Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Word beam search: A connectionist temporal classification decoding algorithm
Recurrent Neural Networks (RNNs) are used for sequence recognition tasks such as
Handwritten Text Recognition (HTR) or speech recognition. If trained with the Connectionist …
Handwritten Text Recognition (HTR) or speech recognition. If trained with the Connectionist …
Comparison of orthogonality estimation methods for the two-dimensional separations of peptides
In two-dimensional chromatography, the orthogonality of separation is important for
achieving high peak capacity. In this paper, a number of different metrics are compared as …
achieving high peak capacity. In this paper, a number of different metrics are compared as …
Accurate tracking, collision detection, and optimal scheduling of airport ground support equipment
In order to lower the ramp risk and improve the aircraft ground handling efficiency, we aim to:
1) track ground support equipment (GSE) in a real-time and high-accuracy manner so that …
1) track ground support equipment (GSE) in a real-time and high-accuracy manner so that …
NMR-TS: de novo molecule identification from NMR spectra
Nuclear magnetic resonance (NMR) spectroscopy is an effective tool for identifying
molecules in a sample. Although many previously observed NMR spectra are accumulated …
molecules in a sample. Although many previously observed NMR spectra are accumulated …
ezTag: tagging biomedical concepts via interactive learning
Recently, advanced text-mining techniques have been shown to speed up manual data
curation by providing human annotators with automated pre-annotations generated by rules …
curation by providing human annotators with automated pre-annotations generated by rules …
[HTML][HTML] Quantum algorithms for some strings problems based on quantum string comparator
We study algorithms for solving three problems on strings. These are sorting of n strings of
length k,“the Most Frequent String Search Problem”, and “searching intersection of two …
length k,“the Most Frequent String Search Problem”, and “searching intersection of two …
Opportunistic networks for emergency applications and their standard implementation framework
We present a novel paradigm of opportunistic networks or oppnets in the context of
emergency preparedness and response (EPR). Oppnets constitute the category of ad hoc …
emergency preparedness and response (EPR). Oppnets constitute the category of ad hoc …
EIGER: automated IOC generation for accurate and interpretable endpoint malware detection
A malware signature including behavioral artifacts, namely Indicator of Compromise (IOC)
plays an important role in security operations, such as endpoint detection and incident …
plays an important role in security operations, such as endpoint detection and incident …
[PDF][PDF] 区块链系统中的分布式数据管理技术——挑战与展望
于戈, 聂铁铮, **晓华, 张岩峰, 申德荣, 鲍玉斌 - 计算机学报, 2021 - 159.226.43.17
(东北大学计算机科学与工程学院, 沈阳110169) 摘要区块链是在数字加密货币的应用基础之上
发展起来的一种分布式数据库技术. 区块链系统具有去中心化, 不可篡改, 分布共识 …
发展起来的一种分布式数据库技术. 区块链系统具有去中心化, 不可篡改, 分布共识 …
Lock-free augmented trees
Augmenting an existing sequential data structure with extra information to support greater
functionality is a widely used technique. For example, search trees are augmented to build …
functionality is a widely used technique. For example, search trees are augmented to build …