書目名稱Green, Pervasive, and Cloud Computing影響因子(影響力)學科排名
書目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡公開度
書目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡公開度學科排名
書目名稱Green, Pervasive, and Cloud Computing被引頻次
書目名稱Green, Pervasive, and Cloud Computing被引頻次學科排名
書目名稱Green, Pervasive, and Cloud Computing年度引用
書目名稱Green, Pervasive, and Cloud Computing年度引用學科排名
書目名稱Green, Pervasive, and Cloud Computing讀者反饋
書目名稱Green, Pervasive, and Cloud Computing讀者反饋學科排名
作者: LIMIT 時間: 2025-3-21 22:16
A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharinge model, and to prevent watermarks from being forged, we use encryption algorithms to generate key samples. We conduct experiments on the VGG19 model using the CIFAR-10 dataset. Experimental results show that the method is robust to fine-tuning attacks, pruning attacks. Furthermore, our method does 作者: Binge-Drinking 時間: 2025-3-22 03:27 作者: Canvas 時間: 2025-3-22 04:44
A Study of Sketch Drawing Process Comparation with Different Painting Experience via Eye Movements Aeft and down as a whole, the gaze was scattered, and the fixation on the central position of the picture was not focused and sustained. In addition, experienced painters put the sketch content in the center of the picture to attract the attention of the viewer and effectively convey the important in作者: 攀登 時間: 2025-3-22 09:23 作者: 全面 時間: 2025-3-22 15:37 作者: 全面 時間: 2025-3-22 19:40
Anomaly Detection of?Industrial Data Based on?Multivariate Multi Scale Analysis points across distinct spatial dimensions. Concurrently, GRU extracts temporal correlations embedded within data along a single dimension. Through the incorporation of graph attention networks, the model employs a dual-faceted correlation perspective for data prediction. Discrepancies between predi作者: 抱負 時間: 2025-3-22 21:14
Integration Model of Deep Forgery Video Detection Based on rPPG and Spatiotemporal Signalntegration model is constructed based on stacking strategy. Sufficient experiments show that the established fusion model can cope well with low-resolution cases and has good generalization performance, achieving 93.38% and 91.57% accuracy on FF++ c23 and celeb-DF-v2 data set, respectively.作者: 載貨清單 時間: 2025-3-23 01:51 作者: 贊美者 時間: 2025-3-23 09:26 作者: 合群 時間: 2025-3-23 15:24
Design and Implementation of a Green Credit Risk Control Model Based on SecureBoost and Improved-TCAly different sample distribution quantities in certain data set applications. We proved that the improved TCA algorithm combined with secureBoost has a better prediction result in the multi-classification credit evaluation scenario.作者: 幸福愉悅感 時間: 2025-3-23 19:12
Unsupervised Concept Drift Detection Based on?Stacked Autoencoder and?Page-Hinckley Testconstruction error of the stacked autoencoder on the current window is employed. The Page-Hinckley test dynamically calculates thresholds to warn and alarm concept drift. Experimental results indicate that DD-SAPH outperforms the compared unsupervised algorithms when addressing concept drift on both作者: emission 時間: 2025-3-24 00:02 作者: MILK 時間: 2025-3-24 03:31 作者: 輕率看法 時間: 2025-3-24 09:23
https://doi.org/10.1007/978-4-431-68284-4use and improve the quality and productivity of software products. However, selecting the most suitable components from the results of component retrieval requires understanding the different usages of each component in the retrieval results. The existing methods suffer from excessive reliance on ma作者: habile 時間: 2025-3-24 10:48 作者: 我還要背著他 時間: 2025-3-24 18:37
Marshall D. Earle,Alexander Malahoff Recall, andreached 97.63%, 96.43%, and 98.62%, respectively, which are 4.62%, 3.63%, and 2.31% higher compared to those for YOLOv7. Meanwhile, the SRW-YOLO model detects better compared with the current advanced one-stage object detection model.作者: 預示 時間: 2025-3-24 20:02
The Norwegian Wave Model NOWAMOeft and down as a whole, the gaze was scattered, and the fixation on the central position of the picture was not focused and sustained. In addition, experienced painters put the sketch content in the center of the picture to attract the attention of the viewer and effectively convey the important in作者: NIB 時間: 2025-3-25 00:28 作者: 乳白光 時間: 2025-3-25 05:48
Australian Entrepreneurial Universities, stochastic and periodicity of solar irradiance are predicted by two different prediction modules. The prediction results of the two modules are integrated at the end of the proposed model. Meanwhile, the proposed model also considers the complex effects of cloud type and solar zenith angle with sto作者: Flawless 時間: 2025-3-25 09:16 作者: 得罪人 時間: 2025-3-25 12:55
Malcolm J. Bowman,Wayne E. Esaiasntegration model is constructed based on stacking strategy. Sufficient experiments show that the established fusion model can cope well with low-resolution cases and has good generalization performance, achieving 93.38% and 91.57% accuracy on FF++ c23 and celeb-DF-v2 data set, respectively.作者: 膽汁 時間: 2025-3-25 15:55 作者: 保守黨 時間: 2025-3-25 20:39
https://doi.org/10.1007/978-3-319-73159-9emonstrate significant performance improvement compared to the baseline models. Furthermore, the advantages of this proposed approach over the baseline models are further analyzed through experiments.作者: Increment 時間: 2025-3-26 02:12 作者: Mercurial 時間: 2025-3-26 04:52 作者: 啞劇 時間: 2025-3-26 09:52 作者: slipped-disk 時間: 2025-3-26 16:04
Litter in the Mediterranean Seals, this paper replaces the generator and discriminator of GAN with LSTM-RNN. Anomaly detection is then performed based on residual loss and identification loss. Finally, this paper uses the deep domain adaptation algorithm to map the target domain and the source domain, and then optimizes the confu作者: 過份好問 時間: 2025-3-26 17:30 作者: 過多 時間: 2025-3-27 00:19
Hugh D. Livingston,William J. Jenkinsst functions and the experimental results show that the improved algorithm achieves the best results in several test functions. The algorithm is then applied to a path planning problem and the results show that the algorithm can help the robot to perform correct and efficient path planning.作者: 記憶法 時間: 2025-3-27 01:45
An Industrial Robot Path Planning Method Based on?Improved Whale Optimization Algorithmst functions and the experimental results show that the improved algorithm achieves the best results in several test functions. The algorithm is then applied to a path planning problem and the results show that the algorithm can help the robot to perform correct and efficient path planning.作者: gastritis 時間: 2025-3-27 07:42 作者: Blasphemy 時間: 2025-3-27 10:31 作者: 沙文主義 時間: 2025-3-27 14:44
Research on?Script-Based Software Component Developmentompilation principles on finite state machine (FSM) circuit module automation. It provides a methodological and empirical reference for programmers in the design and development of application systems using dynamic languages.作者: COWER 時間: 2025-3-27 18:45
A Function Fitting System Based on Genetic Algorithmange of applications. When designing the function of fitting and analyzing a given function image, the genetic algorithm is used. With the application of ray detection in Unity, the closest expression of function fitting is obtained. At the same time, the line graph of fitness reduction during genetic algorithm iteration is given.作者: 典型 時間: 2025-3-27 23:15
Green, Pervasive, and Cloud Computing978-981-99-9893-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 秘密會議 時間: 2025-3-28 02:22
https://doi.org/10.1007/978-4-431-68284-4he issue of repetitive work, software reuse techniques can be adopted to continually enhance the quality and efficiency of software development. Software reuse primarily involves reutilizing existing software knowledge during the software development process, effectively reducing maintenance costs i作者: PHAG 時間: 2025-3-28 08:03
Gyre-Scale Reciprocal Acoustic Transmissionsire the design and distribution of deep neural network (DNN) models, which typically use large amounts of data and computing resources for training. As a result, DNN models are now considered important assets, but at great risk of being stolen and distributed illegally. In response to the new risks 作者: 錯事 時間: 2025-3-28 12:32 作者: 矛盾心理 時間: 2025-3-28 17:04
The Norwegian Wave Model NOWAMOhe conversation going. However, not everyone has sketch basis, the method of using sketch to facilitate the exchange requires not only the foundation of sketch, but also the ability to sketch in a short period of time. Therefore, according to design and apply a set of experiments, we focus on analyz作者: 美色花錢 時間: 2025-3-28 22:10
https://doi.org/10.1007/1-4020-4028-8blems. It has developed into one of the important tasks in knowledge graphs and has received extensive attention from scholars in recent years. Through entity alignment, data from multiple isolated knowledge graphs with different sources and modes can be summarized and classified, forming a more inf作者: 諂媚于人 時間: 2025-3-29 00:05
Australian Entrepreneurial Universities,s strong volatility, therefore the short-term accurate prediction of solar irradiance is of great significance to maintain the stable operation of the power grid. This work presents a novel decomposition integrated deep learning model, VMD-AC-BiLSTM, is proposed for ultra-short-term prediction of so作者: 疲勞 時間: 2025-3-29 06:58 作者: indubitable 時間: 2025-3-29 10:19 作者: 下船 時間: 2025-3-29 13:24
Malcolm J. Bowman,Wayne E. Esaiaspment of forgery detection is urgently needed. Most of the existing forgery detection technique are based on artifacts and detail features, which are greatly affected by the resolution, and its generalization ability needs to be improved. In this paper, a multi-modal fusion forgery detection model a作者: AVID 時間: 2025-3-29 19:25
https://doi.org/10.1007/978-3-642-18782-7cess such huge volume of big data in an energy efficient manner is a popular topic in both industry and academia area. In this work, we discuss how to implement a hybrid transactional and analytical processing database to provide energy efficient big data processing capability. More specifically, Po作者: 繁重 時間: 2025-3-29 20:17
https://doi.org/10.1007/978-3-319-73159-9 pretraining models typically utilize BERT models to learn word embeddings at the character level, disregarding the semantic relationships between phrases. They also pay less attention to long-distance dependencies within sentences. Additionally, the datasets suffer from challenges such as small sca作者: 裝飾 時間: 2025-3-30 03:47
Charles E.M. Pearce,F.M. Pearceal innovation. For the function of fitting analysis of a given function image, there is no public software on the market that uses the idea of genetic algorithm to solve the problem of function fitting. In order to make up for the insufficiency of the existing software and seize the opportunity of f作者: 季雨 時間: 2025-3-30 07:50 作者: Estrogen 時間: 2025-3-30 10:21 作者: integrated 時間: 2025-3-30 12:40 作者: 冷淡一切 時間: 2025-3-30 16:31
Hugh D. Livingston,William J. Jenkinsnning in the course of their tasks, but there is still a lack of a simple and effective method to implement path planning in complex industrial scenarios. In this paper, an improved whale optimization algorithm is proposed to solve the robot path planning problem. The algorithm initially uses a logi作者: 破布 時間: 2025-3-30 21:52
Litter in the Mediterranean Seaenges. In practical application scenarios, the amount of abnormal data is small, and intrusion detection systems in different scenarios cannot be quickly migrated, and specific intrusion detection systems need to be trained for different scenarios, which greatly wastes manpower and material resource作者: 網(wǎng)絡添麻煩 時間: 2025-3-31 01:52
G. H. Born,D. B. Lame,P. J. Ryghrely on a large number of independent identically distributed samples. However, the complexity and variability of coal-rock deposit states make the dataset exhibit small sample characteristics, resulting in poor performance of deep learning model. To address this problem, this paper proposes a frame作者: 內(nèi)向者 時間: 2025-3-31 05:56
UEBCS: Software Development Technology Based on?Component Selectionhe issue of repetitive work, software reuse techniques can be adopted to continually enhance the quality and efficiency of software development. Software reuse primarily involves reutilizing existing software knowledge during the software development process, effectively reducing maintenance costs i作者: menopause 時間: 2025-3-31 09:30
A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharingire the design and distribution of deep neural network (DNN) models, which typically use large amounts of data and computing resources for training. As a result, DNN models are now considered important assets, but at great risk of being stolen and distributed illegally. In response to the new risks 作者: perjury 時間: 2025-3-31 16:32
A Method for Small Object Contamination Detection of Lentinula Edodes Logs Integrating SPD-Conv and the difficulty in the detection of small object contaminated areas of Lentinula Edodes logs. First, the SPD (space-to-depth)-Conv was used to improve the MP module to enhance the learning of effective features of Lentinula Edodes log images and prevent the loss of small object contamination informa作者: 淘氣 時間: 2025-3-31 19:49
A Study of Sketch Drawing Process Comparation with Different Painting Experience via Eye Movements Ahe conversation going. However, not everyone has sketch basis, the method of using sketch to facilitate the exchange requires not only the foundation of sketch, but also the ability to sketch in a short period of time. Therefore, according to design and apply a set of experiments, we focus on analyz作者: Kindle 時間: 2025-3-31 23:51 作者: 火光在搖曳 時間: 2025-4-1 05:37 作者: 討厭 時間: 2025-4-1 09:55 作者: 打谷工具 時間: 2025-4-1 10:53 作者: BAN 時間: 2025-4-1 18:14 作者: SLING 時間: 2025-4-1 19:40
A Design of?Hybrid Transactional and?Analytical Processing Database for?Energy Efficient Big Data Qucess such huge volume of big data in an energy efficient manner is a popular topic in both industry and academia area. In this work, we discuss how to implement a hybrid transactional and analytical processing database to provide energy efficient big data processing capability. More specifically, Po作者: Orgasm 時間: 2025-4-2 00:38 作者: Prologue 時間: 2025-4-2 06:21
A Function Fitting System Based on Genetic Algorithmal innovation. For the function of fitting analysis of a given function image, there is no public software on the market that uses the idea of genetic algorithm to solve the problem of function fitting. In order to make up for the insufficiency of the existing software and seize the opportunity of f