没有准备 发表于 2025-3-23 13:29:49

The Method for Image Noise Detection Based on the Amount of Knowledge Associated with Intuitionistic in the context of intuitionistic fuzzy sets (IFSs). However, there are great limitations of this type of method due to the inherent shortcomings of IFE, thus leading to limited accuracy of detecting noise. To solve this problem, we introduce in this paper the intuitionistic fuzzy knowledge measure

显赫的人 发表于 2025-3-23 15:51:25

http://reply.papertrans.cn/103/10217/1021679/1021679_12.png

规范要多 发表于 2025-3-23 19:26:07

http://reply.papertrans.cn/103/10217/1021679/1021679_13.png

RENIN 发表于 2025-3-24 01:52:27

Link Prediction of Heterogeneous Information Networks Based on Frequent Subgraph Evolutionaw for both static information networks and dynamic information networks. However, most existing works only focus on the global topology, ignoring the impact of network microstructure on network evolution. In this paper, we present a novel link prediction method called LP-FSE (link prediction based

密切关系 发表于 2025-3-24 05:45:46

Memory Attentive Cognitive Diagnosis for Student Performance Predictiontive Diagnosis (Neural CD) exploits an elegant method to simulate the interactions of student exercising process with deep neural networks. However, Neural CD still treats the student factor as static, which doesn’t change after the exercising process, against the common sense that a student will ga

Repetitions 发表于 2025-3-24 10:11:52

Memory Attentive Cognitive Diagnosis for Student Performance Predictiontive Diagnosis (Neural CD) exploits an elegant method to simulate the interactions of student exercising process with deep neural networks. However, Neural CD still treats the student factor as static, which doesn’t change after the exercising process, against the common sense that a student will ga

绝种 发表于 2025-3-24 14:17:18

http://reply.papertrans.cn/103/10217/1021679/1021679_17.png

ETCH 发表于 2025-3-24 18:53:02

A Study on the Privacy Threat Analysis of PHI-Codebenefits, including helping to manage the flow of people effectively and to slow down the spread of corona virus. However, the personal information security issues involved in the use of PHI-code has also attracted people’s attention. To solve this problem, we can use the security threat modeling to

intention 发表于 2025-3-24 19:31:47

http://reply.papertrans.cn/103/10217/1021679/1021679_19.png

使长胖 发表于 2025-3-25 00:36:56

Logistics Policy Evaluation Model Based on Text Mininguilds a model of policy evaluation on text mining by using text mining techniques, and builds policy evaluation indicators through word breaker technology, word frequency statistics, construction thesaurus, subject analysis, and co-existing analysis. Using 10 logistics policy texts in Heilongjiang P
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Web and Big Data. APWeb-WAIM 2021 International Workshops; KGMA 2021, SemiBDMA Yunjun Gao,An Liu,Junying Chen Conference proceedings 2021