Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Jiaman DING"'
Publikováno v:
IEEE Access, Vol 12, Pp 87665-87674 (2024)
The Classifier Chains (CC) method is an effective method for multi-label classification, with its performance significantly contingent on the label order. However, most existing algorithms focus on determining the label order by considering label cor
Externí odkaz:
https://doaj.org/article/f658b384937042e697b8b6c097ae447b
Publikováno v:
IEEE Access, Vol 11, Pp 37041-37051 (2023)
Since the complementarity information among multiple views has been exploited to improve the clustering effect significantly, multi-view clustering has become a hot topic, and many multi-view clustering methods have emerged. Most of them only conside
Externí odkaz:
https://doaj.org/article/d23dad8b1536404babbd973872e4a923
Publikováno v:
Tongxin xuebao, Vol 43, Pp 123-133 (2022)
Since malicious nodes may manipulate voting elections through collusion attacks in consensus mechanism of DPoS, the security of block chain can not be guaranteed in the consensus process of DPoS.To deal with the problem, a method for detecting and pr
Externí odkaz:
https://doaj.org/article/f0faf356b45e4b9b840ebbc06eb05271
Publikováno v:
Applied Sciences, Vol 14, Iss 4, p 1450 (2024)
With the rapid development of the web service market, the number of web services shows explosive growth. QoS is an important factor in the recommendation scene; how to accurately recommend a high-quality service for users among the massive number of
Externí odkaz:
https://doaj.org/article/9a458ab5b71f4ce1bd61b5dc39c9fa9a
Publikováno v:
CAAI Transactions on Intelligence Technology, Vol 6, Iss 1, Pp 72-79 (2021)
Abstract Word embedding has been widely used in word sense disambiguation (WSD) and many other tasks in recent years for it can well represent the semantics of words. However, the existing word embedding methods mostly represent each word as a single
Externí odkaz:
https://doaj.org/article/e1c5eb3fa41a4b1dbaa91177803f3f43
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 10, Iss 1, Pp 1-15 (2021)
Abstract At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag movement RFID anti-collision met
Externí odkaz:
https://doaj.org/article/62154dec6ae240daacc2d5447f3a6312
Publikováno v:
Mathematics, Vol 11, Iss 3, p 782 (2023)
The label learning mechanism is challenging to integrate into the training model of the multi-label feature space dimensionality reduction problem, making the current multi-label dimensionality reduction methods primarily supervision modes. Many meth
Externí odkaz:
https://doaj.org/article/f0ec0be0f8d4472db66ab0f354c1e240
Publikováno v:
Mathematics, Vol 11, Iss 2, p 461 (2023)
The rapid development of J2EE (Java 2 Platform Enterprise Edition) has brought unprecedented severe challenges to vulnerability mining. The current abstract syntax tree-based source code vulnerability classification method does not eliminate irreleva
Externí odkaz:
https://doaj.org/article/048a522edef344df960dabf4abda5cc7
Publikováno v:
Mathematics, Vol 11, Iss 1, p 229 (2023)
Set similarity query is a primitive for many applications, such as data integration, data cleaning, and gene sequence alignment. Most of the existing algorithms are inverted index based, they usually filter unqualified sets one by one and do not have
Externí odkaz:
https://doaj.org/article/c95a682852c74e2fad5b0d52804c2734
Publikováno v:
Mathematics, Vol 10, Iss 15, p 2767 (2022)
Flower classification is of great significance to the fields of plants, food, and medicine. However, due to the inherent inter-class similarity and intra-class differences of flowers, it is a difficult task to accurately classify them. To this end, t
Externí odkaz:
https://doaj.org/article/6b41fa51990e48f5a83692e72b14ed97