没收 发表于 2025-3-26 21:10:54
http://reply.papertrans.cn/47/4697/469603/469603_31.pngsurmount 发表于 2025-3-27 02:32:14
Konstantinos Papachristou,Anastasios Tefas,Ioannis Pitasshrill 发表于 2025-3-27 09:19:22
Chang-Ming Kuo,Chi-Kao Chang,Nai-Chung Yang,Chung-Ming Kuo,Yu-Ming ChenDefiance 发表于 2025-3-27 13:22:52
Xinying Zheng,Chien-Ming Chen,Tsu-Yang Wu,Eric Ke Wang,Tsui-Ping Chung陈旧 发表于 2025-3-27 16:45:06
Laser Induced Breakdown Spectroscopy Data Processing Method Based on Wavelet Analysis data to identify the effectiveness of the measurement. Therefore, we can calculate element contents with the calibration parameter achieved before. This method can decrease the times of laser excitation and increase the measurement accuracy effectively.CHASE 发表于 2025-3-27 18:22:23
A New Estimation of Distribution Algorithm to Solve the Multiple Traveling Salesmen Problem with theesents the proposed algorithm would not cause longer traveling distance when we increase the number of salesmen from 3 to 10 persons under the objective of minimization of total traveling distance. This research may suggest the EDAs researcher could employ the MLA rule instead of the direct encodinglabyrinth 发表于 2025-3-28 00:24:13
2194-5357 nd Applications, held June 13-15, 2014 in Shenzhen, China.Pr.This volume presents the proceedings of the First Euro-China Conference on Intelligent Data Analysis and Applications (ECC 2014), which was hosted by Shenzhen Graduate School of Harbin Institute of Technology and was held in Shenzhen CityEsophagitis 发表于 2025-3-28 02:23:09
A Projection-Based Approach for Mining Highly Coherent Association Ruleses. In particular, an indexing mechanism is designed to help find relevant transactions quickly from a set of data, and a pruning strategy is proposed as well to prune unpromising candidate itemsets early in mining. The experimental results show that the proposed algorithm outperforms the traditional mining approach for a real dataset.易碎 发表于 2025-3-28 07:00:12
Hiding Sensitive Itemsets with Minimal Side Effects in Privacy Preserving Data Mining itemsets, and artificial itemsets are considered to evaluate whether the transactions or the itemsets are required to be deleted for hiding sensitive itemsets. Experiments are then conducted to show the performance of the proposed algorithm in execution time, number of deleted transactions, and number of side effects.quiet-sleep 发表于 2025-3-28 12:25:11
Conference proceedings 2014y Shenzhen Municipal People’s Government, IEEE Signal Processing Society, Machine Intelligence Research Labs, VSB-Technical University of Ostrava (Czech Republic), National Kaohsiung University of Applied Sciences (Taiwan), and Secure E-commerce Transactions (Shenzhen) Engineering Laboratory of Shenzhen Institute of Standards and Technology..