標(biāo)題: Titlebook: Data Mining and Big Data; 6th International Co Ying Tan,Yuhui Shi,Jun Cai Conference proceedings 2021 Springer Nature Singapore Pte Ltd. 20 [打印本頁] 作者: Animosity 時間: 2025-3-21 20:00
書目名稱Data Mining and Big Data影響因子(影響力)
書目名稱Data Mining and Big Data影響因子(影響力)學(xué)科排名
書目名稱Data Mining and Big Data網(wǎng)絡(luò)公開度
書目名稱Data Mining and Big Data網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Mining and Big Data被引頻次
書目名稱Data Mining and Big Data被引頻次學(xué)科排名
書目名稱Data Mining and Big Data年度引用
書目名稱Data Mining and Big Data年度引用學(xué)科排名
書目名稱Data Mining and Big Data讀者反饋
書目名稱Data Mining and Big Data讀者反饋學(xué)科排名
作者: calumniate 時間: 2025-3-21 21:17 作者: 搬運工 時間: 2025-3-22 02:03 作者: Gyrate 時間: 2025-3-22 06:42
Conference proceedings 20212021, held in Guangzhou, China, in October 2021.?.The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on?advantages in theories, technologies, and applications in data mining and big作者: CEDE 時間: 2025-3-22 12:09 作者: 代替 時間: 2025-3-22 15:19 作者: 代替 時間: 2025-3-22 19:54 作者: exquisite 時間: 2025-3-22 22:26
A Classic Multi-method Collaborative Obfuscation Strategy,n, a collaborative obfuscation strategy suitable for multiple obfuscation methods is proposed in detail. Finally, we verified that the obfuscation strategy indeed improves the performance of obfuscation through experiments.作者: 音樂戲劇 時間: 2025-3-23 01:23 作者: 愛哭 時間: 2025-3-23 05:57
,Certificateless Proxy Authentication Scheme on Lattices Under the?Background of Big Data,ignature scheme on lattices, and puts the scheme into the background of big data to realize authentication. The safety of the problem is proved by using the difficulty of small integer solutions on the lattices. Compared with other existing proxy signature schemes, it has low computational complexity and higher security.作者: Obligatory 時間: 2025-3-23 11:31 作者: 友好 時間: 2025-3-23 14:05
1865-0929 ng and big data. The volume covers many aspects of data mining and big data as well as intelligent computing methods applied to all fields of computer science, machine learning, data mining and knowledge discovery, data science, etc..978-981-16-7501-0978-981-16-7502-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 小爭吵 時間: 2025-3-23 19:47 作者: Cultivate 時間: 2025-3-24 00:21 作者: molest 時間: 2025-3-24 06:13
Introduction: Beyond the Hunger of Memories,een the knowledge points are inferred according to the queries from students. It is verified that the knowledge graph on course learning performs significant effectiveness and efficiency in personalized online teaching.作者: 男生如果明白 時間: 2025-3-24 07:36 作者: ALIBI 時間: 2025-3-24 11:07 作者: 滴注 時間: 2025-3-24 15:22
The Construction of Knowledge Graph for Personalized Online Teaching,een the knowledge points are inferred according to the queries from students. It is verified that the knowledge graph on course learning performs significant effectiveness and efficiency in personalized online teaching.作者: 建筑師 時間: 2025-3-24 20:10
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/262918.jpg作者: antenna 時間: 2025-3-25 00:02 作者: creatine-kinase 時間: 2025-3-25 05:59
978-981-16-7501-0Springer Nature Singapore Pte Ltd. 2021作者: cyanosis 時間: 2025-3-25 10:46 作者: callous 時間: 2025-3-25 14:20 作者: 大量 時間: 2025-3-25 18:35 作者: tackle 時間: 2025-3-25 21:34 作者: 令人心醉 時間: 2025-3-26 01:09 作者: 發(fā)誓放棄 時間: 2025-3-26 05:53 作者: 寄生蟲 時間: 2025-3-26 08:30 作者: Affirm 時間: 2025-3-26 14:56 作者: echnic 時間: 2025-3-26 18:32
Collective Education in the Kibbutzdefinition evaluation function based on improved maximum local variation and focusing window selection. Firstly, the focusing window is selected by gradient accumulation of a 4-directional Scharr operator in order to reduce the calculation complexity and improve the accuracy of evaluation results. S作者: Carcinogenesis 時間: 2025-3-26 23:58
https://doi.org/10.1007/978-1-4684-8878-4lyzing the effect of single obfuscation method, leaving few discussions on cooperative obfuscation of multiple methods. This paper firstly presented a brief introduction of the concept and methods of code obfuscation, then designed and implemented an obfuscator with multiple obfuscation methods. The作者: 惰性女人 時間: 2025-3-27 03:45 作者: 朝圣者 時間: 2025-3-27 05:55 作者: GET 時間: 2025-3-27 09:38 作者: 楓樹 時間: 2025-3-27 16:18 作者: LUCY 時間: 2025-3-27 19:31
Complexity Science and The Cite Cohortbroad. Consensus algorithms are very important in blockchain applications. Now the alliance chain mainly uses the PBFT consensus algorithm, but the main node selection step of the algorithm needs to be maintained by all nodes in the alliance chain, which has high consumption and high latency perform作者: 離開 時間: 2025-3-27 23:49
Complexity Science and The Cite CohortOn the one hand, if a malicious MIoT device issues its false data under full privacy protection, then this device may abuse the privacy protection function to arbitrarily issue its false data, and it can not be disclosed. Therefore, in this paper we propose a traceable identity-based ring signature 作者: Repetitions 時間: 2025-3-28 03:37
https://doi.org/10.1007/978-3-031-41921-8tasks owing to its strong local search capabilities. However, it is precisely this capability that reduces the population diversity, which makes it unable to obtain the good performance on the multimodal optimization problems (MMOPs) aiming at locating all global optimal solutions during a single al作者: Hyperlipidemia 時間: 2025-3-28 08:44
https://doi.org/10.1007/978-3-031-41921-8belief degree of elements in Dempster-Shafer theory. But how to measure the divergence among . is still under research. This paper proposes a novel belief divergence measure based on classic . divergence. Comparing to the existing divergence, the new proposed divergence performs better in measuring 作者: 反叛者 時間: 2025-3-28 13:53
https://doi.org/10.1007/978-3-031-41921-8y signatures based on the decomposition of large integers and the difficulty of discrete logarithms, lattice-based cryptography have higher security and computational efficiency. This paper uses the pre-image sampling algorithm and trapdoor generation algorithm to construct a certificateless proxy s作者: 寄生蟲 時間: 2025-3-28 16:15
Data Mining and Big Data978-981-16-7502-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 使長胖 時間: 2025-3-28 18:55 作者: 高原 時間: 2025-3-29 00:09
Hypergraph Ontology Sparse Vector Representation and Its Application to Ontology Learning,thm. For structural data, graphs and hypergraph representations are often ideal choices, which can effectively represent the connections between data. The edge weight function can also be used to express the strength of the connection, and the adjacency matrix and the Laplacian matrix describe a kin作者: 牢騷 時間: 2025-3-29 06:15 作者: handle 時間: 2025-3-29 09:04 作者: Cryptic 時間: 2025-3-29 11:37 作者: 彎腰 時間: 2025-3-29 19:37 作者: 讓步 時間: 2025-3-29 21:10 作者: 結(jié)構(gòu) 時間: 2025-3-30 02:44 作者: Gratulate 時間: 2025-3-30 06:56 作者: burnish 時間: 2025-3-30 10:43 作者: 散開 時間: 2025-3-30 12:50
The Construction of Knowledge Graph for Personalized Online Teaching,tions. In this paper, some subject knowledge graphs are constructed to adapt to the educational development in big data environment, and the relationships between knowledge nodes are analyzed in order to provide students with a personalized online teaching for knowledge learning. Specially, a knowle作者: 財主 時間: 2025-3-30 18:24 作者: 腐蝕 時間: 2025-3-30 23:37 作者: 用不完 時間: 2025-3-31 03:03 作者: 注射器 時間: 2025-3-31 08:04 作者: 赤字 時間: 2025-3-31 09:11 作者: evince 時間: 2025-3-31 13:52 作者: CRP743 時間: 2025-3-31 19:04
A Generalized , Divergence for Multisource Information Fusion,belief degree of elements in Dempster-Shafer theory. But how to measure the divergence among . is still under research. This paper proposes a novel belief divergence measure based on classic . divergence. Comparing to the existing divergence, the new proposed divergence performs better in measuring 作者: 招人嫉妒 時間: 2025-3-31 23:57
,Certificateless Proxy Authentication Scheme on Lattices Under the?Background of Big Data,y signatures based on the decomposition of large integers and the difficulty of discrete logarithms, lattice-based cryptography have higher security and computational efficiency. This paper uses the pre-image sampling algorithm and trapdoor generation algorithm to construct a certificateless proxy s作者: 整體 時間: 2025-4-1 03:11 作者: 共和國 時間: 2025-4-1 09:56
Junichiro Wada,Norman Schofielder. A classifier model at the server-side is constructed with extracted feature maps as input and labels as output. Furthermore, we put forward the model transfer method to improve final performance. Extensive experiments demonstrate that the accuracy of VFedConv is close to the centralized model.作者: Cabg318 時間: 2025-4-1 10:29 作者: 聲明 時間: 2025-4-1 17:17
Voting Systems in Theory and Practicee on the Neo4j platform. The results proved that the method could describe the steps of intelligent attacks on unmanned vehicles well and provide a basis for unmanned vehicle attack detection and establishing an unmanned vehicle defense system. Furthermore, it has good generalizability.作者: 參考書目 時間: 2025-4-1 19:07 作者: 植物學(xué) 時間: 2025-4-2 02:19 作者: 中子 時間: 2025-4-2 03:54
Introduction: Beyond the Hunger of Memories, first conducted the fine-grained sentiment analysis and classification of the light food customer reviews via the SnowNLP technique. In addition, LDA topic modeling was used to analyze positive and negative topics of customer reviews. The experimental results were visualized and the research showed作者: 貴族 時間: 2025-4-2 10:19
Social Studies Education in Schoolt, and got the performance changes of different models. Compared with CNN, SVM and other algorithms, the intrusion detection method is evaluated by performance indicators such as accuracy rate and false alarm rate. It is finally proved that ResNet can better deal with the intrusion detection classif作者: 談判 時間: 2025-4-2 14:18