派博傳思國際中心

標(biāo)題: Titlebook: Big Data Technologies and Applications; 7th International Co Jason J. Jung,Pankoo Kim Conference proceedings 2017 ICST Institute for Comput [打印本頁]

作者: Nixon    時間: 2025-3-21 17:17
書目名稱Big Data Technologies and Applications影響因子(影響力)




書目名稱Big Data Technologies and Applications影響因子(影響力)學(xué)科排名




書目名稱Big Data Technologies and Applications網(wǎng)絡(luò)公開度




書目名稱Big Data Technologies and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Big Data Technologies and Applications被引頻次




書目名稱Big Data Technologies and Applications被引頻次學(xué)科排名




書目名稱Big Data Technologies and Applications年度引用




書目名稱Big Data Technologies and Applications年度引用學(xué)科排名




書目名稱Big Data Technologies and Applications讀者反饋




書目名稱Big Data Technologies and Applications讀者反饋學(xué)科排名





作者: 使熄滅    時間: 2025-3-22 00:00
https://doi.org/10.1007/978-1-349-15910-9 we solve the max-flow min-cut problem on large random graphs with log-normal distribution of outdegrees using the distributed Edmonds-Karp algorithm. The algorithm is implemented on a cluster using Spark. We compare the runtime between a single machine implementation and cluster implementation and
作者: 卡死偷電    時間: 2025-3-22 01:57

作者: convulsion    時間: 2025-3-22 05:37
https://doi.org/10.1007/978-1-4615-2712-1nsor nodes and improves energy efficiency by transmitting the data collected from cluster members by a cluster header to a sink node. Due to the frequency characteristics in a wireless communication environment, interference and collision may occur between neighboring clusters, which may lead causin
作者: Charade    時間: 2025-3-22 09:19
Fixed-Redundancy Error Control Schemes mining algorithms fail to predict rare class, as the class imbalanced data models are inherently built in favor of the majority of class-common characteristics among data instances. In the present paper, we propose the Euclidean distance- and standard deviation-based feature selection and over-samp
作者: 吹牛者    時間: 2025-3-22 13:34
Classes of Convolutional Codes and Encodersthods are taken into account movie content analysis using social network for discovering relationships among characters and so on. However, these methods have shown some unsatisfactorily in dynamic changing of multimedia contents such as the character’s relationships over time. For overcoming this i
作者: Ointment    時間: 2025-3-22 17:32

作者: Entirety    時間: 2025-3-23 00:48
Variable-Redundancy Error Control Schemesllect and introduce cultural heritage by geotagged resources were being focused on. The paper aims to deliver a way to collect geotagged cultural heritage resources from social networking services by using the keyword and user’s position (GPS signal) to deliver smart interactions between visitors in
作者: 后退    時間: 2025-3-23 04:26
Convolutional Codes and Encodersed from SIFT algorithms and learning stupa description from the generated key points with artificial neural network. Neural network was used for being the classifier for generating the description. We have presented a new approach to feature extraction based on analysis of key points and descriptors
作者: 疲勞    時間: 2025-3-23 07:31

作者: 噴出    時間: 2025-3-23 11:50
Introduction to Corporate Strategyation of the material removal, tool paths as well as valid setup positions of workpiece and periphery which leads mostly to high computational time. The descent of the computational effort includes a high portion of systems engineering. This contribution shows a theoretical concept to substitute com
作者: lesion    時間: 2025-3-23 17:46
Beneficial Aspects of Corrosion,tim’s system through the enactment of abnormal behavior, which is the locking of the victim’s system or the encryption of the system or files. Ransomware writers require money from victims as a condition for the recovery of the encrypted files and systems that have been seized; accordingly, systems
作者: BILK    時間: 2025-3-23 21:45
Crowd Properties and Characteristics,vel is linked with individual key used in embedding and revealing stages. Higher level secret is a share which is needed to reconstruct concealed data. It is possible that different shares contain various amount of information, what means that some of them may be more or less privileged. As a result
作者: ITCH    時間: 2025-3-23 22:14

作者: Morbid    時間: 2025-3-24 05:56
Cryosphere and Cryospheric Science,ulti signal ensembles by exploiting both intra- and inter-signal correlation and sparsity structure. In this paper, we propose a novel algorithm, which improves detection performance even without a priori-knowledge on the correlation structure for arbitrarily correlated sparse signal. Numerical resu
作者: 能夠支付    時間: 2025-3-24 08:44
https://doi.org/10.1007/978-981-16-6425-0tunity, a spreading based signal transmission technique is proposed to be used in the signal transmission of IoT. To alleviate the effects of rich scattering transmission environment and interferences from other devices, MMSE based interference cancellation combined with the receive beamforming is p
作者: Wordlist    時間: 2025-3-24 11:35
https://doi.org/10.1007/978-3-662-47974-2equire a knowledge management system which offers opportunities to work on one task with different organizations on the same time. Cooperative work in the field of setup preparation for production systems is one challenge for an efficiency and infallibly work preparation. One example is the validati
作者: Preamble    時間: 2025-3-24 16:13

作者: 臭名昭著    時間: 2025-3-24 22:22

作者: ADORN    時間: 2025-3-24 23:19
https://doi.org/10.1007/978-3-319-58967-1algorithms; artificial intelligence; big data; classification; data mining; data security; feature extract
作者: Consensus    時間: 2025-3-25 03:51
978-3-319-58966-4ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017
作者: HAIL    時間: 2025-3-25 11:04
Big Data Technologies and Applications978-3-319-58967-1Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: 踉蹌    時間: 2025-3-25 13:06
Handling Uncertainty in Clustering Art-Exhibition Visiting Styles from the interaction of visitors of a museum with a complex Internet of Things (IoT) framework. We model this data as a set of uncertain objects, and cluster them by employing the well-established UK-medoids algorithm. Results show that clustering accuracy is positively impacted when data uncertainty is taken into account.
作者: 切掉    時間: 2025-3-25 18:34
Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques, the secret can be decoded correctly in a number of ways. Therefore the main objective of this paper is to propose a system in which some users may hide additional shared secret in an inconspicuous manner.
作者: Derogate    時間: 2025-3-25 22:20

作者: 白楊魚    時間: 2025-3-26 01:27

作者: Musket    時間: 2025-3-26 07:29
1867-8211 ata, DiHuBiDa 2016.. The 17 revised full papers were carefully reviewed and selected from 25 submissions and handle theoretical foundations and practical applications which premise the new generation of data analytics and engineering..978-3-319-58966-4978-3-319-58967-1Series ISSN 1867-8211 Series E-ISSN 1867-822X
作者: 切碎    時間: 2025-3-26 12:13

作者: bifurcate    時間: 2025-3-26 14:38
1867-8211 data Technologies and Applications, BDTA 2016, held in Seoul, South Korea, in November 2016.? BDTA 2016 was collocated with the First International Workshop on Internet of Things, Social Network, and Security in Big Data, ISSB 2016 and the First International Workshop on Digital Humanity with Big D
作者: 山頂可休息    時間: 2025-3-26 18:43
Classes of Convolutional Codes and Encodersods have shown some unsatisfactorily in dynamic changing of multimedia contents such as the character’s relationships over time. For overcoming this issue, we proposed a novel method for extracting dynamic character network from a movie.
作者: exhibit    時間: 2025-3-27 00:05
Cryosphere and Cryospheric Science,h improves detection performance even without a priori-knowledge on the correlation structure for arbitrarily correlated sparse signal. Numerical results verify that the propose algorithm reduces the required number of measurements for correlated sparse signal detection compared to the existing DCS algorithm.
作者: 有偏見    時間: 2025-3-27 01:50

作者: 打谷工具    時間: 2025-3-27 07:40
Distributed Compressive Sensing for Correlated Information Sourcesh improves detection performance even without a priori-knowledge on the correlation structure for arbitrarily correlated sparse signal. Numerical results verify that the propose algorithm reduces the required number of measurements for correlated sparse signal detection compared to the existing DCS algorithm.
作者: 寬敞    時間: 2025-3-27 11:26
https://doi.org/10.1007/978-1-349-15910-9.001), while it showed no consistent associations with ALE. Conversely, HR decreased progressively with increasing ALE tertiles in females (P? 作者: Accessible    時間: 2025-3-27 13:37

作者: TAIN    時間: 2025-3-27 19:35

作者: Metastasis    時間: 2025-3-28 01:02
Feature Selection Techniques for Improving Rare Class Classification in Semiconductor Manufacturing are used to select the most appropriate features of the classification model. Third, to address the rare class over-fitting problem, oversampling is used. Finally, learning generates the fault detection prediction data-mining model. Furthermore, the prediction model is applied to measure the performance.
作者: 雜色    時間: 2025-3-28 04:11
Balance Principles in Continuum Mechanics, the methods of singular value decomposition were applied for demonstration in reduced dimensions (2 and 3). The data set is then projected to lower dimensions, using the prominent singular values. The proposed methods are tested with datasets from UCI Repository and compared.
作者: SENT    時間: 2025-3-28 08:07
Introduction to Corporate Strategytes valid workpiece positions. The contribution compares model approaches of inverse kinematic problems considering 5 axis tooling machine to determine valid setup positions and minimize theoretical calculation effort.
作者: MULTI    時間: 2025-3-28 13:01

作者: 文件夾    時間: 2025-3-28 17:17
Visualization of Mixed Attributed High-Dimensional Dataset Using Singular Value Decomposition the methods of singular value decomposition were applied for demonstration in reduced dimensions (2 and 3). The data set is then projected to lower dimensions, using the prominent singular values. The proposed methods are tested with datasets from UCI Repository and compared.
作者: GUILE    時間: 2025-3-28 22:44

作者: 審問    時間: 2025-3-29 01:30

作者: 大雨    時間: 2025-3-29 06:57

作者: Concrete    時間: 2025-3-29 10:19

作者: 絆住    時間: 2025-3-29 14:29

作者: 職業(yè)    時間: 2025-3-29 19:08
https://doi.org/10.1007/978-3-030-90012-0 on malwares and exploit them in classification. We evaluate our approach through a series of experiments with a real-world dataset labeled by a group of domain experts. The results show our approach is effective and provides reasonable accuracy in malware classification.
作者: condemn    時間: 2025-3-29 23:31

作者: flammable    時間: 2025-3-29 23:56

作者: cinder    時間: 2025-3-30 05:56
https://doi.org/10.1007/978-1-4615-2712-1rs in the process of applying the algorithm in complex cluster topologies. In order to complete the non-collision channel allocation, a straightforward algorithm which has not completed in the previous studies is proposed. We provide 4 rules for proving the proposed algorithm has no weakness. The re
作者: 良心    時間: 2025-3-30 11:10
Variable-Redundancy Error Control Schemesent capital, citadel, dynasty, tomb); determining the representative photo and important tags of each place; recommending the famous places based on photo distribution and users criteria to tourists. The experimental results show the map based on criteria given by users that contained useful informa
作者: 公式    時間: 2025-3-30 14:10

作者: 蘑菇    時間: 2025-3-30 18:09

作者: 陪審團(tuán)    時間: 2025-3-30 22:18

作者: 多節(jié)    時間: 2025-3-31 03:10
Max-flow Min-cut Algorithm in Spark with Application to Road Networkscal extension, we tested the model with a large log-normal graph with .1.1 million edges and obtained a max-flow value of 54, which implies that the minimum-cut set of the graph consists of 54 edges. This is a reasonable set of edges to place the sensors compared to the total number of edges. We bel
作者: 靦腆    時間: 2025-3-31 06:01

作者: 碎片    時間: 2025-3-31 09:27

作者: 正面    時間: 2025-3-31 15:08
Archaeological Site Image Content Retrieval and Automated Generating Image Descriptions with Neural ed algorithms gives the accuracy 80.67%, 79.35% and 82.47% in Ayutthaya era, Sukhothai era and Rattanakosin era. Results show that the proposed technique can efficiently find the correct descriptions compared to using the traditional method.
作者: 膽汁    時間: 2025-3-31 18:56

作者: artless    時間: 2025-4-1 01:14

作者: 檢查    時間: 2025-4-1 05:37
Visualization of Mixed Attributed High-Dimensional Dataset Using Singular Value Decompositionthorough study of techniques, which presents visualization, it was observed that many of the described techniques are dependent on data and the visualization needs support specific to domain. On contrary, the methods based on Eigen decomposition, for elements in a higher dimensional space give meani
作者: ARC    時間: 2025-4-1 08:33
Max-flow Min-cut Algorithm in Spark with Application to Road Networks we solve the max-flow min-cut problem on large random graphs with log-normal distribution of outdegrees using the distributed Edmonds-Karp algorithm. The algorithm is implemented on a cluster using Spark. We compare the runtime between a single machine implementation and cluster implementation and




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
綦江县| 岳阳县| 霍州市| 芒康县| 咸丰县| 共和县| 六盘水市| 渑池县| 时尚| 三门县| 海伦市| 郯城县| 饶平县| 丹棱县| 澜沧| 五家渠市| 交城县| 禹州市| 青阳县| 河北省| 清徐县| 旅游| 石嘴山市| 孟村| 达孜县| 安多县| 固镇县| 清原| 广水市| 永和县| 秭归县| 集安市| 双流县| 肇庆市| 焦作市| 仁寿县| 张掖市| 开原市| 弋阳县| 通海县| 香河县|