Grasping 发表于 2025-3-27 00:13:28

Risk Evaluation of Financial Websites Based on Structure Mining,customers to achieve online financing, payment, investment and lending, becomes more and more popular. Risk of internet finance is much higher than that of traditional financial system because of the rapid fund flowing, lack of personal credit audit, deficiency of standard network operation and impe

宠爱 发表于 2025-3-27 02:27:42

Word Vector Computation Based on Implicit Expression, similarity when clustering with word vectors. (2) Number of all kinds of name entities, such as person name, location name, and organization name is infinite while the number of one specific name entity in corpus is limited. As the result, the vectors for these name entities are not fully trained.

连词 发表于 2025-3-27 08:39:02

http://reply.papertrans.cn/48/4714/471364/471364_33.png

Inkling 发表于 2025-3-27 10:04:23

http://reply.papertrans.cn/48/4714/471364/471364_34.png

吵闹 发表于 2025-3-27 16:38:19

Textual Keyword Optimization Using Priori Knowledge,rove the precision of textual keyword extraction. To solve the problem, this paper proposes a method to optimize the textual keyword using priori knowledge. First, some priori knowledge for keyword extraction is discussed. Then, a keyword quality evaluation method based on semantic distance between

修改 发表于 2025-3-27 19:57:02

A Speed Estimation Method of Vehicles Based on Road Monitoring Video-Images,tation law and traffic conditions. In this paper, we present a speed estimation method of vehicles based on road monitoring video-images. Firstly, we set up a word coordinate system on the license plate in one vehicle image. Next, for small vehicles in China, according to the known length and width

CULP 发表于 2025-3-27 22:34:09

http://reply.papertrans.cn/48/4714/471364/471364_37.png

vanquish 发表于 2025-3-28 04:50:57

http://reply.papertrans.cn/48/4714/471364/471364_38.png

STEER 发表于 2025-3-28 08:09:49

Conference proceedings 2018 on all aspects of techniques and applications in cyber and electronic security and intelligence research. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of cyber and electr

Gullible 发表于 2025-3-28 14:07:55

http://reply.papertrans.cn/48/4714/471364/471364_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: International Conference on Applications and Techniques in Cyber Security and Intelligence; Applications and Tec Jemal Abawajy,Kim-Kwang Ra