標題: Titlebook: Big Data Technologies and Applications; 10th EAI Internation Zeng Deze,Huan Huang,Naveen Chilamkurti Conference proceedings 2021 ICST Insti [打印本頁] 作者: 聲音會爆炸 時間: 2025-3-21 18:23
書目名稱Big Data Technologies and Applications影響因子(影響力)
書目名稱Big Data Technologies and Applications影響因子(影響力)學科排名
書目名稱Big Data Technologies and Applications網(wǎng)絡公開度
書目名稱Big Data Technologies and Applications網(wǎng)絡公開度學科排名
書目名稱Big Data Technologies and Applications被引頻次
書目名稱Big Data Technologies and Applications被引頻次學科排名
書目名稱Big Data Technologies and Applications年度引用
書目名稱Big Data Technologies and Applications年度引用學科排名
書目名稱Big Data Technologies and Applications讀者反饋
書目名稱Big Data Technologies and Applications讀者反饋學科排名
作者: Ingredient 時間: 2025-3-21 21:24
https://doi.org/10.1007/978-3-319-53103-8different time nodes based on aggregate data and sequence data. The experimental results show that sequence data is more effective than aggregate data to predict learning results. The prediction AUC of RF model on sequence data is 0.77 at the lowest and 0.83 at the highest, the prediction AUC of CAR作者: PACT 時間: 2025-3-22 03:07 作者: 偶然 時間: 2025-3-22 06:02
https://doi.org/10.1007/978-1-349-08039-7ditional sophisticated features, while also new techniques and tools are frequently introduced as a result of the undergoing research activities. Nevertheless, despite the large efforts and investments on research and innovation, the Big Data technologies introduce also a number of challenges to its作者: inculpate 時間: 2025-3-22 12:02 作者: 萬花筒 時間: 2025-3-22 14:11
The Vicinity of the Critical Point,or Machine (SVM) for improving performance of activity recognition. We also applied feature selection method to the collected data to decrease time complexity and increase the performance. Many experiments are conducted in this work to evaluate performance of the presented technique with human activ作者: bacteria 時間: 2025-3-22 20:23 作者: 加劇 時間: 2025-3-23 01:00 作者: 明確 時間: 2025-3-23 03:13
Constructing Knowledge Graph for Prognostics and Health Management of On-board Train Control System nabled training models, which reveal the distribution of the feature importance and quantitatively evaluate the fault correlation of all related features. The presented scheme is demonstrated by a big data platform with incremental field data sets from railway operation process. Case study results s作者: HPA533 時間: 2025-3-23 05:38
Early Detecting the At-risk Students in Online Courses Based on Their Behavior Sequencesdifferent time nodes based on aggregate data and sequence data. The experimental results show that sequence data is more effective than aggregate data to predict learning results. The prediction AUC of RF model on sequence data is 0.77 at the lowest and 0.83 at the highest, the prediction AUC of CAR作者: Kidnap 時間: 2025-3-23 10:07
Do College Students Adapt to Personal Learning Environment (PLE)? A Single-Group Studyironment, which is manifested in three aspects: perceived attention discontinuity, lingering thought, social media notification.; Under simple training or natural conditions, students have poor adaptability in the personal learning environment, and their behavior perception and behavior adjustment l作者: 溫順 時間: 2025-3-23 15:30
A Big Data Intelligence Marketplace and Secure Analytics Experimentation Platform for the Aviation Iditional sophisticated features, while also new techniques and tools are frequently introduced as a result of the undergoing research activities. Nevertheless, despite the large efforts and investments on research and innovation, the Big Data technologies introduce also a number of challenges to its作者: choroid 時間: 2025-3-23 20:48
NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systemshe following four existing benchmark NIDS datasets: UNSW-NB15, BoT-IoT, ToN-IoT, and CSE-CIC-IDS2018. We have used the raw packet capture files of these datasets, and converted them to the NetFlow format, with a common feature set. The benefits of using NetFlow as a common format include its practic作者: PARA 時間: 2025-3-24 01:13 作者: 泥瓦匠 時間: 2025-3-24 06:13
Spectrum Sensing and Prediction for 5G Radioa single resource block (RB). The results have been obtained for two different datasets: the 5G downlink signal with representation of daily traffic fluctuations and the sensor-network uplink signal characteristic for IoT. The obtained results prove DL algorithms usefulness for spectrum occupancy pr作者: thalamus 時間: 2025-3-24 10:34 作者: Epidural-Space 時間: 2025-3-24 13:59 作者: 制定法律 時間: 2025-3-24 17:47
1867-8211 nd communicating networks, wireless communication security, green wireless network architectures and IoT based applications..978-3-030-72801-4978-3-030-72802-1Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 煤渣 時間: 2025-3-24 20:18
Further Developments and Applications,he detectors is significantly affected by different noise models. In any case, the detection probability of KNN algorithm is the highest; the performance of MF is much better than ED under different noise models; KNN is not sensitive to noise uncertainty; MF has better performance on noise uncertainty which makes ED performance decline fleetly.作者: 不能約 時間: 2025-3-25 02:24
Performance Evaluation of Energy Detection, Matched Filtering and KNN Under Different Noise Modelshe detectors is significantly affected by different noise models. In any case, the detection probability of KNN algorithm is the highest; the performance of MF is much better than ED under different noise models; KNN is not sensitive to noise uncertainty; MF has better performance on noise uncertainty which makes ED performance decline fleetly.作者: 半導體 時間: 2025-3-25 07:17
Conference proceedings 20212020, and the 13.th. International Conference on Wireless Internet, WiCON 2020, held in December 2020. Due to COVID-19 pandemic the conference was held virtually.. The 9 full papers of BDTA 2020 were selected from 22 submissions and present all big data technologies, such as storage, search and mana作者: jealousy 時間: 2025-3-25 10:14
Research on the Sharing and Application of TCM Digital Resourcestionnaire survey was conducted among teachers and students in the major of TCM acupuncture in a TCM university. On this basis, suggestions on the application of digital resources in TCM acupuncture courses were proposed.作者: 使閉塞 時間: 2025-3-25 15:35 作者: CERE 時間: 2025-3-25 19:31 作者: Palpable 時間: 2025-3-25 21:40 作者: 詞根詞綴法 時間: 2025-3-26 03:43 作者: 真繁榮 時間: 2025-3-26 07:11 作者: 旋轉一周 時間: 2025-3-26 08:30 作者: 不舒服 時間: 2025-3-26 13:09 作者: Synapse 時間: 2025-3-26 19:30
Introducing and Benchmarking a One-Shot Learning Gesture Recognition Dataset. Moreover, 3 one-shot learning classification approaches are benchmarked on the dataset, exploiting two different deep learning classifiers. The results of the benchmark depict the difficulty of the one-shot learning task, exposing new challenges for wearable gesture/activity recognition.作者: SEED 時間: 2025-3-26 23:20
Research on User Privacy Security of China’s Top Ten Online Game Platformsthe protection of users’ private information through improving information security protection system of online game platforms, adding the option for access denial of privacy information in the process of user registration, and mandatorily prolonging the time assigned for users to read the privacy agreements.作者: Antigen 時間: 2025-3-27 02:52
Constructing Knowledge Graph for Prognostics and Health Management of On-board Train Control System ty and cost efficiency from a full life cycle perspective, the establishment of a Condition-based Maintenance (CBM) scheme will be beneficial to both the currently in use and next generation train control systems. Due to the complexity of the fault mechanism of on-board train control system, a data-作者: IRATE 時間: 2025-3-27 06:53
Early Detecting the At-risk Students in Online Courses Based on Their Behavior Sequencesf learning results, to identify students at risk in time and accurately. We select nine online learning behaviors from one course in Moodle, take one week as the basic unit and 5?weeks as the time node of learning behavior, and the aggregate data and sequence data of the first 5?weeks, the first 10?作者: Ornament 時間: 2025-3-27 10:16 作者: 無瑕疵 時間: 2025-3-27 14:11 作者: frozen-shoulder 時間: 2025-3-27 21:41 作者: Germinate 時間: 2025-3-28 00:22 作者: Recess 時間: 2025-3-28 02:44
Introducing and Benchmarking a One-Shot Learning Gesture Recognition Dataseters wearing electronic devices. However, the collected datasets are built in an old fashioned way, mostly comprised of subjects that perform many times few different gestures/activities. This paper addresses the lack of a wearable gesture recognition dataset for exploring one-shot learning technique作者: 共棲 時間: 2025-3-28 07:27
NetFlow Datasets for Machine Learning-Based Network Intrusion Detection Systemsrange of datasets are publicly available and have been used for the development and evaluation of a large number of ML-based NIDS in the research community. However, since these NIDS datasets have very different feature sets, it is currently very difficult to reliably compare ML models across differ作者: exquisite 時間: 2025-3-28 13:25 作者: 拋射物 時間: 2025-3-28 17:39
Hybrid Deep-Readout Echo State Network and Support Vector Machine with Feature Selection for Human A systems are based on recognizing Activities of Daily Living (ADLs) for providing a suitable decision. Activity recognition systems are currently employed in developing many smart technologies (e.g., smart mobile phone) and their uses have been increased dramatically with availability of Internet of作者: 赤字 時間: 2025-3-28 20:39
Research on User Privacy Security of China’s Top Ten Online Game Platformsto users’ private information by setting various mandatory clauses. This paper takes the ten most popular online game platforms in China in recent years as examples, using documentary analysis and quantitative analysis to analyze their privacy clauses. The research results show that there are loopho作者: 一個姐姐 時間: 2025-3-28 23:50
Spectrum Sensing and Prediction for 5G Radiotrum band at a given moment. This approach enables a secondary user (SU) to dynamically access the spectrum without interfering primary user’s (PU) transmission. The known methods of signal detection or spectrum sensing (SS) enable making decision on spectrum occupancy by SU. The machine learning (M作者: Grandstand 時間: 2025-3-29 04:08
Towards Preventing Neighborhood Attacks: Proposal of a New Anonymization’s Approach for Social Netwooaches for databases have been adopted to anonymize social network data and prevent the various possible attacks on these networks. In this paper, we will identify an important type of attack on privacy in social networks: “neighborhood attacks”. But it is observed that the existing anonymization me作者: PAC 時間: 2025-3-29 09:08 作者: PANIC 時間: 2025-3-29 13:03 作者: CLOWN 時間: 2025-3-29 17:57 作者: KIN 時間: 2025-3-29 22:06
https://doi.org/10.1007/978-3-319-53103-8f learning results, to identify students at risk in time and accurately. We select nine online learning behaviors from one course in Moodle, take one week as the basic unit and 5?weeks as the time node of learning behavior, and the aggregate data and sequence data of the first 5?weeks, the first 10?作者: Enteropathic 時間: 2025-3-30 00:11 作者: 樂章 時間: 2025-3-30 07:33
https://doi.org/10.1007/978-1-349-08039-7ident in the aviation industry that is disrupted also by the latest advances in sensor technologies, IoT devices and cyber-physical systems and their adoption in aircrafts and other aviation-related products or services. The unprecedented volume, diversity and richness of aviation data that can be a作者: unstable-angina 時間: 2025-3-30 10:43 作者: 離開就切除 時間: 2025-3-30 12:42 作者: 蒙太奇 時間: 2025-3-30 20:10 作者: 小溪 時間: 2025-3-31 00:17 作者: Legend 時間: 2025-3-31 02:51
Further Developments and Applications,inent security problems of wireless network. At the same time, it is more difficult to detect and identify users in wireless network environment due to the influence of noise. In this paper, the performance of energy detection (ED), matched filtering (MF) and K-nearest neighbor algorithm (KNN) are a作者: Exaggerate 時間: 2025-3-31 05:30