標(biāo)題: Titlebook: Big Data Technologies and Applications; 11th and 12th EAI In Rui Hou,Huan Huang,Hossam M. Zawbaa Conference proceedings 2023 ICST Institute [打印本頁(yè)] 作者: deflate 時(shí)間: 2025-3-21 17:07
書目名稱Big Data Technologies and Applications影響因子(影響力)
書目名稱Big Data Technologies and Applications影響因子(影響力)學(xué)科排名
書目名稱Big Data Technologies and Applications網(wǎng)絡(luò)公開度
書目名稱Big Data Technologies and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Big Data Technologies and Applications被引頻次
書目名稱Big Data Technologies and Applications被引頻次學(xué)科排名
書目名稱Big Data Technologies and Applications年度引用
書目名稱Big Data Technologies and Applications年度引用學(xué)科排名
書目名稱Big Data Technologies and Applications讀者反饋
書目名稱Big Data Technologies and Applications讀者反饋學(xué)科排名
作者: antecedence 時(shí)間: 2025-3-22 00:01 作者: 密切關(guān)系 時(shí)間: 2025-3-22 00:26
Big Data Technologies and Applications978-3-031-33614-0Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 藐視 時(shí)間: 2025-3-22 06:09 作者: intimate 時(shí)間: 2025-3-22 12:32
Critical Phenomena: a Reminder,es for the development breakdown. Main practices of RE processes are specification and elicitation, verification, cooperation, and implementation management. Since ULS systems are increasing in complexity and difficulty, it has observed a growing call for smart modules, methods, and applications tha作者: FOIL 時(shí)間: 2025-3-22 15:36 作者: 眼界 時(shí)間: 2025-3-22 18:20 作者: FORGO 時(shí)間: 2025-3-23 00:39
Lecture Notes in Physics Monographsjection or oral dose. Immunization is the process of receiving the vaccine and developing an immunity to the disease after receiving it. By compiling immunization information into a single trustworthy source, Immunization information systems (IIS) assist healthcare professionals, families, and publi作者: PON 時(shí)間: 2025-3-23 04:40
Outlook: Beyond the Conformal Group,orruption is by definition hidden from the public’s perspective, increasing the transparency and scrutiny of governmental acts can help prevent corruption. Therefore, increasing the transparency of government operations and decision-making should be the ultimate goal of an anticorruption campaign in作者: 愉快么 時(shí)間: 2025-3-23 06:05
The Vicinity of the Critical Point,ors, a system fulfilling the big data requirements should be designed. In this work, we reviewed the important nonfunctional requirements, in particular big data-based ones. Moreover, we dug out a conventional IoT architecture to address these requirements. Finally, we designed a brokering based arc作者: gout109 時(shí)間: 2025-3-23 11:29
Lecture Notes in Physics Monographsexisted for a number of decades, recent advanced directions are accelerating what AI could do. One of these directions is education; those in charge of reforming education must consider the effects of an AI-driven future on education. However, various risks and issues are unavoidably brought on by t作者: 干旱 時(shí)間: 2025-3-23 16:49
Introduction to Constraint Databasescer, inflammatory diseases, other diseases, and pathology. Many studies found that ML-based systems can be better than humans in more critical tasks. The study of liver disease diagnosis is very important, especially the diagnosis of hepatic virus diseases, which are among the most problems facing t作者: Ophthalmologist 時(shí)間: 2025-3-23 19:49
Introduction to Constraint Databaseseakthroughs and is widely applied in numerous optimization issues across different fields such as image processing, machine learning, engineering design, control over wireless networking, power systems, and other things. In this study, we review the literature that is currently accessible on the gra作者: BRIEF 時(shí)間: 2025-3-23 22:56 作者: 詞匯表 時(shí)間: 2025-3-24 06:14
Introduction to Constraint Databasesr future performance by providing information about past performance. However, little is known about the impact of processual feedback on learners’ subsequent performance. This study aims to uncover the relationship between procedural score feedback, time allocation, and learning outcome, for which 作者: patriot 時(shí)間: 2025-3-24 08:27 作者: 去掉 時(shí)間: 2025-3-24 12:56
Aggregation and Negation Queries,ese same factors have, however, also increased the range and speed at which misinformation and fake news spread. While machine-run accounts (bots) contribute significantly to the spread of misinformation, human users on these platforms also play a key role in contributing to the spread. Thus, there 作者: 蛤肉 時(shí)間: 2025-3-24 16:07 作者: 充滿裝飾 時(shí)間: 2025-3-24 21:58 作者: 男生如果明白 時(shí)間: 2025-3-24 23:15 作者: PARA 時(shí)間: 2025-3-25 05:54 作者: Sciatica 時(shí)間: 2025-3-25 08:44 作者: forbid 時(shí)間: 2025-3-25 12:06
Introduction to Constraint DatabasesCP flood within the shortest runtime. The evaluation further showed that proposed DoS detection method is better than the most related work where it achieved detection with F1-score of 0.989 and with the shortest latency.作者: 旋轉(zhuǎn)一周 時(shí)間: 2025-3-25 18:01
A Proposed Framework for Cloud Immunization Information System: Challenges and Opportunitieses that are preventable by vaccination..This paper seeks to identify the immunization information systems (IIS) concept its functions, clarify why it is important, propose a framework of cloud Immunization information systems, discuss the levels of this framework and its goals, challenges, and opportunities.作者: 有發(fā)明天才 時(shí)間: 2025-3-25 23:36 作者: 坦白 時(shí)間: 2025-3-26 01:15 作者: 鍵琴 時(shí)間: 2025-3-26 07:01
Conference proceedings 2023ications, BDTA 2021 and BDTA 2022, held in December 2021 and 2022. Due to COVID-19 pandemic both conferences were held virtually.. The 23 full papers of BDTA 2021 and BDTA 2022 were selected from?61?submissions and present all big data technologies, such as big data collection and storage, big data 作者: 意外 時(shí)間: 2025-3-26 10:52
Introduction to Constraint Databaseson the early detection of Liver Hepatitis, particularly virus B. In this paper, we surveyed machine and deep-learning liver disease diagnosis, particularly hepatitis B, and we demonstrated the findings of previous experimental studies and results, as well as the limitations and future work that is suggested in this area.作者: 藕床生厭倦 時(shí)間: 2025-3-26 15:07 作者: Ringworm 時(shí)間: 2025-3-26 20:46 作者: thrombosis 時(shí)間: 2025-3-26 22:40 作者: Infelicity 時(shí)間: 2025-3-27 02:17 作者: 聯(lián)想記憶 時(shí)間: 2025-3-27 07:14 作者: 要控制 時(shí)間: 2025-3-27 09:44 作者: NIB 時(shí)間: 2025-3-27 15:16 作者: 啞劇 時(shí)間: 2025-3-27 21:43
Conference proceedings 2023of BDTA 2021 and BDTA 2022 were selected from?61?submissions and present all big data technologies, such as big data collection and storage, big data management and retrieval, big data mining approaches, big data visualization, and new domains and novel applications related to these technologies..作者: NAIVE 時(shí)間: 2025-3-28 01:36 作者: 傳授知識(shí) 時(shí)間: 2025-3-28 02:05
Introduction to Constraint Databasesique to prepare and classify a big Motion Capture Hand Postures dataset. It builds the solutions via Tri-training and Co-forest techniques and compares them to figure out the best-fitted approach for hand posture classification. According to the results, Co-forest outperforms Tri-training in terms of Accuracy, Precision, recall, and F1-score.作者: CLOT 時(shí)間: 2025-3-28 08:18 作者: Spangle 時(shí)間: 2025-3-28 11:45
The Ising Model Correlation Functions,rds selection. We suggest applying Classifier Chains (CC) approach to convert classifying multi-labeled data problem into one or more problems of single labeling, and utilizing the hybrid stack classification model, which combines Machine Learning (ML) and Deep Learning (DL) approaches consist of Lo作者: judicial 時(shí)間: 2025-3-28 15:50 作者: Clinch 時(shí)間: 2025-3-28 19:09
Outlook: Beyond the Conformal Group, system is, and the more likely it is for covert corruption to proliferate. Only by enhancing audit mode, ensuring data quality, increasing audit efficiency, and reducing audit risk using blockchain technology can the corruption of executives of state-owned companies be effectively stopped.作者: capsaicin 時(shí)間: 2025-3-29 02:10 作者: Hallowed 時(shí)間: 2025-3-29 06:11
Introduction to Constraint Databasesprocedural score feedback and learning outcome. (3) time allocation for non-evaluative tasks does not mediate the relationship between procedural score feedback and learning outcome. The study suggests some potentially effective measures for MOOC teachers and developers to provide learners with proc作者: Soliloquy 時(shí)間: 2025-3-29 07:30
Aggregation and Negation Queries,a on the number of the user’s followers and retweet potential in order to generate the user’s impact factor. Experiments are performed using data collected from Twitter and the results show the effectiveness of the proposed approach in identifying fake news spreaders.作者: 偏見 時(shí)間: 2025-3-29 11:34 作者: 壓迫 時(shí)間: 2025-3-29 19:22 作者: 大喘氣 時(shí)間: 2025-3-29 20:59
Using Requirements Clustering to Discover Dependent Requirements for Hidden Impact Analysisroactively strengthen “Measuring Change Ripple Effect”, Third, new ideas need to be discussed and future research explored. We have used Natural Language Processing (NLP) and Similarity Models to support the model.作者: Obliterate 時(shí)間: 2025-3-30 00:41 作者: deface 時(shí)間: 2025-3-30 05:12
A Comparative Study for Anonymizing Datasets with Multiple Sensitive Attributes and Multiple Recordsility and privacy, for this data while reducing information loss and misuse. The objective of this paper is to use different methods and different anonymization algorithms, like the 1:m-generalization algorithm and Mondrian, and compare them to show which of them maintains data privacy and high util作者: single 時(shí)間: 2025-3-30 10:30
The Role of Block Chain Technology in Reducing Corruption Within the Local Governance in Egypt system is, and the more likely it is for covert corruption to proliferate. Only by enhancing audit mode, ensuring data quality, increasing audit efficiency, and reducing audit risk using blockchain technology can the corruption of executives of state-owned companies be effectively stopped.作者: Adornment 時(shí)間: 2025-3-30 16:17 作者: IRATE 時(shí)間: 2025-3-30 17:33 作者: 難管 時(shí)間: 2025-3-30 22:39
Detecting Fake News Spreaders on?Twitter Through Follower Networksa on the number of the user’s followers and retweet potential in order to generate the user’s impact factor. Experiments are performed using data collected from Twitter and the results show the effectiveness of the proposed approach in identifying fake news spreaders.作者: 大量殺死 時(shí)間: 2025-3-31 01:34 作者: 倫理學(xué) 時(shí)間: 2025-3-31 07:58 作者: 織布機(jī) 時(shí)間: 2025-3-31 10:32
Using Requirements Clustering to Discover Dependent Requirements for Hidden Impact Analysises for the development breakdown. Main practices of RE processes are specification and elicitation, verification, cooperation, and implementation management. Since ULS systems are increasing in complexity and difficulty, it has observed a growing call for smart modules, methods, and applications tha