標題: Titlebook: Big Data and Social Computing; 9th China National C Xiaofeng Meng,Zhidong Cao,Xiu-Xiu Zhan Conference proceedings 2024 The Editor(s) (if ap [打印本頁] 作者: Buren 時間: 2025-3-21 19:45
書目名稱Big Data and Social Computing影響因子(影響力)
書目名稱Big Data and Social Computing影響因子(影響力)學科排名
書目名稱Big Data and Social Computing網(wǎng)絡公開度
書目名稱Big Data and Social Computing網(wǎng)絡公開度學科排名
書目名稱Big Data and Social Computing被引頻次
書目名稱Big Data and Social Computing被引頻次學科排名
書目名稱Big Data and Social Computing年度引用
書目名稱Big Data and Social Computing年度引用學科排名
書目名稱Big Data and Social Computing讀者反饋
書目名稱Big Data and Social Computing讀者反饋學科排名
作者: 信徒 時間: 2025-3-21 20:52
Steuern und Regeln von Werkzeugmaschinenat the model based on the fusion of trajectory and physiological features outperformed, with an average detection F1 score of 80.31%, average precision of 79.27%, and average recall of 82.71%. The findings of this study suggest promising applications for fatigue driving detection in real-world driving scenarios.作者: 我們的面粉 時間: 2025-3-22 02:24 作者: 樂意 時間: 2025-3-22 05:13
Intelligent Fatigue Driving Detection Method Based on Fusion of Smartphone and Smartwatch Dataat the model based on the fusion of trajectory and physiological features outperformed, with an average detection F1 score of 80.31%, average precision of 79.27%, and average recall of 82.71%. The findings of this study suggest promising applications for fatigue driving detection in real-world driving scenarios.作者: Heretical 時間: 2025-3-22 11:28 作者: jungle 時間: 2025-3-22 15:38
Conference proceedings 2024pers in the volume are organized according to the following topics:?digital society and public security;?modelling and simulation of social systems;?internet intelligent algorithm governance;?social network and group behavior;?innovation, risks, and network security of large language models; and?artificial intelligence and cognitive science..作者: Migratory 時間: 2025-3-22 19:40 作者: Gentry 時間: 2025-3-23 00:59
Early Warning Methods Based on a Real Time Series Dataset: A Comparative Studys models is conducted, ranging from traditional methods to advanced machine learning networks. The findings revealed that in certain instances, the performance of complex models did not significantly surpass that of simpler methods. This insight is particularly beneficial for the development of cost-effective early warning systems.作者: Enervate 時間: 2025-3-23 02:30 作者: choroid 時間: 2025-3-23 08:50
Conference proceedings 2024a, during August 8–10, 2024...The 28 full papers presented in this volume were carefully reviewed and selected from a total of 141 submissions. The papers in the volume are organized according to the following topics:?digital society and public security;?modelling and simulation of social systems;?i作者: Limpid 時間: 2025-3-23 12:52
Early Warning Methods Based on a Real Time Series Dataset: A Comparative Studyloyed the Long Short-Term Memory (LSTM) or Transformer network, equipped with a prediction or reconstruction error. Despite these advancements, the majority of existing early warning systems continue to rely on traditional models devoid of artificial neural networks..A comparative analysis of variou作者: Diskectomy 時間: 2025-3-23 16:45
EG-ConMix: An Intrusion Detection Method Based on?Graph Contrastive Learning Intrusion Detection System (NIDS) by monitoring network traffic, detecting and discovering intrusions, and issuing security alerts promptly. Most intrusion detection research in recent years has been directed towards the pair of traffic itself without considering the interrelationships among them, 作者: 黑豹 時間: 2025-3-23 19:08
Network Analysis Reveals Regional Disparity in?COVID-19 Policymakingad. This study conducts a comparative network analysis of policy texts from Hebei and Henan provinces using Network agenda-setting theory and visualization techniques. We identify thematic similarities and differences in the pandemic response by extracting keywords and constructing co-occurrence mat作者: AVOID 時間: 2025-3-24 01:13 作者: CT-angiography 時間: 2025-3-24 03:51
Mapping Gridded Wealth Index Using Open Geospatial Data in Zambiarm their well-being at the subnational level. While satellite images are overwhelmingly utilized in poverty mapping in these countries, the open geospatial data remains limited integration. This study aims to explore the potential of freely available geospatial data in poverty mapping in sub-Sahara 作者: heartburn 時間: 2025-3-24 08:55
Bidirectional Multi-grain Graph Convolution Network for?Origin-Destination Demand Predictionrvices by minimizing passenger waiting time. Traditional OD demand studies often overlook the bidirectional nature of travel patterns, treating connections as one-way links, which can compromise prediction accuracy. Recognizing the interdependent and distinct characteristics of travel demands betwee作者: 錯事 時間: 2025-3-24 12:00 作者: overhaul 時間: 2025-3-24 18:31
Deep Reinforcement Learning Based Dynamic Bus Timetable Scheduling with?Bidirectional Constraintsthe timetable only for one direction of the bus line, which may lead to the issue of inconsistent departure numbers for the upward and downward directions on the same bus line. For bus companies, it is very important to have an equal number of departures in both directions. To ensure each bus can re作者: 執(zhí)拗 時間: 2025-3-24 23:02
Modeling Knowledge Spillover Effects in High-Speed Rail Development: A Discrete Simulation Approach s a discrete simulation model using cellular automata to investigate the potential impacts of HSR on regional innovation, particularly focusing on knowledge spillover effects. By integrating principles from economic interaction and complex systems theory, the model simulates the spatial distribution作者: 十字架 時間: 2025-3-25 00:50
Educators’ Networking Interacts with Digital Competence Heterogeneity to Enhance the Implementation effectively integrating this technology into teaching practices still remains a challenge for most countries. Educators’ limited digital competencies, coupled with insufficient attention paid to the process of “human-AI integration”, have resulted in a superficial implementation of AI-enabled educa作者: Arteriography 時間: 2025-3-25 04:01 作者: 同音 時間: 2025-3-25 10:16
SCPM-R+ER: A R+ER-based Algorithm for Mining Spatial Co-location Patternss consume significant time and space in generating table instances. While methods leveraging cliques or maximal cliques have enhanced mining efficiency, the huge number of cliques still bring considerable challenges in terms of time and space. To address this issue and reduce the quantity of maximal作者: 和平主義者 時間: 2025-3-25 13:13 作者: hankering 時間: 2025-3-25 17:50 作者: Diatribe 時間: 2025-3-25 23:42 作者: Compass 時間: 2025-3-26 00:44
A Weakly Supervised Method for?Encrypted Traffic Classification in?the?Dark Web dark web. Most security protection software and probes are designed for identifying unencrypted traffic, and they cannot effectively classify encrypted traffic from the dark web due to its unique anonymity. Existing methods do not comprehensively consider the external statistical features and the i作者: ASSET 時間: 2025-3-26 04:27 作者: Lasting 時間: 2025-3-26 09:58
,Aufbau der Oxydh?ute bzw. Deckschichten, Intrusion Detection System (NIDS) by monitoring network traffic, detecting and discovering intrusions, and issuing security alerts promptly. Most intrusion detection research in recent years has been directed towards the pair of traffic itself without considering the interrelationships among them, 作者: Axillary 時間: 2025-3-26 15:13 作者: 糾纏 時間: 2025-3-26 18:41 作者: 主講人 時間: 2025-3-26 23:04 作者: 傷心 時間: 2025-3-27 01:52 作者: disrupt 時間: 2025-3-27 08:07 作者: 脆弱么 時間: 2025-3-27 11:01 作者: 沙文主義 時間: 2025-3-27 17:21 作者: 搬運工 時間: 2025-3-27 18:55
Helmut Engel,Carl A. Kestner Hannover effectively integrating this technology into teaching practices still remains a challenge for most countries. Educators’ limited digital competencies, coupled with insufficient attention paid to the process of “human-AI integration”, have resulted in a superficial implementation of AI-enabled educa作者: 暴露他抗議 時間: 2025-3-27 22:20
Steuern und Regeln von Werkzeugmaschinencidents. This study conducted real-world vehicle driving experiments, where physiological data and vehicle trajectory data of 15 drivers were collected using smart wearable watches and smartphone applications. Data features were extracted, and an Attention-LSTM deep neural network was employed to es作者: 含鐵 時間: 2025-3-28 04:41 作者: Liability 時間: 2025-3-28 06:43
https://doi.org/10.1007/978-3-322-84862-8utility co-location pattern(SHUCP), which is an extended research of SCPs, can better reflect the high quality aggregation phenomenon among spatial features. Utility participation index (UPI) is a commonly used adaptive utility measurement in most of the existing methods. Unfortunately, UPI does not作者: G-spot 時間: 2025-3-28 10:45 作者: theta-waves 時間: 2025-3-28 15:26 作者: 感情脆弱 時間: 2025-3-28 21:21
,Hei?wasser- und Dampfheizungen, dark web. Most security protection software and probes are designed for identifying unencrypted traffic, and they cannot effectively classify encrypted traffic from the dark web due to its unique anonymity. Existing methods do not comprehensively consider the external statistical features and the i作者: 災禍 時間: 2025-3-29 01:33
Big Data and Social Computing978-981-97-5803-6Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: debase 時間: 2025-3-29 03:25 作者: Pedagogy 時間: 2025-3-29 10:09 作者: jumble 時間: 2025-3-29 11:59 作者: lambaste 時間: 2025-3-29 19:04
EG-ConMix: An Intrusion Detection Method Based on?Graph Contrastive Learning incorporate contrastive learning to discern the difference between normal and malicious traffic samples, facilitating the extraction of key features. Thorough experiments conducted on two publicly accessible datasets reveal that EG-ConMix surpasses current state-of-the-art methods in intrusion dete作者: 修改 時間: 2025-3-29 23:13 作者: 使無效 時間: 2025-3-30 02:48
Mapping Gridded Wealth Index Using Open Geospatial Data in Zambiasing open geospatial data. The results indicated that the proxy features derived from open geospatial data were able to obtain an . value of 0.78 on the test set in WI prediction in Zambia. Meanwhile, the variable importance metrics highlight that the top 5 high contribution variables are derived fr作者: Slit-Lamp 時間: 2025-3-30 07:33
Bidirectional Multi-grain Graph Convolution Network for?Origin-Destination Demand Predictionhnique that leverages dual-scale convolutional layers to extract pertinent demand information. The integration of a graph convolution network and a global temporal correlation module within BiDP enables the capture of broader spatiotemporal dependencies, thereby refining the prediction process. Comp作者: Fester 時間: 2025-3-30 08:21
The Prospects of?Multi-modal Pre-trained Models in?Epidemic Forecastingg the early stages of transmission is challenging due to limited data availability. Thus, we aim to explore the feasibility and effective strategies of leveraging multi-modal pre-trained technology for epidemic forecasting. This approach offers the potential to comprehensively grasp the transmission作者: GEAR 時間: 2025-3-30 15:01
Deep Reinforcement Learning Based Dynamic Bus Timetable Scheduling with?Bidirectional Constraintsd to determine whether to depart in both directions every minute. We construct a state that includes information on bus lines in both directions. Considering the need for consistency in the number of departures in both directions, we design a reward function to ensure an equal number of departures i作者: 減至最低 時間: 2025-3-30 16:46 作者: 恩惠 時間: 2025-3-30 23:16
Educators’ Networking Interacts with Digital Competence Heterogeneity to Enhance the Implementation oretical hypotheses for future empirical studies and suggest that harnessing the value of collective intelligence through decentralized digital networks is a feasible governance strategy for advancing AI-enabled education and promoting high-quality and balanced development of education.作者: 聯(lián)合 時間: 2025-3-31 04:22 作者: 激怒 時間: 2025-3-31 05:32 作者: gerontocracy 時間: 2025-3-31 11:06 作者: 奇怪 時間: 2025-3-31 16:10 作者: doxazosin 時間: 2025-3-31 19:51 作者: ventilate 時間: 2025-3-31 23:41
,Aufbau der Oxydh?ute bzw. Deckschichten, incorporate contrastive learning to discern the difference between normal and malicious traffic samples, facilitating the extraction of key features. Thorough experiments conducted on two publicly accessible datasets reveal that EG-ConMix surpasses current state-of-the-art methods in intrusion dete作者: 通知 時間: 2025-4-1 05:54
,Aufbau der Oxydh?ute bzw. Deckschichten,with a correlation coefficient of 0.5825, suggesting similarities in their policy focus despite geographical and administrative differences. This overlap points to a consensus on essential intervention areas across both provinces. Further analysis reveals that these policies reflect each region’s un作者: Congeal 時間: 2025-4-1 08:28
Einfluss von Doppelungen auf Dif Festigkeit,sing open geospatial data. The results indicated that the proxy features derived from open geospatial data were able to obtain an . value of 0.78 on the test set in WI prediction in Zambia. Meanwhile, the variable importance metrics highlight that the top 5 high contribution variables are derived fr作者: Prostaglandins 時間: 2025-4-1 11:52
Metalle und Metallkonstruktionenhnique that leverages dual-scale convolutional layers to extract pertinent demand information. The integration of a graph convolution network and a global temporal correlation module within BiDP enables the capture of broader spatiotemporal dependencies, thereby refining the prediction process. Comp