標(biāo)題: Titlebook: Data Science – Analytics and Applications; Proceedings of the 4 Peter Haber,Thomas J. Lampoltshammer,Manfred Mayr Conference proceedings 20 [打印本頁] 作者: 從未沮喪 時間: 2025-3-21 17:17
書目名稱Data Science – Analytics and Applications影響因子(影響力)
書目名稱Data Science – Analytics and Applications影響因子(影響力)學(xué)科排名
書目名稱Data Science – Analytics and Applications網(wǎng)絡(luò)公開度
書目名稱Data Science – Analytics and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Science – Analytics and Applications被引頻次
書目名稱Data Science – Analytics and Applications被引頻次學(xué)科排名
書目名稱Data Science – Analytics and Applications年度引用
書目名稱Data Science – Analytics and Applications年度引用學(xué)科排名
書目名稱Data Science – Analytics and Applications讀者反饋
書目名稱Data Science – Analytics and Applications讀者反饋學(xué)科排名
作者: 哎呦 時間: 2025-3-21 22:18
https://doi.org/10.1007/978-981-13-1132-1ch are conducted on DCASE 2021 (IEEE AASP Challenge on Detection and Classification of Acoustic Scenes and Events) Task 1A Development and Evaluation datasets, achieve a low-complexity CNN based framework with 128 KB trainable parameters and the best classification accuracy of 66.7% and 69.6%, impro作者: 極大痛苦 時間: 2025-3-22 00:54
Saurabh Singh Thakur,Ram Babu Roy on how to approach anomaly detection in medical imaging. The qualitative analysis is based on google scholar and 4 different search terms, resulting in 120 different analysed papers. The main results showed that the current research is mostly motivated by reducing the need for labelled data. Also, 作者: alabaster 時間: 2025-3-22 08:05
Soniya,Sandeep Paul,Lotika Singhrities associated with a UAS case study. ThreatGet’s findings are then used to outline a mapping procedure between threats and security requirements. This strategy aims to identify a set of security requirements to address potential threats and protect critical assets in UAS.作者: 輕打 時間: 2025-3-22 09:24
Soniya,Sandeep Paul,Lotika Singhrs which are inherited by data-objects to improve tolerance of data-integrity errors. We implement these Integrity-Aware Intelligent Data Objects as the IAIDO framework, and demonstrate this novel approach using real data on nutrition information, providing examples of real data-integrity faults in 作者: 焦慮 時間: 2025-3-22 14:39
On the Tangent-Half-Angle Substitutions as well as (external) experts to constantly work on their security strategies..Manufacturers are forced to protect themselves from external attacks towards their production operations. At the same time they have to open their environment and closely work together with suppliers and customers. Furt作者: 焦慮 時間: 2025-3-22 17:34
Data-driven Cut-off Frequency Optimization for Biomechanical Sensor Data Pre-Processinggruously identifying cutoff frequencies by automated methods caused by high sampling rates. FcOpt suggests a cut-off frequency of 2.63 Hz instead of the originally proposed 3 Hz. Filtering with the suggested cut-off frequency on average deviates from the original temporal accuracy of the ski turn se作者: 特別容易碎 時間: 2025-3-22 22:41
A Low-Complexity Deep Learning Framework For Acoustic Scene Classificationch are conducted on DCASE 2021 (IEEE AASP Challenge on Detection and Classification of Acoustic Scenes and Events) Task 1A Development and Evaluation datasets, achieve a low-complexity CNN based framework with 128 KB trainable parameters and the best classification accuracy of 66.7% and 69.6%, impro作者: motivate 時間: 2025-3-23 05:10 作者: intention 時間: 2025-3-23 09:30
Toward Applying the IEC 62443 in the UAS for Secure Civil Applicationsrities associated with a UAS case study. ThreatGet’s findings are then used to outline a mapping procedure between threats and security requirements. This strategy aims to identify a set of security requirements to address potential threats and protect critical assets in UAS.作者: Offbeat 時間: 2025-3-23 12:16 作者: Insulin 時間: 2025-3-23 15:01 作者: Culmination 時間: 2025-3-23 19:02 作者: NUL 時間: 2025-3-24 01:15
tablishing new ways of embracing agile approaches within the various domains of data science, such as machine learning and AI, data mining, or visualization and communication as well as case studies and best practices from leading research institutions and business companies..The proceedings include all ful978-3-658-36295-9作者: 撫育 時間: 2025-3-24 03:24
Conference proceedings 2022ue for software development projects, which need to be flexible to adopt to rapid requests of clients as well to reflect changes that are required due to architectural design decisions. With data science having established itself as corner stone within organizations and businesses, it is now imperat作者: uncertain 時間: 2025-3-24 09:24
DSC 2021Organizations have moved already from the rigid structure of classical project management towards the adoption of agile approaches. This holds also true for software development projects, which need to be flexible to adopt to rapid requests of clients as well to reflect changes that are requ作者: CESS 時間: 2025-3-24 13:54 作者: 話 時間: 2025-3-24 16:25
https://doi.org/10.1007/3-540-31182-3lient to have its own hyperparameter configuration. We implemented these approaches based on grid search and Bayesian optimization and evaluated the algorithms on the MNIST data set using an i.i.d. partition and on an Internet of Things (IoT) sensor based industrial data set using a non-i.i.d. partition.作者: BLOT 時間: 2025-3-24 19:54
Navneet Kaur Popli,Anup Girdhartive embeddings, similar to word embeddings in natural language processing. The embeddings are used to cluster event types to identify co-occurrence and causality between them. While both techniques have their strengths and weaknesses, they each significantly reduce the number of possible events, while enforcing conditions for causality.作者: Diuretic 時間: 2025-3-25 02:30
Fluid Construction Grammar in the Brainmalies under various operating conditions on a four-dimensional data set without any specific feature engineering for each operating condition. We consider this work as being the first step towards a generic anomaly detection method, which is applicable for a wide range of industrial equipment.作者: Metastasis 時間: 2025-3-25 04:01
Evaluation of Hyperparameter-Optimization Approaches in an Industrial Federated Learning Systemlient to have its own hyperparameter configuration. We implemented these approaches based on grid search and Bayesian optimization and evaluated the algorithms on the MNIST data set using an i.i.d. partition and on an Internet of Things (IoT) sensor based industrial data set using a non-i.i.d. partition.作者: Projection 時間: 2025-3-25 11:33 作者: vibrant 時間: 2025-3-25 11:44
Minimal-Configuration Anomaly Detection for IIoT Sensorsmalies under various operating conditions on a four-dimensional data set without any specific feature engineering for each operating condition. We consider this work as being the first step towards a generic anomaly detection method, which is applicable for a wide range of industrial equipment.作者: Exterior 時間: 2025-3-25 16:37
Beyond Desktop Computation: Challenges in Scaling a GPU Infrastructureaff in order to navigate through the software jungle. In this technical report, we illustrate the decision process towards an on-premises infrastructure, our implemented system architecture, and the transformation of the software stack towards a scaleable Graphics Processing Unit (GPU) cluster system.作者: 天文臺 時間: 2025-3-25 23:33
Fuzzy Prototypes Based on Typicality Degreestion using different models and pre-processing steps on centrifugal pumps which are dismantled and put back into operation in the same as well as in different environments. Further, we investigate the model performance on different pumps from the same type compared to those from the training data.作者: xanthelasma 時間: 2025-3-26 02:49
https://doi.org/10.1007/978-981-13-1132-1acy of 93.9%, obtained from an ensemble of audio-based and visual-based frameworks, shows an improvement of 16.5% compared with DCASE 2021 baseline. Our best results on Evaluation dataset is 91.5%, outperforming DCASE baseline of 77.1%作者: gentle 時間: 2025-3-26 06:32
https://doi.org/10.1007/978-3-642-34120-5 representations are time-interval aware and thus yield a continuous-time representation of the dynamics. We provide experiments on real-world datasets and show that our methodology is able to outperform several state-of-the-art models. Source code for all models can be found at [1].作者: Lipoprotein(A) 時間: 2025-3-26 09:38
Towards Robust and Transferable IIoT Sensor based Anomaly Classification using Artificial Intelligention using different models and pre-processing steps on centrifugal pumps which are dismantled and put back into operation in the same as well as in different environments. Further, we investigate the model performance on different pumps from the same type compared to those from the training data.作者: 名字 時間: 2025-3-26 13:33 作者: Between 時間: 2025-3-26 17:00 作者: AFFIX 時間: 2025-3-26 23:06
Strategic Approaches to the Use of Data Science in SMEs Lessons Learned from a Regional Multi-Case S for SMEs. A regional multi-case study explores the causes and exhibits patterns that suggest differentiated recommendations for action. Awareness of the diverse limitations and challenges can help all players involved – companies, universities and governmental organizations – to design future projects in an even more targeted manner.作者: 無思維能力 時間: 2025-3-27 04:47
https://doi.org/10.1007/978-3-642-34120-5aff in order to navigate through the software jungle. In this technical report, we illustrate the decision process towards an on-premises infrastructure, our implemented system architecture, and the transformation of the software stack towards a scaleable Graphics Processing Unit (GPU) cluster system.作者: RACE 時間: 2025-3-27 06:06
Peter Haber,Thomas J. Lampoltshammer,Manfred MayrAktuelle Data-Science-Themen.Spezifische Data-Science-Fragestellungen.Collects papers from the 4th International Data Science Conference - iDSC 2021作者: 無聊點好 時間: 2025-3-27 10:47
http://image.papertrans.cn/d/image/263136.jpg作者: decode 時間: 2025-3-27 14:28
https://doi.org/10.1007/978-3-658-36295-9Data Science; Machine Learning; Artificial Intelligence; TensorFlow; Data Analytics; Big Data; Digital Tra作者: instructive 時間: 2025-3-27 21:33 作者: Cougar 時間: 2025-3-27 22:46 作者: Tincture 時間: 2025-3-28 05:15 作者: 土產(chǎn) 時間: 2025-3-28 10:17 作者: Ostrich 時間: 2025-3-28 12:07
https://doi.org/10.1007/978-981-13-1132-1into three main steps: Front-end spectrogram extraction, back-end classification, and late fusion of predicted probabilities. First, we use Mel filter, Gammatone filter, and Constant Q Transform (CQT) to transform raw audio signals into spectrograms, where both frequency and temporal features are pr作者: 排名真古怪 時間: 2025-3-28 15:09 作者: 盡忠 時間: 2025-3-28 22:04 作者: declamation 時間: 2025-3-29 02:54
Soniya,Sandeep Paul,Lotika Singhe final user’s needs, but they could not satisfy critical aspects such as performance, efficiency, or security. Cybersecurity is one of the critical issues in Unmanned Aircraft Systems (UAS), where cyberattacks on this system could lead to multiple negative consequences. We address the cybersecurity作者: 情愛 時間: 2025-3-29 07:09 作者: 主講人 時間: 2025-3-29 08:01 作者: tariff 時間: 2025-3-29 15:23
https://doi.org/10.1007/978-3-642-34120-5te review content knowledge into recommender systems, one is naturally led to dynamical models of text. In the present work we leverage the known power of reviews to enhance rating predictions in a way that (i) respects the causality of review generation and (ii) includes, in a bidirectional fashion作者: SHOCK 時間: 2025-3-29 17:55
https://doi.org/10.1007/978-3-642-34120-5ucture. For this upscaling process, an IT service provider can be hired or in-house personnel can attempt to implement a software stack. The first option can be quite expensive if it is just about connecting several machines. For the latter option often experience is missing with the data science st作者: 得意人 時間: 2025-3-29 20:15 作者: 剝削 時間: 2025-3-30 02:19
Fluid Construction Grammar in the Brainents: minimal configuration effort and easy transferability across equipment. Recent advances in deep learning, especially long-short-term memory (LSTM) and autoencoders, offer promising methods for detecting anomalies in sensor data recordings. We compared autoencoders with various architectures su作者: 滔滔不絕地講 時間: 2025-3-30 06:18 作者: 大洪水 時間: 2025-3-30 10:01 作者: 協(xié)議 時間: 2025-3-30 13:13 作者: Senescent 時間: 2025-3-30 16:34
Data-driven Cut-off Frequency Optimization for Biomechanical Sensor Data Pre-Processingd machine learning algorithms. However, finding an optimal value for the filter’s cut-off frequency is time consuming, as researchers have to rely on heuristics and experience. Therefore, we introduce a method called FcOpt for automatically estimating an optimal cut-off frequency for noise filtering作者: Shuttle 時間: 2025-3-30 21:14 作者: 延期 時間: 2025-3-31 01:44
Anomaly Detection in Medical Imaging - A Mini Reviewe workload for medical experts. However, supervised machine learning requires reliable labelled data, which is is often difficult or impossible to collect or at least time consuming and thereby costly. Therefore methods requiring only partly labeled data (semi-supervised) or no labeling at all (unsu作者: antedate 時間: 2025-3-31 06:00 作者: LAIR 時間: 2025-3-31 11:26
Toward Applying the IEC 62443 in the UAS for Secure Civil Applicationse final user’s needs, but they could not satisfy critical aspects such as performance, efficiency, or security. Cybersecurity is one of the critical issues in Unmanned Aircraft Systems (UAS), where cyberattacks on this system could lead to multiple negative consequences. We address the cybersecurity