烦躁的女人 发表于 2025-3-23 10:26:53
http://reply.papertrans.cn/27/2631/263038/263038_11.pngBph773 发表于 2025-3-23 14:40:08
Study on the Intelligent Control Model of a Greenhouse Flower Growing Environmentfield greenhouse crops. The results show that the performance of this model is better than that of the PID model and fuzzy control model in simulation experiments and actual scene control. Compared with the flowers in the natural state, the plants of the flowers under systematic control were approxiMalaise 发表于 2025-3-23 21:02:55
A Multi-event Extraction Model for Nursing Recordshe multi-event argument attribution problem. By observing the results of automatic event extraction by our model, we detect missing items in the existing nursing records. This proves that our model can be used to help nurses check and improve the method of recording nursing processes.V切开 发表于 2025-3-24 01:38:23
Cuffless Blood Pressure Estimation Based on Both Artificial and Data-Driven Features from Plethysmog deep residual neural network is designed to reduce information redundancy in the gathered features and refine high-level features for BP estimation. The results show that our proposed methods outperforms the compared methods in three commonly used metrics.left-ventricle 发表于 2025-3-24 02:59:40
http://reply.papertrans.cn/27/2631/263038/263038_15.pngbronchodilator 发表于 2025-3-24 09:03:26
Intelligent Industrial Auxiliary System Based on AR Technologyescribes the functions and implementation process of the four levels of the AR assembly system in detail, which can help readers quickly understand the connection between AR technology and AI technology and understand the principle of the virtual assembly guidance system.narcissism 发表于 2025-3-24 13:36:51
Data Quality Identification Model for Power Big Dataased on data augmentation technology. Tri-training is applied to detect abnormal data from different power data from different feature spaces. Experiments and simulations are performed to demonstrate the effectiveness of the proposed model.plasma 发表于 2025-3-24 16:28:35
Research on the Design and Education of Serious Network Security Gamesconcept of a serious game and its significance to the network security curriculum of schools and designs the corresponding card game according to the feature of network security. The purpose of this paper is to strengthen overall network security awareness, cultivate professional skills, and enhance network security.反话 发表于 2025-3-24 20:15:45
KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitmentng the FO commitment. Unlike the typical Paillier algorithm, the KPH scheme’s Paillier algorithm includes a variable k and combines the L function and the Chinese remainder theorem to reduce the time complexity of the algorithm from . to ., making the decryption process more efficient.RADE 发表于 2025-3-25 02:36:06
User Attribute Prediction Method Based on Stacking Multimodel Fusion stacking framework, and the training results of the first layer were input as new training data into the second layer LightGBM for training. Experiments show that the proposed model can improve the accuracy of prediction results.