標(biāo)題: Titlebook: Big Data Technologies and Applications; 7th International Co Jason J. Jung,Pankoo Kim Conference proceedings 2017 ICST Institute for Comput [打印本頁] 作者: Nixon 時間: 2025-3-21 17:17
書目名稱Big Data Technologies and Applications影響因子(影響力)
書目名稱Big Data Technologies and Applications影響因子(影響力)學(xué)科排名
書目名稱Big Data Technologies and Applications網(wǎng)絡(luò)公開度
書目名稱Big Data Technologies and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Big Data Technologies and Applications被引頻次
書目名稱Big Data Technologies and Applications被引頻次學(xué)科排名
書目名稱Big Data Technologies and Applications年度引用
書目名稱Big Data Technologies and Applications年度引用學(xué)科排名
書目名稱Big Data Technologies and Applications讀者反饋
書目名稱Big Data Technologies and Applications讀者反饋學(xué)科排名
作者: 使熄滅 時間: 2025-3-22 00:00
https://doi.org/10.1007/978-1-349-15910-9 we solve the max-flow min-cut problem on large random graphs with log-normal distribution of outdegrees using the distributed Edmonds-Karp algorithm. The algorithm is implemented on a cluster using Spark. We compare the runtime between a single machine implementation and cluster implementation and 作者: 卡死偷電 時間: 2025-3-22 01:57 作者: convulsion 時間: 2025-3-22 05:37
https://doi.org/10.1007/978-1-4615-2712-1nsor nodes and improves energy efficiency by transmitting the data collected from cluster members by a cluster header to a sink node. Due to the frequency characteristics in a wireless communication environment, interference and collision may occur between neighboring clusters, which may lead causin作者: Charade 時間: 2025-3-22 09:19
Fixed-Redundancy Error Control Schemes mining algorithms fail to predict rare class, as the class imbalanced data models are inherently built in favor of the majority of class-common characteristics among data instances. In the present paper, we propose the Euclidean distance- and standard deviation-based feature selection and over-samp作者: 吹牛者 時間: 2025-3-22 13:34
Classes of Convolutional Codes and Encodersthods are taken into account movie content analysis using social network for discovering relationships among characters and so on. However, these methods have shown some unsatisfactorily in dynamic changing of multimedia contents such as the character’s relationships over time. For overcoming this i作者: Ointment 時間: 2025-3-22 17:32 作者: Entirety 時間: 2025-3-23 00:48
Variable-Redundancy Error Control Schemesllect and introduce cultural heritage by geotagged resources were being focused on. The paper aims to deliver a way to collect geotagged cultural heritage resources from social networking services by using the keyword and user’s position (GPS signal) to deliver smart interactions between visitors in作者: 后退 時間: 2025-3-23 04:26
Convolutional Codes and Encodersed from SIFT algorithms and learning stupa description from the generated key points with artificial neural network. Neural network was used for being the classifier for generating the description. We have presented a new approach to feature extraction based on analysis of key points and descriptors作者: 疲勞 時間: 2025-3-23 07:31 作者: 噴出 時間: 2025-3-23 11:50
Introduction to Corporate Strategyation of the material removal, tool paths as well as valid setup positions of workpiece and periphery which leads mostly to high computational time. The descent of the computational effort includes a high portion of systems engineering. This contribution shows a theoretical concept to substitute com作者: lesion 時間: 2025-3-23 17:46
Beneficial Aspects of Corrosion,tim’s system through the enactment of abnormal behavior, which is the locking of the victim’s system or the encryption of the system or files. Ransomware writers require money from victims as a condition for the recovery of the encrypted files and systems that have been seized; accordingly, systems 作者: BILK 時間: 2025-3-23 21:45
Crowd Properties and Characteristics,vel is linked with individual key used in embedding and revealing stages. Higher level secret is a share which is needed to reconstruct concealed data. It is possible that different shares contain various amount of information, what means that some of them may be more or less privileged. As a result作者: ITCH 時間: 2025-3-23 22:14 作者: Morbid 時間: 2025-3-24 05:56
Cryosphere and Cryospheric Science,ulti signal ensembles by exploiting both intra- and inter-signal correlation and sparsity structure. In this paper, we propose a novel algorithm, which improves detection performance even without a priori-knowledge on the correlation structure for arbitrarily correlated sparse signal. Numerical resu作者: 能夠支付 時間: 2025-3-24 08:44
https://doi.org/10.1007/978-981-16-6425-0tunity, a spreading based signal transmission technique is proposed to be used in the signal transmission of IoT. To alleviate the effects of rich scattering transmission environment and interferences from other devices, MMSE based interference cancellation combined with the receive beamforming is p作者: Wordlist 時間: 2025-3-24 11:35
https://doi.org/10.1007/978-3-662-47974-2equire a knowledge management system which offers opportunities to work on one task with different organizations on the same time. Cooperative work in the field of setup preparation for production systems is one challenge for an efficiency and infallibly work preparation. One example is the validati作者: Preamble 時間: 2025-3-24 16:13 作者: 臭名昭著 時間: 2025-3-24 22:22 作者: ADORN 時間: 2025-3-24 23:19
https://doi.org/10.1007/978-3-319-58967-1algorithms; artificial intelligence; big data; classification; data mining; data security; feature extract作者: Consensus 時間: 2025-3-25 03:51
978-3-319-58966-4ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017作者: HAIL 時間: 2025-3-25 11:04
Big Data Technologies and Applications978-3-319-58967-1Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 踉蹌 時間: 2025-3-25 13:06
Handling Uncertainty in Clustering Art-Exhibition Visiting Styles from the interaction of visitors of a museum with a complex Internet of Things (IoT) framework. We model this data as a set of uncertain objects, and cluster them by employing the well-established UK-medoids algorithm. Results show that clustering accuracy is positively impacted when data uncertainty is taken into account.作者: 切掉 時間: 2025-3-25 18:34
Multi-level Steganography Based on Fuzzy Vault Systems and Secret Sharing Techniques, the secret can be decoded correctly in a number of ways. Therefore the main objective of this paper is to propose a system in which some users may hide additional shared secret in an inconspicuous manner.作者: Derogate 時間: 2025-3-25 22:20 作者: 白楊魚 時間: 2025-3-26 01:27 作者: Musket 時間: 2025-3-26 07:29
1867-8211 ata, DiHuBiDa 2016.. The 17 revised full papers were carefully reviewed and selected from 25 submissions and handle theoretical foundations and practical applications which premise the new generation of data analytics and engineering..978-3-319-58966-4978-3-319-58967-1Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: 切碎 時間: 2025-3-26 12:13 作者: bifurcate 時間: 2025-3-26 14:38
1867-8211 data Technologies and Applications, BDTA 2016, held in Seoul, South Korea, in November 2016.? BDTA 2016 was collocated with the First International Workshop on Internet of Things, Social Network, and Security in Big Data, ISSB 2016 and the First International Workshop on Digital Humanity with Big D作者: 山頂可休息 時間: 2025-3-26 18:43
Classes of Convolutional Codes and Encodersods have shown some unsatisfactorily in dynamic changing of multimedia contents such as the character’s relationships over time. For overcoming this issue, we proposed a novel method for extracting dynamic character network from a movie.作者: exhibit 時間: 2025-3-27 00:05
Cryosphere and Cryospheric Science,h improves detection performance even without a priori-knowledge on the correlation structure for arbitrarily correlated sparse signal. Numerical results verify that the propose algorithm reduces the required number of measurements for correlated sparse signal detection compared to the existing DCS algorithm.作者: 有偏見 時間: 2025-3-27 01:50 作者: 打谷工具 時間: 2025-3-27 07:40
Distributed Compressive Sensing for Correlated Information Sourcesh improves detection performance even without a priori-knowledge on the correlation structure for arbitrarily correlated sparse signal. Numerical results verify that the propose algorithm reduces the required number of measurements for correlated sparse signal detection compared to the existing DCS algorithm.作者: 寬敞 時間: 2025-3-27 11:26
https://doi.org/10.1007/978-1-349-15910-9.001), while it showed no consistent associations with ALE. Conversely, HR decreased progressively with increasing ALE tertiles in females (P?0.001), while it showed no consistent association with HALE. These suggest HRV may reflect a biological property relating to long HALE.作者: Accessible 時間: 2025-3-27 13:37 作者: TAIN 時間: 2025-3-27 19:35 作者: Metastasis 時間: 2025-3-28 01:02
Feature Selection Techniques for Improving Rare Class Classification in Semiconductor Manufacturing are used to select the most appropriate features of the classification model. Third, to address the rare class over-fitting problem, oversampling is used. Finally, learning generates the fault detection prediction data-mining model. Furthermore, the prediction model is applied to measure the performance.作者: 雜色 時間: 2025-3-28 04:11
Balance Principles in Continuum Mechanics, the methods of singular value decomposition were applied for demonstration in reduced dimensions (2 and 3). The data set is then projected to lower dimensions, using the prominent singular values. The proposed methods are tested with datasets from UCI Repository and compared.作者: SENT 時間: 2025-3-28 08:07
Introduction to Corporate Strategytes valid workpiece positions. The contribution compares model approaches of inverse kinematic problems considering 5 axis tooling machine to determine valid setup positions and minimize theoretical calculation effort.作者: MULTI 時間: 2025-3-28 13:01 作者: 文件夾 時間: 2025-3-28 17:17
Visualization of Mixed Attributed High-Dimensional Dataset Using Singular Value Decomposition the methods of singular value decomposition were applied for demonstration in reduced dimensions (2 and 3). The data set is then projected to lower dimensions, using the prominent singular values. The proposed methods are tested with datasets from UCI Repository and compared.作者: GUILE 時間: 2025-3-28 22:44 作者: 審問 時間: 2025-3-29 01:30 作者: 大雨 時間: 2025-3-29 06:57 作者: Concrete 時間: 2025-3-29 10:19 作者: 絆住 時間: 2025-3-29 14:29 作者: 職業(yè) 時間: 2025-3-29 19:08
https://doi.org/10.1007/978-3-030-90012-0 on malwares and exploit them in classification. We evaluate our approach through a series of experiments with a real-world dataset labeled by a group of domain experts. The results show our approach is effective and provides reasonable accuracy in malware classification.作者: condemn 時間: 2025-3-29 23:31 作者: flammable 時間: 2025-3-29 23:56 作者: cinder 時間: 2025-3-30 05:56
https://doi.org/10.1007/978-1-4615-2712-1rs in the process of applying the algorithm in complex cluster topologies. In order to complete the non-collision channel allocation, a straightforward algorithm which has not completed in the previous studies is proposed. We provide 4 rules for proving the proposed algorithm has no weakness. The re作者: 良心 時間: 2025-3-30 11:10
Variable-Redundancy Error Control Schemesent capital, citadel, dynasty, tomb); determining the representative photo and important tags of each place; recommending the famous places based on photo distribution and users criteria to tourists. The experimental results show the map based on criteria given by users that contained useful informa作者: 公式 時間: 2025-3-30 14:10 作者: 蘑菇 時間: 2025-3-30 18:09 作者: 陪審團(tuán) 時間: 2025-3-30 22:18 作者: 多節(jié) 時間: 2025-3-31 03:10
Max-flow Min-cut Algorithm in Spark with Application to Road Networkscal extension, we tested the model with a large log-normal graph with .1.1 million edges and obtained a max-flow value of 54, which implies that the minimum-cut set of the graph consists of 54 edges. This is a reasonable set of edges to place the sensors compared to the total number of edges. We bel作者: 靦腆 時間: 2025-3-31 06:01 作者: 碎片 時間: 2025-3-31 09:27 作者: 正面 時間: 2025-3-31 15:08
Archaeological Site Image Content Retrieval and Automated Generating Image Descriptions with Neural ed algorithms gives the accuracy 80.67%, 79.35% and 82.47% in Ayutthaya era, Sukhothai era and Rattanakosin era. Results show that the proposed technique can efficiently find the correct descriptions compared to using the traditional method.作者: 膽汁 時間: 2025-3-31 18:56 作者: artless 時間: 2025-4-1 01:14 作者: 檢查 時間: 2025-4-1 05:37
Visualization of Mixed Attributed High-Dimensional Dataset Using Singular Value Decompositionthorough study of techniques, which presents visualization, it was observed that many of the described techniques are dependent on data and the visualization needs support specific to domain. On contrary, the methods based on Eigen decomposition, for elements in a higher dimensional space give meani作者: ARC 時間: 2025-4-1 08:33
Max-flow Min-cut Algorithm in Spark with Application to Road Networks we solve the max-flow min-cut problem on large random graphs with log-normal distribution of outdegrees using the distributed Edmonds-Karp algorithm. The algorithm is implemented on a cluster using Spark. We compare the runtime between a single machine implementation and cluster implementation and