標(biāo)題: Titlebook: Data Science; 7th International Co Jianchao Zeng,Pinle Qin,Zeguang Lu Conference proceedings 2021 Springer Nature Singapore Pte Ltd. 2021 a [打印本頁] 作者: Opulent 時間: 2025-3-21 19:03
書目名稱Data Science影響因子(影響力)
書目名稱Data Science影響因子(影響力)學(xué)科排名
書目名稱Data Science網(wǎng)絡(luò)公開度
書目名稱Data Science網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Science被引頻次
書目名稱Data Science被引頻次學(xué)科排名
書目名稱Data Science年度引用
書目名稱Data Science年度引用學(xué)科排名
書目名稱Data Science讀者反饋
書目名稱Data Science讀者反饋學(xué)科排名
作者: 得罪 時間: 2025-3-21 22:16
Further topics in competing risksnal neural models obtained impressive performance on standard benchmarks, they often encounter performance degradation when being applied to knowledge-intensive domains like medicine and science. To address this problem and further fill the knowledge gap, we present a simple Evidence-Based Inference作者: Yourself 時間: 2025-3-22 04:04 作者: STAT 時間: 2025-3-22 04:37 作者: 新娘 時間: 2025-3-22 11:29
https://doi.org/10.1057/9780230604285otential public opinion information from online reviews has a certain value for the government to clarify the next work direction. In this paper, the event evolution graph is designed to make COVID-19 network public opinion prediction. The causal relationship was extracted in the network reviews aft作者: cardiovascular 時間: 2025-3-22 13:15 作者: cardiovascular 時間: 2025-3-22 17:23 作者: DEMUR 時間: 2025-3-22 23:01 作者: Intractable 時間: 2025-3-23 02:53
Competing on Supply Chain Qualityroposed using visual annotation to interpret the internal structure of CNN from the semantic perspective. First, filters are screened in the high layers of the CNN. For a certain category, the important filters are selected by their activation values, frequencies and classification contribution. The作者: COLON 時間: 2025-3-23 05:40
Competing on Supply Chain Quality provide four types of explanations including logical rules, revealing hidden semantics, sensitivity analysis, and providing examples as prototypes. In this paper, an interpretability method is proposed for revealing semantic representations at hidden layers of CNNs through lightweight annotation by作者: obnoxious 時間: 2025-3-23 10:57
Springer Series in Supply Chain Management (PLM) in natural language processing (NLP), using PLM has become a brand new research direction of ERE. In this paper, BERT is used to extracting entity-relations, and a separated pipeline architecture is proposed. ERE was decomposed into entity-relation classification sub-task and entity-pair anno作者: molest 時間: 2025-3-23 15:09 作者: SPER 時間: 2025-3-23 21:15
https://doi.org/10.1007/978-3-030-55765-2However, most of the data is processed and stored in plaintext, resulting in data leakage. At the same time, simple encrypted storage ensures the confidentiality of the cloud data, but has the following problems: if the encrypted data is downloaded to the client and then decrypted, the search effici作者: 附錄 時間: 2025-3-23 22:29
https://doi.org/10.1007/978-3-030-55765-2 communication based on Generative Adversarial Networks, resulting in related discussions and research. In the encrypted communication model, when part of the plaintext is leaked to the attacker, it will cause slow decryption or even being unable to decrypt the communication party, and the high succ作者: 可觸知 時間: 2025-3-24 04:10
https://doi.org/10.1007/978-3-030-55765-2search topic. In this paper, the Paillier homomorphic encryption algorithm is proposed to protect the privacy data. The original LeNet-5 convolutional neural network model was first improved. Then the activation function was modified and the C5 layer was removed to reduce the number of model paramet作者: ZEST 時間: 2025-3-24 08:43 作者: Amendment 時間: 2025-3-24 13:37
https://doi.org/10.1007/978-3-030-55765-2tuational awareness methods only consider the unilateral impact of attack or defense, but lackconsideration of joint actions by both parties. Applying game theory to security situational awareness can measure the impact of the opposition and interdependence of the offensive and defensive parties. Th作者: 性滿足 時間: 2025-3-24 18:01 作者: Loathe 時間: 2025-3-24 20:05
https://doi.org/10.1007/978-981-16-5943-0access control; artificial intelligence; authentication; computer hardware; computer networks; computer s作者: Trypsin 時間: 2025-3-25 00:14
978-981-16-5942-3Springer Nature Singapore Pte Ltd. 2021作者: 切掉 時間: 2025-3-25 06:28 作者: Inoperable 時間: 2025-3-25 09:24
Conference proceedings 2021ngineers and Educators, ICPCSEE 2021 held in Taiyuan, China, in September 2021..The 81 papers presented in these two volumes were carefully reviewed and selected from 256 submissions. The papers are organized in topical sections on big data management and applications; social media and recommendatio作者: 憂傷 時間: 2025-3-25 14:58 作者: Endearing 時間: 2025-3-25 19:35 作者: Indelible 時間: 2025-3-25 23:57 作者: 不能平靜 時間: 2025-3-26 03:06
https://doi.org/10.1007/978-3-319-25451-7oposed. The model was verified on the MOOC comment data set, and compared with the traditional user comment sentiment analysis model. The results show the accuracy of the model was improved to a certain extent.作者: Spinal-Fusion 時間: 2025-3-26 06:49 作者: 你敢命令 時間: 2025-3-26 11:41 作者: DUST 時間: 2025-3-26 13:53 作者: gruelling 時間: 2025-3-26 17:31 作者: 尖牙 時間: 2025-3-26 21:09 作者: 箴言 時間: 2025-3-27 04:38 作者: adequate-intake 時間: 2025-3-27 07:48 作者: 四指套 時間: 2025-3-27 13:18 作者: 假裝是我 時間: 2025-3-27 14:13
Sebastian Conrad,Dominic SachsenmaierN) effectively, the algorithm considers the influence of node information on the characteristics of metapath. The results of Top-k query verify the effectiveness of CMTE-PathSim on real datasets and improve the quality of citation recommendation.作者: 胖人手藝好 時間: 2025-3-27 21:31 作者: GAVEL 時間: 2025-3-27 23:15 作者: 投票 時間: 2025-3-28 05:32 作者: Guaff豪情痛飲 時間: 2025-3-28 08:08
Further topics in competing risksgn a specialized CNN-based encoder according to the structure of clues to better model them. Experiments show that the proposed encoder outperforms strong baselines, and our EBIM model outperforms other knowledge-based approaches on the SciTail benchmark and establishes a new state-of-the-art performance on the MedNLI dataset.作者: CLOUT 時間: 2025-3-28 13:24 作者: 繁忙 時間: 2025-3-28 18:00 作者: incisive 時間: 2025-3-28 20:27
Springer Series in Supply Chain Managementaring attention mechanism was added to the model, sharing the attention parameters according to the similarity of the attention matrix. Contrast experiment on the SemEavl 2010 Task8 dataset demonstrates that the new MLM task and inter-layer sharing attention mechanism improve the performance of BERT on the entity relation extraction effectively.作者: Rebate 時間: 2025-3-29 01:27 作者: 博愛家 時間: 2025-3-29 03:08 作者: 合乎習(xí)俗 時間: 2025-3-29 10:39 作者: circuit 時間: 2025-3-29 13:35 作者: 粗俗人 時間: 2025-3-29 17:54 作者: placebo 時間: 2025-3-29 23:12
Analyzing Interpretability Semantically via CNN Visualizationant filters are shown, and the semantic accuracy of filters are verified with reference to the expert feature image sets. In addition, the results verify the semantic consistency of the same important filters under similar categories, which indicates the stability of semantic annotation of these filters.作者: 轎車 時間: 2025-3-30 02:29
Probing Filters to Interpret CNN Semantic Configurations by Occlusiont recognize these semantics. The method is applied to the datasets of mechanical equipment, animals and clothing images. The proposed method performs well in the experiments assessing interpretability qualitatively and quantitatively.作者: 絕種 時間: 2025-3-30 06:43 作者: 幻想 時間: 2025-3-30 11:26
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloudtly improved to meet the user’s security and performance requirements within budgets through SECaaS. The experimental results show that SECaaS can help the users to focus on application-level requirements (monetary costs, required security level, etc.) and automate the process of application orchestration.作者: 引導(dǎo) 時間: 2025-3-30 15:45
Research on Plaintext Resilient Encrypted Communication Based on Generative Adversarial Networkption within 1000 steps, and the error rate of the attacker is increased to more than 0.9 without affecting the decryption of the communicator, which reduces the loss rate of the entire communication to less than 0.05. The optimized neural network can ensure secure encrypted communication of information.作者: incision 時間: 2025-3-30 19:09 作者: 無王時期, 時間: 2025-3-30 21:38
IoT Security Situational Awareness Based on Q-Learning and Bayesian Gameants of different types. The proposed method comprehensively considers offensive and defensive actions, obtains optimal defense decisions in multi-state and multi-type situations, and evaluates security situation. Experimental results prove the effectiveness of this method.作者: Prostatism 時間: 2025-3-31 02:20 作者: 使高興 時間: 2025-3-31 09:05
Construction of Multimodal Chinese Tourism Knowledge GraphEncyclopedia. In addition, based on the types of tourist attractions and the styles of tourism route, a tourism route generation algorithm was proposed, which can automatically schedule the tourism routes by incorporating tourist attractions and the route style. Experimental results show that the ge作者: 貪婪的人 時間: 2025-3-31 09:45 作者: Forehead-Lift 時間: 2025-3-31 17:19
Competing Risks and Multistate Models with REncyclopedia. In addition, based on the types of tourist attractions and the styles of tourism route, a tourism route generation algorithm was proposed, which can automatically schedule the tourism routes by incorporating tourist attractions and the route style. Experimental results show that the ge