標題: Titlebook: Data Science; 8th International Co Yang Wang,Guobin Zhu,Zeguang Lu Conference proceedings 2022 The Editor(s) (if applicable) and The Author [打印本頁] 作者: hearken 時間: 2025-3-21 17:58
書目名稱Data Science影響因子(影響力)
書目名稱Data Science影響因子(影響力)學科排名
書目名稱Data Science網(wǎng)絡公開度
書目名稱Data Science網(wǎng)絡公開度學科排名
書目名稱Data Science被引頻次
書目名稱Data Science被引頻次學科排名
書目名稱Data Science年度引用
書目名稱Data Science年度引用學科排名
書目名稱Data Science讀者反饋
書目名稱Data Science讀者反饋學科排名
作者: 帶傷害 時間: 2025-3-21 21:16
https://doi.org/10.1007/978-981-19-4169-6y examples, aiming to effectively disturb the accuracy of WF attacks with deep learning networks and precisely insert a few dummy packets. The defense extracts the key features of similar websites through a feature extraction network with adapted Grad-CAM and applies the features to interfere with t作者: 窗簾等 時間: 2025-3-22 04:00 作者: 使長胖 時間: 2025-3-22 06:57
https://doi.org/10.1007/978-3-7643-8550-7field greenhouse crops. The results show that the performance of this model is better than that of the PID model and fuzzy control model in simulation experiments and actual scene control. Compared with the flowers in the natural state, the plants of the flowers under systematic control were approxi作者: COST 時間: 2025-3-22 11:07 作者: Peak-Bone-Mass 時間: 2025-3-22 16:35 作者: Peak-Bone-Mass 時間: 2025-3-22 20:01
Gholamreza Azizi,Abbas Mirshafiey, we proposed two metrics for forecasting: the trend forecasting index and the forecasting stability index. Finally, we introduce a kind of punishment strategy to optimize forecasting models based on the potential pattern of research objects.作者: 舞蹈編排 時間: 2025-3-22 23:55
Radioactivity of the Atmosphereescribes the functions and implementation process of the four levels of the AR assembly system in detail, which can help readers quickly understand the connection between AR technology and AI technology and understand the principle of the virtual assembly guidance system.作者: OATH 時間: 2025-3-23 02:49
Research on the Realization Path and Application of a Data Governance System Based on Data Architectrovide a scientific and reasonable technical system for effectively solving the problems of data governance. This paper redefined the information technology architecture and proposed the data architecture as the connection link and application support system between the traditional hardware architec作者: mighty 時間: 2025-3-23 09:32 作者: 煩躁的女人 時間: 2025-3-23 10:26 作者: Bph773 時間: 2025-3-23 14:40
Study on the Intelligent Control Model of a Greenhouse Flower Growing Environmentfield greenhouse crops. The results show that the performance of this model is better than that of the PID model and fuzzy control model in simulation experiments and actual scene control. Compared with the flowers in the natural state, the plants of the flowers under systematic control were approxi作者: Malaise 時間: 2025-3-23 21:02
A Multi-event Extraction Model for Nursing Recordshe multi-event argument attribution problem. By observing the results of automatic event extraction by our model, we detect missing items in the existing nursing records. This proves that our model can be used to help nurses check and improve the method of recording nursing processes.作者: V切開 時間: 2025-3-24 01:38
Cuffless Blood Pressure Estimation Based on Both Artificial and Data-Driven Features from Plethysmog deep residual neural network is designed to reduce information redundancy in the gathered features and refine high-level features for BP estimation. The results show that our proposed methods outperforms the compared methods in three commonly used metrics.作者: left-ventricle 時間: 2025-3-24 02:59 作者: bronchodilator 時間: 2025-3-24 09:03
Intelligent Industrial Auxiliary System Based on AR Technologyescribes the functions and implementation process of the four levels of the AR assembly system in detail, which can help readers quickly understand the connection between AR technology and AI technology and understand the principle of the virtual assembly guidance system.作者: narcissism 時間: 2025-3-24 13:36
Data Quality Identification Model for?Power Big Dataased on data augmentation technology. Tri-training is applied to detect abnormal data from different power data from different feature spaces. Experiments and simulations are performed to demonstrate the effectiveness of the proposed model.作者: plasma 時間: 2025-3-24 16:28
Research on the Design and Education of Serious Network Security Gamesconcept of a serious game and its significance to the network security curriculum of schools and designs the corresponding card game according to the feature of network security. The purpose of this paper is to strengthen overall network security awareness, cultivate professional skills, and enhance network security.作者: 反話 時間: 2025-3-24 20:15
KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitmentng the FO commitment. Unlike the typical Paillier algorithm, the KPH scheme’s Paillier algorithm includes a variable k and combines the L function and the Chinese remainder theorem to reduce the time complexity of the algorithm from . to ., making the decryption process more efficient.作者: RADE 時間: 2025-3-25 02:36
User Attribute Prediction Method Based on Stacking Multimodel Fusion stacking framework, and the training results of the first layer were input as new training data into the second layer LightGBM for training. Experiments show that the proposed model can improve the accuracy of prediction results.作者: eucalyptus 時間: 2025-3-25 06:21
1865-0929 tions; Data Security and Privacy; Applications of Data Science; Infrastructure for Data Science; Education Track; Regulatory Technology in Finance..978-981-19-5208-1978-981-19-5209-8Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Preamble 時間: 2025-3-25 08:34 作者: 貪婪地吃 時間: 2025-3-25 14:57 作者: stress-test 時間: 2025-3-25 15:48
Conference proceedings 2022Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in? August, 2022...The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Management and Applications; Dat作者: 典型 時間: 2025-3-25 21:59 作者: Heretical 時間: 2025-3-26 00:33
BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereumtransfer relationships between transaction parties while preventing overspending attacks and double-spending attacks. Compared with other anonymous schemes, this scheme has less cost of proof and takes less time for transaction verification while meeting the high requirements of anonymity and security.作者: Sinus-Node 時間: 2025-3-26 05:25 作者: 施魔法 時間: 2025-3-26 10:22 作者: Cardioplegia 時間: 2025-3-26 16:40
,The House of Commons — Speakers and Clerks,ased on data augmentation technology. Tri-training is applied to detect abnormal data from different power data from different feature spaces. Experiments and simulations are performed to demonstrate the effectiveness of the proposed model.作者: Isometric 時間: 2025-3-26 20:25 作者: 孤獨無助 時間: 2025-3-26 23:22
Glandular Epithelium and Glandsng the FO commitment. Unlike the typical Paillier algorithm, the KPH scheme’s Paillier algorithm includes a variable k and combines the L function and the Chinese remainder theorem to reduce the time complexity of the algorithm from . to ., making the decryption process more efficient.作者: Servile 時間: 2025-3-27 01:20
Gholamreza Azizi,Abbas Mirshafiey stacking framework, and the training results of the first layer were input as new training data into the second layer LightGBM for training. Experiments show that the proposed model can improve the accuracy of prediction results.作者: Ossification 時間: 2025-3-27 05:18 作者: 印第安人 時間: 2025-3-27 09:39
Glandular Epithelium and Glandsdomains (D-QIM). It can not only resist the above two attacks well, but also adjust the performance trade-offs by controlling the parameters. Simulation results confirm the performance gain of D-QIM in terms of the bit error rate (BER).作者: 主動 時間: 2025-3-27 17:10
Research on the Realization Path and Application of a Data Governance System Based on Data Architect construction of the data governance system and the improvement of data governance capacity are short boards and weak links, which have seriously restricted the construction and development of the digital economy, digital society and digital government. At present, the broad concept of data governan作者: Banquet 時間: 2025-3-27 18:36
Data Quality Identification Model for?Power Big Dataer, the lack of labeled data makes the detection of abnormal data more challenging. Then, a data quality identification model for power big data is proposed. It can detect abnormal data from massive power big data. In this model, power data are grouped and then mapped into different feature spaces b作者: moratorium 時間: 2025-3-27 23:45 作者: ablate 時間: 2025-3-28 04:04
Data Hiding in?the?Division Domain: Simultaneously Achieving Robustness to?Scaling and?Additive Atta resisting scaling attacks and additive attacks. To this end, this paper proposes a new quantization index modulation (QIM) variant based on division domains (D-QIM). It can not only resist the above two attacks well, but also adjust the performance trade-offs by controlling the parameters. Simulati作者: 學術討論會 時間: 2025-3-28 06:44 作者: Flagging 時間: 2025-3-28 13:28
Research on the Design and Education of Serious Network Security Gamesing solution countermeasure can also develop the student’s correct social behavior and value idea. Furthermore, through rule design and role play, students can improve the overall level of network security awareness and enhance their sense of cooperation during their studies. This paper defines the 作者: FRAUD 時間: 2025-3-28 15:10
KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment problem for blockchain transactions. To address this issue, this work introduces KPH (Paillier Homomorphic Encryption with Variable k), a privacy protection strategy that updates the transaction amount using the enhanced Paillier semihomomorphic encryption algorithm and verifies the transaction usi作者: Hyperplasia 時間: 2025-3-28 18:48
Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryptionto collaborate without the participation of third-party intermediaries. Existing blockchain access control schemes usually use attribute-based encryption, but most of them adopt traditional single-attribute authority for attribute authorization, which has the problem that the authority is overburden作者: 兇殘 時間: 2025-3-28 23:30 作者: Maximize 時間: 2025-3-29 05:31 作者: 流動才波動 時間: 2025-3-29 07:29 作者: 最初 時間: 2025-3-29 12:10
User Attribute Prediction Method Based on Stacking Multimodel Fusionof users, this paper constructs an attribute prediction method based on stacking multimodel integration. The user’s browsing and clicking history is analyzed to predict the user’s basic attributes. First, LR, RF, XGBoost, and ExtraTree were selected as the base classifiers for the first layer of the作者: Notify 時間: 2025-3-29 17:11
How is the Power of the Baidu Index for Forecasting Hotel Guest Arrivals? –A Case Study of Guilinpower of the Baidu index for hotel guest arrivals in fine granularity at the micro level. Taking Guilin as a case study, we use the OLS regression method to quantitatively investigate the forecasting power of the Baidu index for daily hotel guest arrivals and to comprehensively evaluate the performa作者: CRATE 時間: 2025-3-29 22:20 作者: BLAND 時間: 2025-3-30 00:31
Intelligent Industrial Auxiliary System Based on AR Technologyvirtual assembly systems based on augmented reality technology have appeared in recent years, most of these assembly systems are noninteractive, nonintelligent, and inefficient. In response to this problem, we combined AR technology and AI technology to design and implement a strong interactive, hig作者: 絕食 時間: 2025-3-30 06:51 作者: 費解 時間: 2025-3-30 09:59
https://doi.org/10.1007/978-90-313-9004-5 construction of the data governance system and the improvement of data governance capacity are short boards and weak links, which have seriously restricted the construction and development of the digital economy, digital society and digital government. At present, the broad concept of data governan作者: Heresy 時間: 2025-3-30 13:45 作者: Indict 時間: 2025-3-30 17:37 作者: 從容 時間: 2025-3-30 22:06 作者: 喃喃而言 時間: 2025-3-31 03:32
Glandular Epithelium and Glandseakage when trading on blockchain, and the existing anonymous trading schemes still have some problems. To meet the high requirement of anonymity, the cost of proof submitted by the user is too large, which does not apply to blockchain storage. Meanwhile, transaction verification takes too long to e作者: 煞費苦心 時間: 2025-3-31 07:00
Glandular Epithelium and Glandsing solution countermeasure can also develop the student’s correct social behavior and value idea. Furthermore, through rule design and role play, students can improve the overall level of network security awareness and enhance their sense of cooperation during their studies. This paper defines the