Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Semantic web technologies for the internet of things: Systematic literature review
Nowadays, the use of the Internet of Things (IoT) in diverse applications becomes very
popular. Accordingly, a proliferation of objects with remote sensing, actuation, analysis, and …
popular. Accordingly, a proliferation of objects with remote sensing, actuation, analysis, and …
Ontology learning from text: A look back and into the future
Ontologies are often viewed as the answer to the need for interoperable semantics in
modern information systems. The explosion of textual information on the Read/Write Web …
modern information systems. The explosion of textual information on the Read/Write Web …
A unified form of fuzzy C-means and K-means algorithms and its partitional implementation
This paper proposes as an element of novelty the Unified Form (UF) clustering algorithm,
which treats Fuzzy C-Means (FCM) and K-Means (KM) algorithms as a single configurable …
which treats Fuzzy C-Means (FCM) and K-Means (KM) algorithms as a single configurable …
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
Clustering algorithms have emerged as an alternative powerful meta-learning tool to
accurately analyze the massive volume of data generated by modern applications. In …
accurately analyze the massive volume of data generated by modern applications. In …
[HTML][HTML] Ontology-based knowledge representation of industrial production workflow
Industry 4.0 is hel** to unleash a new age of digitalization across industries, leading to a
data-driven, interoperable, and decentralized production process. To achieve this major …
data-driven, interoperable, and decentralized production process. To achieve this major …
Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system
R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …
available on multiple sources, including social media. The information could be used to …
[HTML][HTML] Building knowledge graphs from unstructured texts: Applications and impact analyses in cybersecurity education
Knowledge graphs gained popularity in recent years and have been useful for concept
visualization and contextual information retrieval in various applications. However …
visualization and contextual information retrieval in various applications. However …
Инженерия знаний. Модели и методы
ТА Гаврилова, ДВ Кудрявцев, Д Муромцев - 2016 - elibrary.ru
Учебник посвящен вопросам анализа и структурирования данных и знаний для
разработки информационных и интеллектуальных систем. В нем детально …
разработки информационных и интеллектуальных систем. В нем детально …
[PDF][PDF] Approaches, methods, metrics, measures, and subjectivity in ontology evaluation: A survey
Ontology evaluation is concerned with ascertain two important aspects of ontologies: quality
and correctness. The distinction between the two is attempted in this survey as a way to …
and correctness. The distinction between the two is attempted in this survey as a way to …
Semantically enhanced information retrieval: An ontology-based approach
Currently, techniques for content description and query processing in Information Retrieval
(IR) are based on keywords, and therefore provide limited capabilities to capture the …
(IR) are based on keywords, and therefore provide limited capabilities to capture the …