Search Results for author: Michael Fire

Found 11 papers, 1 papers with code

Exploring Online Ad Images Using a Deep Convolutional Neural Network Approach

no code implementations2 Sep 2015 Michael Fire, Jonathan Schler

Our study looks at new qualities of ads that can be determined before an ad is shown (rather than online optimization) and defines which ads are most likely to be successful.

It Runs in the Family: Searching for Synonyms Using Digitized Family Trees

no code implementations9 Dec 2019 Aviad Elyashar, Rami Puzis, Michael Fire

As a result, there is a need for an effective tool for improved synonym suggestion.

How Does That Sound? Multi-Language SpokenName2Vec Algorithm Using Speech Generation and Deep Learning

no code implementations24 May 2020 Aviad Elyashar, Rami Puzis, Michael Fire

Searching for information about a specific person is an online activity frequently performed by many users.

Automatic Large Scale Detection of Red Palm Weevil Infestation using Aerial and Street View Images

no code implementations6 Apr 2021 Dima Kagan, Galit Fuhrmann Alpert, Michael Fire

The spread of the Red Palm Weevil has dramatically affected date growers, homeowners and governments, forcing them to deal with a constant threat to their palm trees.

CompanyName2Vec: Company Entity Matching Based on Job Ads

no code implementations12 Jan 2022 Ran Ziv, Ilan Gronau, Michael Fire

Entity Matching is an essential part of all real-world systems that take in structured and unstructured data coming from different sources.

Data Visualization

Co-Membership-based Generic Anomalous Communities Detection

no code implementations30 Mar 2022 Shay Lapid, Dima Kagan, Michael Fire

In this study, we introduce the Co-Membership-based Generic Anomalous Communities Detection Algorithm (referred as to CMMAC), a novel and generic method that utilizes the information of vertices co-membership in multiple communities.

Malicious Source Code Detection Using Transformer

no code implementations16 Sep 2022 Chen Tsfaty, Michael Fire

Those attacks are categorized as supply chain attacks.

Interruptions detection in video conferences

1 code implementation25 Feb 2023 Shmuel Horowitz, Dima Kagan, Galit Fuhrmann Alpert, Michael Fire

Here, we present a novel algorithm for detecting abnormal events in VC data.

Anomaly Detection

Short Run Transit Route Planning Decision Support System Using a Deep Learning-Based Weighted Graph

no code implementations24 Aug 2023 Nadav Shalit, Michael Fire, Dima Kagan, Eran Ben-Elia

These lateness values are then utilized as edge weights in the transportation graph, enabling efficient path searching.

Analyzing Key Users' behavior trends in Volunteer-Based Networks

no code implementations4 Oct 2023 Nofar Piterman, Tamar Makov, Michael Fire

Using our algorithm, we identified four main types of key user behavior patterns that occur over time.

Cannot find the paper you are looking for? You can Submit a new open access paper.