標(biāo)題: Titlebook: Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health; International 2019 C Huansheng Ning Conference proceedings 2019 S [打印本頁] 作者: 習(xí)慣 時間: 2025-3-21 19:02
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health影響因子(影響力)
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health影響因子(影響力)學(xué)科排名
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health網(wǎng)絡(luò)公開度
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health被引頻次
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health被引頻次學(xué)科排名
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health年度引用
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health年度引用學(xué)科排名
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health讀者反饋
書目名稱Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health讀者反饋學(xué)科排名
作者: Obsequious 時間: 2025-3-21 23:55 作者: ciliary-body 時間: 2025-3-22 03:31
https://doi.org/10.1007/978-3-662-05597-7the semantic information contained in the web service textdescriptions, we tried four different unsupervised sentence representations. In another part, LDA was used to mine topic semantic information of web services after user’s web request was placed into a specific cluster according to its web ser作者: animated 時間: 2025-3-22 06:38 作者: 大喘氣 時間: 2025-3-22 09:12 作者: Spartan 時間: 2025-3-22 15:56
https://doi.org/10.1007/978-3-319-30994-1nsactions plaintext and finally implement consensus mechanism to verify the transaction. Secret information safely self-destruct immediately if exceed effective time. Authorized users and effective time are entirely determined by the owner of the transaction. This paper realizes key distributed secu作者: Spartan 時間: 2025-3-22 19:45
Annalisa Letizia,Marta Llimargasy by assisting the computing platform with key management. Software implementation indicates that the scheme can be applied to the secure transmission of genomic data in the network environment and provide an efficient encryption method for the privacy protection of genomic data.作者: 多樣 時間: 2025-3-22 22:09
Andrew P. Kowalczyk,Benjamin A. Nanes. There-fore, we must make clear what conditions on s-category allow us to obtain a symmetric partial monoidal category, and ensure that the behavioral congruence is preserved for the abstract bigraphical reactive system.作者: 不安 時間: 2025-3-23 01:39 作者: 愛哭 時間: 2025-3-23 05:32
Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and HealthInternational 2019 C作者: nitroglycerin 時間: 2025-3-23 13:39
Automatic Analysis and Reasoning Based on Vulnerability Knowledge Graphraph and added as new knowledge. Reasoning function can find hidden relationships among weaknesses based on the knowledge graph. Finally, we present sample cases to demonstrate the practical usage of the model.作者: drusen 時間: 2025-3-23 17:00
Application of Principal Component Analysis for Assessment the Behavior of Knowledge Managemental variable obtained by the principal component analysis can be used to further study the effects of knowledge management on the development of society and economics. the GDP is found have a strong positive relationship with the population, education expenditure, researchers in R&D, the Industrial d作者: Perigee 時間: 2025-3-23 20:39 作者: fixed-joint 時間: 2025-3-24 02:14
Short Text Representation Model Construction Method Based on Novel Semantic Aggregation Technology short text semantic representation model, the representation model of short text, which is proposed in this paper, shows a high semantic representation ability of short text in specific domain and in the open domain.作者: 屈尊 時間: 2025-3-24 03:43
Online Public Opinion Deduction Based on an Innovative Cellular Automatahat users follow about each other in an innovative way. We delineate the users’ portrait based on the users’ attributes, design evolutionary rules based on the behaviors of users on the Internet and the law of information dissemination. Experiments with real data of online users showed that the prop作者: 我正派 時間: 2025-3-24 08:54
Discretionary Access Control Method to Protect Blockchain Privacynsactions plaintext and finally implement consensus mechanism to verify the transaction. Secret information safely self-destruct immediately if exceed effective time. Authorized users and effective time are entirely determined by the owner of the transaction. This paper realizes key distributed secu作者: 欲望 時間: 2025-3-24 12:12 作者: pineal-gland 時間: 2025-3-24 17:52 作者: 阻塞 時間: 2025-3-24 22:21 作者: 跳動 時間: 2025-3-25 02:26
Automatic Analysis and Reasoning Based on Vulnerability Knowledge Grapha and semi-structured data which are hard for machine-understanding and reuse. Security expert need to analyze the description, link to related knowledge and reason out the hidden connection among various weakness. It is necessary to analyze the vulnerability data automatically and manage knowledge 作者: Intractable 時間: 2025-3-25 06:56
Application of Principal Component Analysis for Assessment the Behavior of Knowledge Managementl greatly benefit the development of economics, and society. It is difficult to assess the management of knowledge. Principal component analysis has been used to the knowledge management with the economic data, population data, educational data, research data for two developing countries and two dev作者: 致詞 時間: 2025-3-25 09:57 作者: Hdl348 時間: 2025-3-25 15:20
An Approach for Semantic Web Discovery Using Unsupervised Learning Algorithmsr this reason, research in web service clustering has recently gained much attention. Most existing clustering methods perform well when dealing with long text documents. However, the textdescriptions of web services are in the form of short text. Meanwhile, it is meaningful to consider word order i作者: Ringworm 時間: 2025-3-25 19:35 作者: 凹處 時間: 2025-3-25 20:18 作者: 無聊的人 時間: 2025-3-26 03:07 作者: 柔聲地說 時間: 2025-3-26 05:18
FLSTM: Feature Pattern-Based LSTM for Imbalanced Big Data Analysisimbalanced data. This paper proposes a feature pattern-based LSTM method (called FLSTM, Feature based Long Short Term Memory) to analyze failures through processing imbalanced data. The method constructs a time-series feature matrix as the input to the LSTM model. In addition, we propose a failure p作者: 一大塊 時間: 2025-3-26 10:24
A Construction Method of Author Influence Map Based on Data Field Theory and Entropy Weight Methodlationship can help us quickly screen and search for influential authors from a large number of authors, and then can be applied to author ranking, author recommendation and other systems. A method of building an author influence map is proposed in this paper. By introducing entropy weight method, e作者: 舞蹈編排 時間: 2025-3-26 16:38
Online Public Opinion Deduction Based on an Innovative Cellular Automatay disseminate through the Internet. Some negative comments usually are mixed into posts and articles. If let public opinion develop at will, some serious social events may trigger very fierce online volatility and they will have adverse effects on social stability. Therefore, to simulate the propaga作者: CUMB 時間: 2025-3-26 18:52 作者: Psa617 時間: 2025-3-26 21:26
Secure Healthcare Data Aggregation Scheme for Internet of Thingsealthcare data is aggregated for transmitting to FoG server. Healthcare data is sensitive in nature, so there is a need to provide protection against various security attacks. This paper presents a secure healthcare based data aggregation (SHDA) scheme to transmit sensitive data from sensor nodes to作者: Assignment 時間: 2025-3-27 03:44
A Multi-location Defence Scheme Against SSDP Reflection Attacks in the Internet of Things there is very scarce work on defending these attacks, with only some engineering advices on shutting down attacked services. This paper proposes a comprehensive approach to defend SSDP reflection attacks, which is called multi-location defence scheme (MLDS). MLDS operates at multiple places, workin作者: admission 時間: 2025-3-27 08:37 作者: perjury 時間: 2025-3-27 12:34 作者: saturated-fat 時間: 2025-3-27 14:06 作者: Notify 時間: 2025-3-27 21:35 作者: 做作 時間: 2025-3-27 23:10 作者: pulmonary-edema 時間: 2025-3-28 02:12 作者: 天氣 時間: 2025-3-28 09:01 作者: hegemony 時間: 2025-3-28 14:22
https://doi.org/10.1007/978-981-15-1922-2social tagging systems; social network security; privacy; online social networks; routing protocols; netw作者: Working-Memory 時間: 2025-3-28 16:45 作者: 漫不經(jīng)心 時間: 2025-3-28 19:57
Replicating Adenoviruses in Cancer Therapya and semi-structured data which are hard for machine-understanding and reuse. Security expert need to analyze the description, link to related knowledge and reason out the hidden connection among various weakness. It is necessary to analyze the vulnerability data automatically and manage knowledge 作者: Blemish 時間: 2025-3-29 01:36
Evasion of the Immune System by Adenovirusesl greatly benefit the development of economics, and society. It is difficult to assess the management of knowledge. Principal component analysis has been used to the knowledge management with the economic data, population data, educational data, research data for two developing countries and two dev作者: Tinea-Capitis 時間: 2025-3-29 07:09 作者: 終止 時間: 2025-3-29 08:18 作者: 狼群 時間: 2025-3-29 15:02
https://doi.org/10.1007/978-3-662-05597-7 distance attribute but also the direction attribute. In this paper, we propose a new spatial object query, i.e., the direction-aware top-. dominating query (DirDom query). Given a user’s position and his favorite direction, the DirDom query finds the top-. objects with the highest dominant capabili作者: bromide 時間: 2025-3-29 17:33 作者: Abnormal 時間: 2025-3-29 23:12
Mildred L. G. Shaw,Brian R. Gainest based on the combination of word embedding and semantic weight is low in computational complexity and its performance is even better than that based on complex structure such as RNN and LSTM. This paper proposes a semantic representation model of short text based on ELMO (Embeddings from Language 作者: 鍍金 時間: 2025-3-30 02:41
Mildred L. G. Shaw,Brian R. Gainesimbalanced data. This paper proposes a feature pattern-based LSTM method (called FLSTM, Feature based Long Short Term Memory) to analyze failures through processing imbalanced data. The method constructs a time-series feature matrix as the input to the LSTM model. In addition, we propose a failure p作者: Comprise 時間: 2025-3-30 06:50
Scott A. Davis,Steven R. Feldmanlationship can help us quickly screen and search for influential authors from a large number of authors, and then can be applied to author ranking, author recommendation and other systems. A method of building an author influence map is proposed in this paper. By introducing entropy weight method, e作者: 提升 時間: 2025-3-30 10:26 作者: 占卜者 時間: 2025-3-30 13:01 作者: 支架 時間: 2025-3-30 20:35
Impact of Nonadherence in Dermatologyealthcare data is aggregated for transmitting to FoG server. Healthcare data is sensitive in nature, so there is a need to provide protection against various security attacks. This paper presents a secure healthcare based data aggregation (SHDA) scheme to transmit sensitive data from sensor nodes to作者: Aura231 時間: 2025-3-30 21:46 作者: thrombosis 時間: 2025-3-31 01:07
https://doi.org/10.1007/978-94-007-4186-7tree is often used to generate data fingerprints. Aiming at the shortcomings of existing common schemes for remote data authentication based on Merkle hash tree, in this paper, based on data block index number constructs the balance binary sort Merkle hash tree, and using two-layer data nodes to sho作者: 半身雕像 時間: 2025-3-31 05:13
Annalisa Letizia,Marta Llimargasly reduced. The analysis and utilization of genomic data have gradually come into the public view, the privacy leakage of genomic data has aroused the attention of researchers. Genomic data has unique format and a large amount of data, but the existing genetic privacy protection schemes often fail t作者: 果仁 時間: 2025-3-31 11:32 作者: obsolete 時間: 2025-3-31 13:47 作者: 憤憤不平 時間: 2025-3-31 19:01 作者: 反復(fù)拉緊 時間: 2025-3-31 22:12
1865-0929 led Intelligence; Communication and Computing; Cyber Philosophy, Cyberlogic and Cyber Science; and Cyber Health and Smart Healthcare. .978-981-15-1921-5978-981-15-1922-2Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Repetitions 時間: 2025-4-1 05:06 作者: anachronistic 時間: 2025-4-1 08:36 作者: 背叛者 時間: 2025-4-1 11:40
https://doi.org/10.1007/978-94-007-4186-7 to ensure that sensitive information is not leaked in the verification process. Theoretical analysis shows that the authentication structure can fulfill the function of data integrity audit well, and support the dynamic operation of data blocks while maintaining the balance of Merkle tree.作者: 老巫婆 時間: 2025-4-1 16:18
Information Extraction and Similarity Computation for Semi-/Un-Structured Sentences from the Cyberda syntactic and semantic similarity between two sentences. Extensive simulations demonstrated that our method outperforms the other state-of-the-art methods in terms of correlation coefficient and mean deviation.