Based on the input-output model, this paper calculates the direct input coefficient, total input coefficient, influence coefficient and sensitivity coefficient to analyze the current sectoral linkage of agricultural i...
详细信息
Eye defects of visually impaired people bring great inconvenience to daily lives. With the rapid development of computers and artificial intelligence, some assistance tools and wearable devices have provided convenien...
详细信息
The proceedings contain 17 papers. The special focus in this conference is on Advances in Web-Based Learning. The topics include: Security and Privacy in E-learning;digitalization of Firm’s innovation Process - A Bib...
ISBN:
(纸本)9783030907846
The proceedings contain 17 papers. The special focus in this conference is on Advances in Web-Based Learning. The topics include: Security and Privacy in E-learning;digitalization of Firm’s innovation Process - A Bibliometric Analysis;entrepreneurship education and E-Learning in the Greater Bay Area of China;Design and Implementation of Learning System Based on T-LSTM;situational Awareness of E-learning System Based on Cyber-Attack and Vulnerability;research on Cross-Project Software Defect Prediction Based on Machine Learning;research on Teaching Reform of Digital Media technology Under the Background of New Engineering Course Construction;scaffolding Teacher Learning During Professional Development with Theory-Driven Learning Analytics;imPres: An Immersive 3D Presentation Framework for Mixed Reality Enhanced Learning;designing a Virtual Learning Environment Based on a Learner Language Corpus;is This Fake or Credible? A Virtual Learning Companion Supporting the Judgment of Young Learners Facing Social Media Content;extending Narrative Serious Games Using Ad-Hoc Mini-games;supplemental Mobile Learner Support Through Moodle-Independent Assessment Bots;exploring the Innovative Blockchain-Based Application of Online Learning System in University;experiential E-Learning: A Creative Prospect for education in the Built Environment?.
This paper uses the jTessBoxEditorFX combined with the Tesseract-OCR to complete a handwritten font library with nearly 2,500 Chinese characters, and completes the program development on the server and mobile terminal...
详细信息
Aiming at the improper rock climbing movements may cause sports injuries, and the traditional sports motion capture analysis method is insufficient in real time, the accuracy of movement evaluation is low and other pr...
详细信息
Psychological counseling is one of the effective ways to solve psychological problems at present, and psychological counseling robot as a new interactive dialogue system tool (dialogue system refers to the system of d...
详细信息
In many industrial fields, the triangular mesh had replaced the original CAD models for their simplicity and efficiency. The mesh surfaces have been widely used in the direct machining for the industrial needs. Compar...
详细信息
With the development of production levels, industrial production patterns have evolved from single factories to multiple factories, resulting in distributed production patterns. Meanwhile, the introduction of sustaina...
详细信息
Detecting malicious attacks in normal network traffic is critical to network security. Traditional traffic identification methods often struggle to capture the complex communication patterns in network traffic, hinder...
详细信息
The performance of music source separation (MSS) has been greatly improved in recent years due to the rapid development of various neural network architectures. Spectrogram features are widely used in MSS tasks which ...
详细信息
暂无评论