標題: Titlebook: Artificial Intelligence and Machine Learning; First International Hai Jin,Yi Pan,Jianfeng Lu Conference proceedings 2024 The Editor(s) (if [打印本頁] 作者: CLOG 時間: 2025-3-21 20:05
書目名稱Artificial Intelligence and Machine Learning影響因子(影響力)
書目名稱Artificial Intelligence and Machine Learning影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence and Machine Learning網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence and Machine Learning網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence and Machine Learning被引頻次
書目名稱Artificial Intelligence and Machine Learning被引頻次學(xué)科排名
書目名稱Artificial Intelligence and Machine Learning年度引用
書目名稱Artificial Intelligence and Machine Learning年度引用學(xué)科排名
書目名稱Artificial Intelligence and Machine Learning讀者反饋
書目名稱Artificial Intelligence and Machine Learning讀者反饋學(xué)科排名
作者: 卜聞 時間: 2025-3-21 22:49
Artificial Intelligence and Machine Learning978-981-97-1277-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: overhaul 時間: 2025-3-22 04:22 作者: 地牢 時間: 2025-3-22 06:53
978-981-97-1276-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: 傾聽 時間: 2025-3-22 11:01
https://doi.org/10.1007/978-1-349-18048-6phenomena during the printing process. Effective detection of machine printed page numbers is of great practical significance for improving the efficiency of archive organization work; A machine printed page anomaly detection method based on multi-scale self attention encoding decoding is proposed t作者: neologism 時間: 2025-3-22 15:18 作者: Ordnance 時間: 2025-3-22 20:21 作者: florid 時間: 2025-3-22 23:26 作者: ostracize 時間: 2025-3-23 02:14
Self System: First Order Knowledge Domain train a global model through coordination by a central server while ensuring the privacy of data on individual edge devices. However, the data on edge devices that participate in FL training are not independently and identically distributed (IID), resulting in challenges related to heterogeneity da作者: employor 時間: 2025-3-23 05:59
Self System: First Order Knowledge Domainction tasks. This paper systematically reviews relation extraction techniques based on deep learning, including the application of convolutional neural networks, recurrent neural networks and Transformer models. Firstly, it introduces the representative applications of these three models. Then, rela作者: 有組織 時間: 2025-3-23 12:33 作者: Fracture 時間: 2025-3-23 14:06 作者: 陰謀小團體 時間: 2025-3-23 18:07
George W. Noblit,Allison Daniel Anders, and the security of their systems is usually reflected in traces, logs, and some monitoring information, which record inter-service interactions and intra-service behaviors, respectively. Existing attack detection methods require a lot of manual intervention to label the data and have a large over作者: 小溪 時間: 2025-3-24 01:41
https://doi.org/10.1007/978-3-031-58827-3 Internet users and developers. SQL injection attack is an attacker implanting malicious SQL statements into legitimate user inputs, which leaks or tampers with the information of the database system, thus leading to serious security problems. To solve the above security problems, this paper carries作者: 胰島素 時間: 2025-3-24 06:04
George W. Noblit,Allison Daniel Anders only a very small number of labels and the problem of pseudo-label confirmation bias, we propose a novel SSL method, RSCC, which combines the powerful representation learning capability of contrast learning with augmentation consistency regularization methods and introduces a symmetric cross-entrop作者: Exonerate 時間: 2025-3-24 08:10
Allison Daniel Anders,George W. Noblitance in addressing issues in few-shot settings. Traditional prototypical networks face issues such as inaccurate representation of O-class entities and poor distribution of entity prototypes. This paper presents an Enhanced Prototypical Network (EPN) for few-shot Named Entity Recognition, mainly inc作者: 我怕被刺穿 時間: 2025-3-24 11:16
George W. Noblit,Allison Daniel Andersporting power energy scheduling and market transactions. However, as key data acquisition devices, the operation performance of ultra-high voltage substation energy meters exhibits instability under different environmental conditions, and even small metering errors can lead to significant discrepanc作者: 地殼 時間: 2025-3-24 17:52
Allison Daniel Anders,George W. Noblit that combines Vision Transformer (ViT) and GAN. This network can accurately identify missing facial features and perform detailed and efficient restoration. Secondly, for the task of expression recognition, a more robust dynamic expression recognition network is trained by cascading ViT with a Two-作者: 縮短 時間: 2025-3-24 22:46 作者: 爭吵加 時間: 2025-3-24 23:44
Crafting a Postcritical Compassy used a deep learning approach to automatically identify and analyze three visu-ally distinct behaviors (exiting behavior, wandering behavior, and entering be-havior) in dolphins. Using data directly from video recordings by both drones and handheld cameras, an action recognition model trained on t作者: 不斷的變動 時間: 2025-3-25 06:12
Allison Daniel Anders,George W. Noblitnt problem. In this paper, we propose an audio copy-move forgery detection algorithm based on the fusion of mel frequency cepstrum coefficient and gammatone frequency cepstrum coefficient feature fusion. Firstly, the algorithm extracts the voiced speech segments in the audio using the algorithm of v作者: TERRA 時間: 2025-3-25 09:08
,Evo-Devo – das Beste aus zwei Welten,nsors or sources based on certain standards so as to achieve the required decisions and estimates, and it includes two types of information, homogeneous information and heterogeneous information. MSIF is also referred as multi-sensor information fusion. Rough set theory (RST) provides an effective m作者: 平項山 時間: 2025-3-25 13:24 作者: Counteract 時間: 2025-3-25 17:57
Machine Printed Page Number Anomaly Detection Method Based on Multi-scale Self Attention Encoding Dphenomena during the printing process. Effective detection of machine printed page numbers is of great practical significance for improving the efficiency of archive organization work; A machine printed page anomaly detection method based on multi-scale self attention encoding decoding is proposed t作者: intoxicate 時間: 2025-3-25 22:30
A Novel MEC Framework for Extractive Summarization Using Semantic Role Graph and Semantic Matching,deal with them anytime and anywhere through different terminal devices. Among which, text information usually costs too much time for length and redundancy. Hence, providing an efficient text summarization approach is quite necessary. However, such approaches usually depend on artificial intelligenc作者: dermatomyositis 時間: 2025-3-26 01:27 作者: 高射炮 時間: 2025-3-26 06:50 作者: 輕彈 時間: 2025-3-26 12:15
,A Review of?Solving Non-IID Data in?Federated Learning: Current Status and?Future Directions, train a global model through coordination by a central server while ensuring the privacy of data on individual edge devices. However, the data on edge devices that participate in FL training are not independently and identically distributed (IID), resulting in challenges related to heterogeneity da作者: 迷住 時間: 2025-3-26 12:48 作者: excrete 時間: 2025-3-26 17:04
BERT and LLM-Based Multivariate Hate Speech Detection on Twitter: Comparative Analysis and Superiorsequences it can cause. Previous research has demonstrated the vital role that machine learning and natural language processing models have in identifying inappropriate language. In this study, the aim is to assess the viability of BERT for accurately predicting multivariate classifications related 作者: Colonoscopy 時間: 2025-3-27 00:32
Deep Learning for Protein-Protein Contact Prediction Using Evolutionary Scale Modeling (ESM) Featurction and drug design. Traditional experimental methods for identifying these sites are expensive and time-consuming, prompting the emergence of computational forecasting tools. However, the performance of these tools tends to be limited due to single experimental training data and other limitations作者: aqueduct 時間: 2025-3-27 02:55
FedTag: Towards Automated Attack Investigation Using Federated Learning,, and the security of their systems is usually reflected in traces, logs, and some monitoring information, which record inter-service interactions and intra-service behaviors, respectively. Existing attack detection methods require a lot of manual intervention to label the data and have a large over作者: 欄桿 時間: 2025-3-27 08:54 作者: 固定某物 時間: 2025-3-27 13:20 作者: 輕打 時間: 2025-3-27 15:41
Enhanced Prototypical Network for Few-Shot Named Entity Recognition,ance in addressing issues in few-shot settings. Traditional prototypical networks face issues such as inaccurate representation of O-class entities and poor distribution of entity prototypes. This paper presents an Enhanced Prototypical Network (EPN) for few-shot Named Entity Recognition, mainly inc作者: tattle 時間: 2025-3-27 20:35
Regularized DNN Based Adaptive Compensation Algorithm for Gateway Power Meter in Ultra-High Voltageporting power energy scheduling and market transactions. However, as key data acquisition devices, the operation performance of ultra-high voltage substation energy meters exhibits instability under different environmental conditions, and even small metering errors can lead to significant discrepanc作者: 被詛咒的人 時間: 2025-3-27 23:25 作者: 緩解 時間: 2025-3-28 04:51
Contrastive Learning Based on AMR Graph for Logic Reasoning,recent years, more challenging MRC datasets have been introduced, such as ReClor and LogiQA datasets. These datasets place a greater emphasis on evaluating the logical reasoning abilities of models. To enhance the model‘s logical reasoning capabilities, we propose the AMR-CL method, a contrastive le作者: 色情 時間: 2025-3-28 07:36 作者: Pudendal-Nerve 時間: 2025-3-28 12:40 作者: 暗指 時間: 2025-3-28 16:01
,A Survey of?Homogeneous and?Heterogeneous Multi-source Information Fusion Based on?Rough Set Theorynsors or sources based on certain standards so as to achieve the required decisions and estimates, and it includes two types of information, homogeneous information and heterogeneous information. MSIF is also referred as multi-sensor information fusion. Rough set theory (RST) provides an effective m作者: FIG 時間: 2025-3-28 19:01 作者: Postulate 時間: 2025-3-29 02:27 作者: Fissure 時間: 2025-3-29 03:35
Crafting a Postcritical Compasshis data achieved high levels of accuracy (0.99 for exiting, 0.92 for wandering, and 0.88 for entering). The method is the first to achieve visual action recognition of dol-phins behavior, opening new possibilities for using large datasets in dolphins research.作者: 邊緣帶來墨水 時間: 2025-3-29 08:46 作者: ARC 時間: 2025-3-29 15:04 作者: 不能約 時間: 2025-3-29 19:08
George W. Noblit,Allison Daniel Anders ultra-high voltage substation energy meter based on regularized deep neural networks (DNN) to enhance metering accuracy. Finally, the effectiveness of this algorithm is validated through simulation experiments.作者: dragon 時間: 2025-3-29 20:21
Allison Daniel Anders,George W. Noblitt is calculated by using the dynamic time warping algorithm, and the part with the DTW distance less than the threshold is determined to be copy-move forgery. The experiments on publicly available replicated mobile forgery databases show that the algorithm not only enables precise localization of tampered audio, but also has high robustness.作者: 撕裂皮肉 時間: 2025-3-30 03:07 作者: 分開 時間: 2025-3-30 07:31
RSCC: Robust Semi-supervised Learning with Contrastive Learning and Augmentation Consistency Regulathods of augmentation consistency regularization and symmetric cross-entropy learning. We conduct rich experiments, which show that RSCC achieves state-of-the-art accuracy on multiple datasets, such as CIFAR-10 and CIFAR-100, especially when labeled data is extremely scarce. This underscores its cutting-edge and effective performance.作者: 移植 時間: 2025-3-30 12:05
Regularized DNN Based Adaptive Compensation Algorithm for Gateway Power Meter in Ultra-High Voltage ultra-high voltage substation energy meter based on regularized deep neural networks (DNN) to enhance metering accuracy. Finally, the effectiveness of this algorithm is validated through simulation experiments.作者: 要控制 時間: 2025-3-30 13:54 作者: 職業(yè) 時間: 2025-3-30 19:09
Conference proceedings 2024ovember 2023.. The 85 full papers presented were carefully reviewed and selected from 428 submissions.?The papers are clustered in parts on: Artificial Intelligence and Machine Learning; Data Security and information Security; Computer Networks and IoT. The papers present recent research and develop作者: Receive 時間: 2025-3-30 21:59 作者: 和音 時間: 2025-3-31 01:24
Allison Daniel Anders,George W. Noblitits own prototype, to represent O-class entities more accurately. It also optimizes the distribution of entities in the feature space for better entity classification. Experimental results show that the model proposed in this paper improves performance on mainstream datasets.作者: 高貴領(lǐng)導(dǎo) 時間: 2025-3-31 06:00
A Review of Relationship Extraction Based on Deep Learning,elation extraction tasks, including data sparsity, long-distance dependency, and outlooks new techniques like weakly supervised relation extraction. This paper provides a systematic overview of deep learning techniques for relation extraction, aiming to facilitate further research in this field.作者: 檔案 時間: 2025-3-31 09:50
Enhanced Prototypical Network for Few-Shot Named Entity Recognition,its own prototype, to represent O-class entities more accurately. It also optimizes the distribution of entities in the feature space for better entity classification. Experimental results show that the model proposed in this paper improves performance on mainstream datasets.作者: 割讓 時間: 2025-3-31 15:20
1865-0929 hina, in November 2023.. The 85 full papers presented were carefully reviewed and selected from 428 submissions.?The papers are clustered in parts on: Artificial Intelligence and Machine Learning; Data Security and information Security; Computer Networks and IoT. The papers present recent research a作者: 間接 時間: 2025-3-31 20:54
,Automated Detection and?Recognition of?Wild Dolphin Behaviors Using Deep Learning,his data achieved high levels of accuracy (0.99 for exiting, 0.92 for wandering, and 0.88 for entering). The method is the first to achieve visual action recognition of dol-phins behavior, opening new possibilities for using large datasets in dolphins research.作者: Ornithologist 時間: 2025-4-1 01:39
1865-0929 nd developments in artificial intelligence and its applications in machine learning, natural language processing, computer vision, robotics, and ethical considerations..978-981-97-1276-2978-981-97-1277-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: affluent 時間: 2025-4-1 05:10 作者: fixed-joint 時間: 2025-4-1 07:00
The Problem of Evil in Reformed Thoughtined based on this framework depend largely on the summarization model used. Hence, we also propose an extractive summarization model using semantic role graph (SRG) and semantic matching model (SMM). First, construct a SRG based on the semantic roles obtained by semantic role labeling; then generat作者: 幼兒 時間: 2025-4-1 10:39
Evolution - Geschichte einer Ideeetwork for the specific task of link prediction. The experimental results shown that our method can achieve a significant improvement in the prediction accuracy of the paper citation link on the Cora dataset.作者: Accommodation 時間: 2025-4-1 16:52 作者: 表示向前 時間: 2025-4-1 20:20 作者: 充滿裝飾 時間: 2025-4-2 00:49
Self System: First Order Knowledge Domains, and design different attention mechanism models for feature learning in different dimensions. Experimental results show that our model performance has reached an advanced level and is ahead of other competing methods in several indicators.作者: 業(yè)余愛好者 時間: 2025-4-2 04:48