floodgate 发表于 2025-3-26 21:11:48

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/868695.jpg

自作多情 发表于 2025-3-27 05:10:03

https://doi.org/10.1007/978-3-030-97774-0artificial intelligence; communication systems; computer hardware; computer networks; computer security;

粗鲁的人 发表于 2025-3-27 07:15:19

http://reply.papertrans.cn/87/8687/868695/868695_33.png

aneurysm 发表于 2025-3-27 12:16:32

Chinese Fine-Grained Sentiment Classification Based on Pre-trained Language Model and Attention Mechview information data set of Dianping. The BERT-ftfl-SA model is proposed and integrate the attention mechanism to further strengthen the data characteristics. Compared with traditional models such as SVM and FastText, its classification effect is significantly improved. It is concluded that the imp

期满 发表于 2025-3-27 13:52:31

Link-Efficiency Multi-channel Transmission Protocol for Data Collection in UASNs propose a . (LETP). In the routing layer, we propose a forwarding node probabilistic selection approach to solve the unbalanced transfer load problem at low signaling overhead. In the MAC layer, with the assistance of routing information, a . (LECA) algorithm with low signaling overhead is applied

Suggestions 发表于 2025-3-27 19:52:50

http://reply.papertrans.cn/87/8687/868695/868695_36.png

欺骗手段 发表于 2025-3-27 23:54:26

http://reply.papertrans.cn/87/8687/868695/868695_37.png

固执点好 发表于 2025-3-28 03:41:30

Defects Detection System of Medical Gloves Based on Deep Learning information of the image. Furthermore, two auxiliary models are used to promote the accuracy of detection based on classification methods. Finally, experiments are proposed to verify the functional indicators of the system. After the on-site test of the production line in the medical glove factory,

Resistance 发表于 2025-3-28 09:28:57

Mobile Terminal Identity Authentication Method Based on IBCncryption algorithm AES to encrypt and decrypt data to achieve terminal identity authentication to resist common attacks in the mobile Internet. Finally, the experimental analysis shows that the method effectively improves the security of the power mobile Internet identity authentication process and

inhumane 发表于 2025-3-28 12:20:26

http://reply.papertrans.cn/87/8687/868695/868695_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Smart Computing and Communication; 6th International Co Meikang Qiu,Keke Gai,Han Qiu Conference proceedings 2022 The Editor(s) (if applicab