標(biāo)題: Titlebook: Advanced Intelligent Computing Technology and Applications; 20th International C De-Shuang Huang,Xiankun Zhang,Qinhu Zhang Conference proce [打印本頁] 作者: Lampoon 時間: 2025-3-21 18:11
書目名稱Advanced Intelligent Computing Technology and Applications影響因子(影響力)
書目名稱Advanced Intelligent Computing Technology and Applications影響因子(影響力)學(xué)科排名
書目名稱Advanced Intelligent Computing Technology and Applications網(wǎng)絡(luò)公開度
書目名稱Advanced Intelligent Computing Technology and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advanced Intelligent Computing Technology and Applications被引頻次
書目名稱Advanced Intelligent Computing Technology and Applications被引頻次學(xué)科排名
書目名稱Advanced Intelligent Computing Technology and Applications年度引用
書目名稱Advanced Intelligent Computing Technology and Applications年度引用學(xué)科排名
書目名稱Advanced Intelligent Computing Technology and Applications讀者反饋
書目名稱Advanced Intelligent Computing Technology and Applications讀者反饋學(xué)科排名
作者: cliche 時間: 2025-3-21 20:57 作者: Volatile-Oils 時間: 2025-3-22 01:29 作者: 預(yù)定 時間: 2025-3-22 05:51 作者: 無聊的人 時間: 2025-3-22 10:26
B. -D. Katthagen,R. Bonmann,K. -J. Storchy capture in recommendation systems. To address this, we propose MBTRec, a multimodal recommendation model based on the Transformer encoder. It employs an innovative bidirectional tower-type attention mechanism (Bi Towernet) for modal fusion, ensuring the independent contribution of each modality wh作者: 性學(xué)院 時間: 2025-3-22 16:16 作者: Confess 時間: 2025-3-22 18:12
Fortbildung Orthop?die - Traumatologieeither spatial relations among users or individual user behavior over time, lacking universality for various types of fraud. This work proposes a novel method for identifying fraudulent users on e-commerce platforms by combining temporal behavior patterns and spatial relationships. We use a Long Sho作者: 懦夫 時間: 2025-3-22 21:47 作者: 暴露他抗議 時間: 2025-3-23 04:12
Azetabuloplastik im Kleinkindesalterduce bias. Nevertheless, an ongoing controversy exists over the extent to which LLMs can grasp structured semantics. To assess this, we propose using Semantic Role Labeling (SRL) as a fundamental task to explore LLMs’ ability to extract structured semantics. In our assessment, we employ the promptin作者: laparoscopy 時間: 2025-3-23 08:26 作者: Grasping 時間: 2025-3-23 10:36 作者: periodontitis 時間: 2025-3-23 14:35 作者: 把…比做 時間: 2025-3-23 19:37
L. Claes,C. Burri,R. Neugebauer,U. Gruberstems based on social network graphs. Combining social network graphs with user-item graphs can capture dynamic preference features, achieving more accurate recommendations. However, user behavioral data often contains noise and is sparse, which may result in suboptimal model performance. To address作者: maculated 時間: 2025-3-24 00:41 作者: Stagger 時間: 2025-3-24 05:41 作者: resistant 時間: 2025-3-24 07:02 作者: incision 時間: 2025-3-24 12:16 作者: VALID 時間: 2025-3-24 16:18 作者: 宣誓書 時間: 2025-3-24 22:55
L. Claes,C. Burri,R. Neugebauer,U. Grubere opportunity to fully leverage pre-trained knowledge from single-pass models. This practice leads to increased training cost and complexity. In this paper, we propose a unified two-pass decoding framework comprising three core modules: a pre-trained Visual Encoder, a pre-trained Draft Decoder, and 作者: EVEN 時間: 2025-3-24 23:38
L. Claes,C. Burri,R. Neugebauer,U. Gruberations from text. This task has become challenging when dealing with complex sentences that encompass overlapping sub-events. To address this issue, we propose a novel ontology-aware neural approach for extracting overlapping events. Our approach consists of an Ontology-Aware Semantic Encoder (OASE)作者: 得意牛 時間: 2025-3-25 06:18
Habitus, Herkunft und Positionierunglucidating key facets of software vulnerabilities including impacted products, causation, and impacts. Collecting and analyzing TVD holds significant importance in the field of cybersecurity. In order to better analyze TVD, identify potential trends in software vulnerabilities, and reduce the occurr作者: Triglyceride 時間: 2025-3-25 07:29 作者: crescendo 時間: 2025-3-25 13:49
B. -D. Katthagen,R. Bonmann,K. -J. Storchest topics and uses Deep Canonical Correlation Analysis (DCCA) to explore the correlation between topics and multimodal information. Through dense incremental dynamic time windows, MBTRec captures users’ latest preferences and leverages the Transformer model to predict recommendation outcomes.作者: 膽大 時間: 2025-3-25 17:50 作者: 修剪過的樹籬 時間: 2025-3-26 00:03 作者: 圖畫文字 時間: 2025-3-26 01:25 作者: Expurgate 時間: 2025-3-26 05:55 作者: 培養(yǎng) 時間: 2025-3-26 09:22
Identifying the Fraudulent Users for E-commerce Applications Based on the Access Behaviors graph neural network to capture spatial patterns. Numerical experiments on real datasets validate the proposed scheme, demonstrating superior performance in detecting two types of fraud compared to existing methods.作者: nugatory 時間: 2025-3-26 15:02 作者: Neolithic 時間: 2025-3-26 17:35
0302-9743 82 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024...The total of 863 regular papers were carefully reviewed and selected from 2189 submissions...The intelligent computing annual conference primarily作者: venous-leak 時間: 2025-3-26 21:59 作者: Mediocre 時間: 2025-3-27 04:24 作者: 憤慨一下 時間: 2025-3-27 06:48
Heutiger Stand der Totalprothesen der Hüfteh (BAS) algorithm. The experimental result shows that the average recognition accuracy of the method are 95.8% and 96.7% on CWRU and IMS datasets, which proves that our model can effectively extract the fault features and determine the rolling bearing fault types more accurately.作者: meditation 時間: 2025-3-27 10:08 作者: 推崇 時間: 2025-3-27 14:46
Potential and Limitations of LLMs in Capturing Structured Semantics: A Case Study on SRLtructures, and scaling-up doesn‘t always mirror potential. Additionally, limitations of LLMs are observed in C-arguments, etc. Lastly, we are surprised to discover that significant overlap in the errors is made by both LLMs and untrained humans, accounting for almost 30% of all errors.作者: 租約 時間: 2025-3-27 17:56 作者: 抒情短詩 時間: 2025-3-27 23:25
IBAS-SVM Rolling Bearing Fault Diagnosis Method Based on Empirical Modal Characteristicsh (BAS) algorithm. The experimental result shows that the average recognition accuracy of the method are 95.8% and 96.7% on CWRU and IMS datasets, which proves that our model can effectively extract the fault features and determine the rolling bearing fault types more accurately.作者: Instrumental 時間: 2025-3-28 04:48 作者: 表狀態(tài) 時間: 2025-3-28 07:56 作者: 詳細目錄 時間: 2025-3-28 11:06
A Dynamic Collaborative Recommendation Method Based on Multimodal Fusiony capture in recommendation systems. To address this, we propose MBTRec, a multimodal recommendation model based on the Transformer encoder. It employs an innovative bidirectional tower-type attention mechanism (Bi Towernet) for modal fusion, ensuring the independent contribution of each modality wh作者: Countermand 時間: 2025-3-28 15:05
Image Classification Using Graph Regularized Independent Constraint Low-Rank Representationpace structures embedded in data. However, existing LRR algorithms do not take into account the influence of independence constraints, resulting in incomplete data structures. An innovative technique called image classification using graph regularized independent constraint low-rank representation (作者: LARK 時間: 2025-3-28 21:51 作者: antenna 時間: 2025-3-28 23:16
LIFT: Discriminant Classification Approach of Malware Family on Time Consistent Open Setdefenses. To address this, some approaches to Malware Open Set Recognition (MOSR) have been introduced, aiming to categorize known malware families and detect new ones. Nevertheless, current MOSR research tends to neglect the effect of time inconsistency within datasets, which can result in an overl作者: 南極 時間: 2025-3-29 05:41 作者: TOM 時間: 2025-3-29 09:34 作者: neologism 時間: 2025-3-29 14:54 作者: constitutional 時間: 2025-3-29 18:22
Globally Convergent Accelerated Algorithms for Multilinear Sparse Logistic Regression with ,-Constraultilinear Sparse Logistic Regression model with . norm constraints (.-MSLR). In contrast to the . norm and . norm, the . norm is more suitable for feature selection. However, due to its nonconvex and nonsmooth properties, solving .-MSLR is challenging and convergence guarantees are lacking. Additio作者: 試驗 時間: 2025-3-29 22:15 作者: BARB 時間: 2025-3-30 00:50 作者: intimate 時間: 2025-3-30 04:25 作者: 萬靈丹 時間: 2025-3-30 10:29
Graph Causal Contrastive for Partial Label Learning powerful for this, they often require substantial annotated data, which can be challenging due to graph sample complexity. Partial Label Learning (PLL) addresses this by allowing imprecise annotations, where each sample has multiple potential labels, with only one being true. Nevertheless, effectiv作者: crutch 時間: 2025-3-30 13:03
A Stacking Ensemble Deep Learning Model for Stock Price Forecastingchallenging problem. Existing research primarily focuses on constructing complex deep learning models to capture the intrinsic autocorrelation within stocks and to learn intricate nonlinear relationships from stock features. Despite the significant efficacy of deep learning in this domain, two limit作者: Deference 時間: 2025-3-30 16:42
Smart Trading: A Novel Reinforcement Learning Framework for Quantitative Trading in Noisy Marketsovides a state-of-the-art reinforcement learning framework for training agents to trade in markets, it lacks the necessary approaches to counteract market noise and boost the agent’s learning process in the complex environment. This paper proposes a novel reinforcement learning framework for quantit作者: Indicative 時間: 2025-3-30 21:02 作者: circuit 時間: 2025-3-31 01:46
Ontology-Aware Overlapping Event Extractionations from text. This task has become challenging when dealing with complex sentences that encompass overlapping sub-events. To address this issue, we propose a novel ontology-aware neural approach for extracting overlapping events. Our approach consists of an Ontology-Aware Semantic Encoder (OASE)作者: 發(fā)電機 時間: 2025-3-31 05:35
TVD-BERT: A Domain-Adaptation Pre-trained Model for Textural Vulnerability Descriptionslucidating key facets of software vulnerabilities including impacted products, causation, and impacts. Collecting and analyzing TVD holds significant importance in the field of cybersecurity. In order to better analyze TVD, identify potential trends in software vulnerabilities, and reduce the occurr作者: Neonatal 時間: 2025-3-31 11:23 作者: Obstreperous 時間: 2025-3-31 17:02 作者: 織布機 時間: 2025-3-31 18:49
https://doi.org/10.1007/3-7985-1555-7 paper is close to 500 us. The accuracy of the attack detection constructed on the I5-7200U platform finally reaches 97.39%, while on the I7-7700 platform, it reaches 99.31%. The CPU utilization from Sampling of hardware performance events falls below the 1%. The performance loss of the final build 作者: 招惹 時間: 2025-3-31 22:15 作者: Callus 時間: 2025-4-1 03:09