標(biāo)題: Titlebook: Data Mining and Big Data; 6th International Co Ying Tan,Yuhui Shi,Jun Cai Conference proceedings 2021 Springer Nature Singapore Pte Ltd. 20 [打印本頁(yè)] 作者: lutein 時(shí)間: 2025-3-21 19:08
書(shū)目名稱Data Mining and Big Data影響因子(影響力)
書(shū)目名稱Data Mining and Big Data影響因子(影響力)學(xué)科排名
書(shū)目名稱Data Mining and Big Data網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Data Mining and Big Data網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Data Mining and Big Data被引頻次
書(shū)目名稱Data Mining and Big Data被引頻次學(xué)科排名
書(shū)目名稱Data Mining and Big Data年度引用
書(shū)目名稱Data Mining and Big Data年度引用學(xué)科排名
書(shū)目名稱Data Mining and Big Data讀者反饋
書(shū)目名稱Data Mining and Big Data讀者反饋學(xué)科排名
作者: 矛盾心理 時(shí)間: 2025-3-21 23:34 作者: headlong 時(shí)間: 2025-3-22 03:09
An Improved Unsupervised White Blood Cell Classification via Contrastive Learning,ly, the high confidence clustering results are fed back to the pre-trained feature encoder, which can be used as the pseudo labels to form a closed loop. Experimental results on a dataset containing 574 leukocyte images demonstrate the effectiveness of the proposed method.作者: 鐵塔等 時(shí)間: 2025-3-22 08:15 作者: mechanism 時(shí)間: 2025-3-22 08:52
SC-VDM: A Lightweight Smart Contract Vulnerability Detection Model,e test SC-VDM on two datasets which each contain four types of smart contract vulnerabilities. The experimental results show that the accuracy and F1-score can reach more than 81% and 86% on two datasets. It performs best on the Reentrancy vulnerability which had caused The DAO attack in 2016, and t作者: badinage 時(shí)間: 2025-3-22 15:34
A Video Axle Counting and Type Recognition Method Based on Improved YOLOv5S,image stitching methods have a relatively high time cost. To solve this issue, we propose an object detection and tracking method based on YOLOv5s for axle counting and tire type identification. Experimental results show that the proposed method has extremely high accuracy and can meet real-time req作者: badinage 時(shí)間: 2025-3-22 18:52
An Anonymous Communication Scheme Between Nodes Based on Pseudonym and Bilinear Pairing in Big Datae and forward messages to achieve node anonymity. Secondly, based on bilinear mapping operation and hash-based message authentication code (HMAC), we achieved key agreement between nodes and verification of message integrity to protect data security. In addition, we propose the energy-based link dir作者: MELD 時(shí)間: 2025-3-22 23:32 作者: AV-node 時(shí)間: 2025-3-23 02:03 作者: innovation 時(shí)間: 2025-3-23 06:33
https://doi.org/10.1007/978-3-030-85806-3ristics of packet length. And a prototype is established based on Linphone, which is an open-source VoIP application. Through reality transmission tests, covert messages are delivered effectively, which proves that the CTC based on packet length are feasible.作者: 狂熱文化 時(shí)間: 2025-3-23 10:42 作者: MUMP 時(shí)間: 2025-3-23 16:52
Ana Cristina Pandolfo,Jaisson Teixeira Linoly, the high confidence clustering results are fed back to the pre-trained feature encoder, which can be used as the pseudo labels to form a closed loop. Experimental results on a dataset containing 574 leukocyte images demonstrate the effectiveness of the proposed method.作者: Limerick 時(shí)間: 2025-3-23 19:43 作者: CAND 時(shí)間: 2025-3-23 23:51
Cambridge Imperial and Post-Colonial Studiese test SC-VDM on two datasets which each contain four types of smart contract vulnerabilities. The experimental results show that the accuracy and F1-score can reach more than 81% and 86% on two datasets. It performs best on the Reentrancy vulnerability which had caused The DAO attack in 2016, and t作者: 擔(dān)心 時(shí)間: 2025-3-24 05:56
https://doi.org/10.1007/978-94-011-8904-0image stitching methods have a relatively high time cost. To solve this issue, we propose an object detection and tracking method based on YOLOv5s for axle counting and tire type identification. Experimental results show that the proposed method has extremely high accuracy and can meet real-time req作者: Paleontology 時(shí)間: 2025-3-24 08:54
Overburdened White Men (and Women)e and forward messages to achieve node anonymity. Secondly, based on bilinear mapping operation and hash-based message authentication code (HMAC), we achieved key agreement between nodes and verification of message integrity to protect data security. In addition, we propose the energy-based link dir作者: Compass 時(shí)間: 2025-3-24 14:21 作者: 時(shí)間等 時(shí)間: 2025-3-24 15:15 作者: 失望未來(lái) 時(shí)間: 2025-3-24 20:47
Data Mining and Big Data978-981-16-7476-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: epicardium 時(shí)間: 2025-3-24 23:50
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/262922.jpg作者: CUR 時(shí)間: 2025-3-25 06:22
Steve Taylor,Tim Matton-Johnsonthe mining power is rather high for the attackers, machine learning is accessary to a tyrant’s crimes. Thus the attackers can maximize their rewards by optimizing their attacking strategies. In this paper, we propose a novel intelligent attacking strategy (aka. BSMRL). More specifically, attackers o作者: 燦爛 時(shí)間: 2025-3-25 11:18
https://doi.org/10.1057/9781137475473 multi-dividing ontology learning algorithm makes full use of the characteristics of the tree structure ontology graph, and then plays a role in the engineering field. The main contribution of this paper is to use the Rademacher vector method to perform theoretical analysis on the multi-dividing ont作者: 細(xì)絲 時(shí)間: 2025-3-25 15:26 作者: 最高峰 時(shí)間: 2025-3-25 17:21
Kristine Moruzi,Michelle J. Smithth uniform dimension. The essence of the similarity calculation of the ontology concept is the calculation of the distance of the vector corresponding to the vertex in the high-dimensional space. This paper continues to consider the ontology learning algorithm of the multi-dividing setting, and prop作者: Contort 時(shí)間: 2025-3-26 00:02 作者: 的是兄弟 時(shí)間: 2025-3-26 00:41 作者: 我要威脅 時(shí)間: 2025-3-26 07:06 作者: 聽(tīng)寫(xiě) 時(shí)間: 2025-3-26 12:01 作者: 密切關(guān)系 時(shí)間: 2025-3-26 15:44
Colonial Heritage, Power, and Contestationmplex morphology and wide variety of bone marrow cells, their segmentation is still a challenging task. To improve the accuracy of bone marrow cell segmentation, we propose an end-to-end U-shaped network based on the pyramid residual convolution and the attention mechanism. Specifically, the standar作者: 溫室 時(shí)間: 2025-3-26 18:47
Ana Cristina Pandolfo,Jaisson Teixeira Linoherefore, the classification of WBCs in the images is a basic task. Most of the existing WBCs classification methods are based on supervised learning, which highly depends on a large number of image labels. To cope with the challenge of image annotation, in this paper, we propose an unsupervised WBC作者: promote 時(shí)間: 2025-3-26 23:30
The Latin American Studies Book SeriesLOv3 is a relatively mature object detection method. However, for the long-distance pedestrian detection task in high-altitude scenes, YOLOv3 has the limitations of low detection speed and low detection accuracy. This paper proposes an improved YOLOv3 method briefly called YOLOv3-M for the high-alti作者: HAUNT 時(shí)間: 2025-3-27 03:56 作者: 百靈鳥(niǎo) 時(shí)間: 2025-3-27 05:23 作者: CAPE 時(shí)間: 2025-3-27 11:56 作者: 凹槽 時(shí)間: 2025-3-27 17:07
https://doi.org/10.1007/978-94-011-8904-0calculated according to the number of axles of the truck and the type of axles. Therefore, the identification of the axle is of great significance for judging whether the truck is overweight. At present, the method of calculating the axles is carried out by the method of Laser Radar or grating for a作者: Neuropeptides 時(shí)間: 2025-3-27 19:29
Overburdened White Men (and Women)ion, but to professionally process these meaningful data. The emergence of big data technology has made the Internet of Things a reality. Among them, wireless sensor networks (WSNs) have been widely used in military, medical and other fields. WSNs can be used to realize data collection, processing a作者: grenade 時(shí)間: 2025-3-28 00:21 作者: 小丑 時(shí)間: 2025-3-28 03:55
Bollywood, Chicken Curry — and ITted and uneven resource distribution of the sensor equipment, the service life of the wireless sensor is seriously affected. Moreover, the problem of privacy leakage in wireless sensor networks is becoming more and more serious. In order to solve the resource-constrained and privacy-leaking problems作者: 人造 時(shí)間: 2025-3-28 08:02 作者: Embolic-Stroke 時(shí)間: 2025-3-28 13:31
https://doi.org/10.1007/978-981-16-7476-1artificial intelligence; communication systems; computer hardware; computer networks; computer security; 作者: ellagic-acid 時(shí)間: 2025-3-28 15:07
978-981-16-7475-4Springer Nature Singapore Pte Ltd. 2021作者: 殘暴 時(shí)間: 2025-3-28 22:08 作者: BLAZE 時(shí)間: 2025-3-29 00:43 作者: EXALT 時(shí)間: 2025-3-29 04:33 作者: Barter 時(shí)間: 2025-3-29 10:07
A Novel Complex Pignistic Belief Transform for Conflict Measure in Complex Evidence Theory,sed, and some properties of the betting distance are analyzed, including the non-negativeness, nondegeneracy, symmetry, and triangle inequality. The betting distance can be used to measure the conflict between CBBAs. In addition, an example is given to show the advantage of betting distance compared to the conflict coefficient.作者: 大約冬季 時(shí)間: 2025-3-29 12:34
Conference proceedings 2021021, held in Guangzhou, China, in October 2021.?.The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on?advantages in theories, technologies, and applications in data mining and big 作者: MORT 時(shí)間: 2025-3-29 17:21
BSMRL: Bribery Selfish Mining with Reinforcement Learning,ptimize, combining with bribery attacks, their strategies to maximize the rewards by utilizing reinforcement learning. Simulation results indicate that BSMRL can greatly reduce the threshold for the attackers with higher rewards. Compared with the normal selfish miners, intelligent attackers are more dangerous to the system of Ethereum.作者: 圓錐 時(shí)間: 2025-3-29 22:39 作者: 文字 時(shí)間: 2025-3-30 00:56
A Network Based Quantitative Method for the Mining and Visualization of Music Influence, directed weighted Influencer-Follower network. Experimental results indicate that the AR can quantify the influence value and Influencer-Follower network based on LMIFNC can embody the relationship of different artists.作者: conspicuous 時(shí)間: 2025-3-30 06:02 作者: Dawdle 時(shí)間: 2025-3-30 12:01 作者: 微粒 時(shí)間: 2025-3-30 15:24
Conference proceedings 2021data. The volume covers many aspects of data mining and big data as well as intelligent computing methods applied to all fields of computer science, machine learning, data mining and knowledge discovery, data science, etc..作者: CUB 時(shí)間: 2025-3-30 16:40 作者: 精致 時(shí)間: 2025-3-30 22:14
The Latin American Studies Book Series the high-altitude pedestrian dataset. Next, it uses the Distance Intersection over Union (DIoU) loss function to alleviate the problem of high-altitude pedestrian overlapping. Experimental results show that the proposed YOLOv3-M improves the detection precision and the detection speed compared to YOLOv3.作者: 乞討 時(shí)間: 2025-3-31 02:30 作者: occurrence 時(shí)間: 2025-3-31 08:17
1865-0929 ta, DMBD 2021, held in Guangzhou, China, in October 2021.?.The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on?advantages in theories, technologies, and applications in data minin作者: 全面 時(shí)間: 2025-3-31 11:46 作者: 不成比例 時(shí)間: 2025-3-31 14:38 作者: 無(wú)意 時(shí)間: 2025-3-31 21:09
The Theoretical Analysis of Multi-dividing Ontology Learning by Rademacher Vector,ngineering field. The main contribution of this paper is to use the Rademacher vector method to perform theoretical analysis on the multi-dividing ontology learning algorithm and obtain the error bound estimate for .-statistic criterion. The main proof tricks are to use the skills of statistical learning theory and McDiarmid’s inequality.作者: Silent-Ischemia 時(shí)間: 2025-3-31 22:30 作者: homocysteine 時(shí)間: 2025-4-1 03:02
Steve Taylor,Tim Matton-Johnsonptimize, combining with bribery attacks, their strategies to maximize the rewards by utilizing reinforcement learning. Simulation results indicate that BSMRL can greatly reduce the threshold for the attackers with higher rewards. Compared with the normal selfish miners, intelligent attackers are more dangerous to the system of Ethereum.作者: 偽造 時(shí)間: 2025-4-1 09:44