis of CEO career patterns using machine learning: taking US university graduates as an example6
Savitar: an intelligent sign language translation approach for deafness and dysphonia in the COVID-19 era5
BiGRU-CNN-AT: classifiying emotion on social media5
A boosting-based transfer learning method to address absolute-rarity in skin lesion datasets and prevent weight-drift for melanoma detection4
A new method based on ensemble time series for fast and accurate clustering4
Optimized aspect and self-attention aware LSTM for target-based semantic analysis (OAS-LSTM-TSA)4
Analyzing students' attention by gaze tracking and object detection in classroom teaching4
TikTok app usage behavior: the role of hedonic consumption experiences4
A novel word-graph-based query rewriting method for question answering4
ID-SF-Fusion: a cooperative model of intent detection and slot filling for natural language understanding4
Research data management and FAIR compliance through popular research data repositories: an exploratory study4
Visualization algorithm based on FDR control testing for dimension reduction of textual data3
CA-CD: context-aware clickbait detection using new Chinese clickbait dataset with transfer learning method3
Channel attention-based spatial-temporal graph neural networks for traffic prediction3
A new approach for histological classification of breast cancer using deep hybrid heterogenous ensemble3
Risk assessment in machine learning enhanced failure mode and effects analysis3
SanMove: next location recommendation via self-attention network3
Construction of public security indicators based on characteristics of shared group behavior patterns3
The data-driven emergence of online opinion leaders: telecommunication fraud in Northern Myanmar3
Text mining the mission statements of the most ethical companies3
Social recruiting: an application of social network analysis for preselection of candidates3
Analysis of automated guided vehicles performance based on process mining techniques3
Measuring land lot shapes for property valuation3
0.46896409988403