標(biāo)題: Titlebook: Communications, Networking, and Information Systems; First International Haonan Chen,Pingyi Fan,Lipo Wang Conference proceedings 2023 The [打印本頁(yè)] 作者: endocarditis 時(shí)間: 2025-3-21 19:23
書(shū)目名稱(chēng)Communications, Networking, and Information Systems影響因子(影響力)
書(shū)目名稱(chēng)Communications, Networking, and Information Systems影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Communications, Networking, and Information Systems網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Communications, Networking, and Information Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Communications, Networking, and Information Systems被引頻次
書(shū)目名稱(chēng)Communications, Networking, and Information Systems被引頻次學(xué)科排名
書(shū)目名稱(chēng)Communications, Networking, and Information Systems年度引用
書(shū)目名稱(chēng)Communications, Networking, and Information Systems年度引用學(xué)科排名
書(shū)目名稱(chēng)Communications, Networking, and Information Systems讀者反饋
書(shū)目名稱(chēng)Communications, Networking, and Information Systems讀者反饋學(xué)科排名
作者: thalamus 時(shí)間: 2025-3-21 23:50
https://doi.org/10.1007/978-94-007-4295-6ome or in a room of a nursing house, and their activities and health status are mirrored to corresponding logical objects (LO) in a virtual community in the Metaverse, where activity recognition, potential risk prediction, and alert generation are realized. Specifically, a Multi-sensor Action Recogn作者: 最高點(diǎn) 時(shí)間: 2025-3-22 02:22
Kevin Harrison,Johanna Ivy Levenehe malicious user. Through several simulations, we compare and analyze the proposed scheme with the traditional scheme to verify its correctness and feasibility. Simulation results show that the proposed scheme has a high defense under various sensing environments and different attack strengths. The作者: JUST 時(shí)間: 2025-3-22 06:45
https://doi.org/10.1007/978-0-387-72810-0e transaction processing of non-conflicting input states, achieving parallelism at the validator nodes; and the ability to implement complex off-chain scaling solutions through smart contracts. This research examines the security impact of sharding when applied alongside an eUTXO ledger. To illustra作者: 突變 時(shí)間: 2025-3-22 11:27
B. Inhester,L. Feng,T. Wiegelmannval Principal Component Analysis (FFR-PCA)”, fundamental frequencies were removed so as to reduced features size substantially and improved calculation speed and accuracy successfully. Support Vector Machine (SVM) was used in pattern recognition experiments and showed its superior performance on eng作者: 弓箭 時(shí)間: 2025-3-22 12:56
Deep Reinforcement Learning Based Vehicle Selection for?Asynchronous Federated Learning Enabled Vehipabilities, asynchronous federated learning (AFL) is employed to facilitate the RSU to update the global model immediately after receiving a local model to reduce the aggregation delay. However, in AFL of VEC, different vehicles may have different impact on the global model updating because of their作者: 弓箭 時(shí)間: 2025-3-22 18:20
A Virtual Community Healthcare Framework in?Metaverse Enabled by?Digital Twinsome or in a room of a nursing house, and their activities and health status are mirrored to corresponding logical objects (LO) in a virtual community in the Metaverse, where activity recognition, potential risk prediction, and alert generation are realized. Specifically, a Multi-sensor Action Recogn作者: Cumulus 時(shí)間: 2025-3-22 23:08
A Robust MOR-Based Secure Fusion Strategy Against Byzantine Attack in?Cooperative Spectrum Sensinghe malicious user. Through several simulations, we compare and analyze the proposed scheme with the traditional scheme to verify its correctness and feasibility. Simulation results show that the proposed scheme has a high defense under various sensing environments and different attack strengths. The作者: Interstellar 時(shí)間: 2025-3-23 04:16
Security Analysis of?Blockchain Layer-One Sharding Based Extended-UTxO Modele transaction processing of non-conflicting input states, achieving parallelism at the validator nodes; and the ability to implement complex off-chain scaling solutions through smart contracts. This research examines the security impact of sharding when applied alongside an eUTXO ledger. To illustra作者: 禁止 時(shí)間: 2025-3-23 07:33 作者: 云狀 時(shí)間: 2025-3-23 10:30 作者: 相一致 時(shí)間: 2025-3-23 16:16 作者: inscribe 時(shí)間: 2025-3-23 20:13
https://doi.org/10.1007/978-3-319-68879-4m traditional SVR, the enhanced SVR uses the recent data to train the model, rather than all history record. An experiment was performed to compared the proposed SVR with traditional SVR and decision tree algorithms. The RMSE are used as metric. The result shows that the proposed SVR is better than the existing comparing algorithm.作者: Pamphlet 時(shí)間: 2025-3-24 01:22
An Improved LED Aruco-Marker Detection Method for?Event Cameraucted in dynamic environments, we have demonstrated the high efficiency and accuracy of this method. In the future, we aim to develop a new fiducial marker that is even faster, more precise, and more suitable for robot vision tasks.作者: 增減字母法 時(shí)間: 2025-3-24 05:52
Stock Trend Prediction Based on Improved SVRm traditional SVR, the enhanced SVR uses the recent data to train the model, rather than all history record. An experiment was performed to compared the proposed SVR with traditional SVR and decision tree algorithms. The RMSE are used as metric. The result shows that the proposed SVR is better than the existing comparing algorithm.作者: exercise 時(shí)間: 2025-3-24 06:41 作者: ordain 時(shí)間: 2025-3-24 13:52
Improvement of?CenterNet Based on?Feature Pyramid Networksructure, which effectively improves the accuracy of small-scale object detection. The experimental results show that the detection accuracy of the improved algorithm is improved from 30.1 AP to 30.6 AP for all scale objects on coco dataset, and 3.5 AP for small scale objects.作者: bronchodilator 時(shí)間: 2025-3-24 18:54
1865-0929 , CNIS 2023, held in Guilin, China, in March 2023.?.The 8 full papers and 2 short papers presented were thoroughly reviewed and selected from the 32 submissions. The papers are organized in topical sections on ?communications and networking, and information systems and artificial intelligence..978-9作者: cacophony 時(shí)間: 2025-3-24 19:01 作者: 用不完 時(shí)間: 2025-3-24 23:37
Solar Radiation and Photovoltaic Conversion,ructure, which effectively improves the accuracy of small-scale object detection. The experimental results show that the detection accuracy of the improved algorithm is improved from 30.1 AP to 30.6 AP for all scale objects on coco dataset, and 3.5 AP for small scale objects.作者: 怪物 時(shí)間: 2025-3-25 05:00 作者: Tailor 時(shí)間: 2025-3-25 08:17
Information Security Protection Techniques for Substation Operation and Maintenance Edge Gateway other security testing methods, the feasibility of the scheme is verified. This scheme can effectively improve the security level of the operation and maintenance system while ensuring the main business performance of the system.作者: 藐視 時(shí)間: 2025-3-25 14:21 作者: phlegm 時(shí)間: 2025-3-25 17:18
A Virtual Community Healthcare Framework in?Metaverse Enabled by?Digital Twinss a specific challenge to ensure the health and safety of seniors living alone in a residential community or in large-scale nursing houses. Thanks to the proliferation of the Internet of Things (IoT), Artificial Intelligence (AI)/Machine Learning (ML) algorithms, and the fifth-generation and beyond 作者: 虛度 時(shí)間: 2025-3-25 20:56
An Improved LED Aruco-Marker Detection Method for?Event Camerablur, making it ideal for detecting and tracking fast-moving objects while providing inter-frame data. Despite the extensive research and applications of frame-based cameras in detecting natural and fiducial object features, research on event cameras has been relatively sparse. In this paper, we pro作者: armistice 時(shí)間: 2025-3-26 02:08 作者: 粘連 時(shí)間: 2025-3-26 07:28 作者: 駕駛 時(shí)間: 2025-3-26 08:58 作者: PRE 時(shí)間: 2025-3-26 15:10 作者: 轉(zhuǎn)換 時(shí)間: 2025-3-26 19:00
Fundamental Frequency Removal PCA Method and SVM Approach Used for Structure Feature Distilling and o many features often lead to algorithms termination unexpectedly because of computer memory overflow, or trap in local optimum because of sparse nature of solutions in high dimension space. Classical Principal Component Analysis (PCA) algorithm can sort features by descending order but cannot direc作者: indemnify 時(shí)間: 2025-3-26 22:24
Stock Trend Prediction Based on Improved SVR and increase investment income. The combination of machine learning and big data provides an effective way for stock trend prediction. At present, many machine learning algorithms have been used for stock trend prediction and have achieved good results. In view of the fact that the support vector r作者: pulmonary-edema 時(shí)間: 2025-3-27 03:14
Several Misconceptions and?Misuses of?Deep Neural Networks and?Deep Learningep learning. Then, based on a mini-review of the literature, we point out some common misconceptions of deep neural networks and deep learning. We also point out that the deep learning approach is being misused in the present days.作者: CRAB 時(shí)間: 2025-3-27 07:41
Communications in Computer and Information Sciencehttp://image.papertrans.cn/c/image/230544.jpg作者: 一罵死割除 時(shí)間: 2025-3-27 10:17
https://doi.org/10.1007/978-981-99-3581-9artificial intelligence; neural networks; network security; healthcare; robotics; machine learning; deep l作者: 制造 時(shí)間: 2025-3-27 13:45 作者: Defraud 時(shí)間: 2025-3-27 21:03 作者: 粗鄙的人 時(shí)間: 2025-3-28 01:15
https://doi.org/10.1007/978-94-007-4295-6s a specific challenge to ensure the health and safety of seniors living alone in a residential community or in large-scale nursing houses. Thanks to the proliferation of the Internet of Things (IoT), Artificial Intelligence (AI)/Machine Learning (ML) algorithms, and the fifth-generation and beyond 作者: 褻瀆 時(shí)間: 2025-3-28 04:43 作者: 是限制 時(shí)間: 2025-3-28 07:14 作者: 出血 時(shí)間: 2025-3-28 10:42
Solar Radiation and Photovoltaic Conversion,pment. As the core equipment of the system, the edge gateway is the carrier of local processing of operation and maintenance business and cloud side collaboration. Its intrinsic safety is directly related to the reliability of the operation and maintenance system. This paper designs a complete infor作者: 使乳化 時(shí)間: 2025-3-28 16:47 作者: anachronistic 時(shí)間: 2025-3-28 19:40