Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Data collection optimization of ocean observation network based on AUV path planning and communication
Z Yan, Y Li - Ocean Engineering, 2023 - Elsevier
Abstract The Ocean Observation Network (OON) is an ocean science and engineering
observation platform which integrates underwater wireless sensors, acoustic buoys …
observation platform which integrates underwater wireless sensors, acoustic buoys …
Handling Imbalanced Data through Re-sampling: Systematic Review
R Eltayeb, AE Karrar, WI Osman… - Indonesian Journal of …, 2023 - section.iaesonline.com
Handling imbalanced data is an important issue that can affect the validity and reliability of
the results. One common approach to addressing this issue is through re-sampling the data …
the results. One common approach to addressing this issue is through re-sampling the data …
Machine Learning for Missing Value Imputation
In recent times, a considerable number of research studies have been carried out to address
the issue of Missing Value Imputation (MVI). MVI aims to provide a primary solution for …
the issue of Missing Value Imputation (MVI). MVI aims to provide a primary solution for …
A methodology for evaluating feature selection and clustering methods with project-specific requirements
H von Linde, O Riedel - International Journal of Production …, 2024 - Taylor & Francis
This paper describes a methodology for ranking feature selection and clustering methods
with user-specific preferences and taking data properties into account. For a better …
with user-specific preferences and taking data properties into account. For a better …
A novel method for solar image retrieval based on the parzen kernel estimate of the function derivative and convolutional autoencoder
The Sun's activity has an enormous impact on the climate and technology on the Earth. The
NASA Solar Dynamic Observatory (SDO) spacecraft produces an enormous number of …
NASA Solar Dynamic Observatory (SDO) spacecraft produces an enormous number of …
Learning behavior analysis and learning effect evaluation in open online courses
X Li - Creative Education, 2022 - scirp.org
In the context of globalization, the trend of globalization in the field of education is becoming
more and more significant. With the maturity of Internet and cloud computing, a large online …
more and more significant. With the maturity of Internet and cloud computing, a large online …
EM-IFCM: Fuzzy c-means clustering algorithm based on edge modification for imbalanced data
Y Pu, W Yao, X Li - Information Sciences, 2024 - Elsevier
The improved fuzzy c-means (IFCM) algorithm is an effective technique for handling the
“uniform effect” in imbalanced data clustering; it adjusts the weight of each class based on …
“uniform effect” in imbalanced data clustering; it adjusts the weight of each class based on …
A spatio-temporal binary grid-based clustering model for seismicity analysis
This paper presents a spatio-temporal binary grid-based clustering model for determining
complex earthquake clusters with different shapes and heterogeneous densities present in a …
complex earthquake clusters with different shapes and heterogeneous densities present in a …
Density peaks clustering algorithm with connected local density and punished relative distance
J **ong, W Zang, Y Zhao, X Liu - The Journal of Supercomputing, 2024 - Springer
Density peaks clustering (DPC) algorithm has been widely applied in many fields due to its
innovation and efficiency. However, the original DPC algorithm and many of its variants …
innovation and efficiency. However, the original DPC algorithm and many of its variants …
Beyond Information System User Behavior Models: The Power of User Groups in Preventing Insider Attacks
O Ņikiforova, V Zabiniako - Intelligent Systems Conference, 2024 - Springer
Traditional information security methods, such as access control and firewalls, cannot
always provide effective protection against internal threats. Analysis of user behavior allows …
always provide effective protection against internal threats. Analysis of user behavior allows …