標(biāo)題: Titlebook: Advanced Machine Learning Technologies and Applications; Second International Aboul Ella Hassanien,Mohamed F. Tolba,Ahmad Taher Conference [打印本頁] 作者: antihistamine 時間: 2025-3-21 19:46
書目名稱Advanced Machine Learning Technologies and Applications影響因子(影響力)
書目名稱Advanced Machine Learning Technologies and Applications影響因子(影響力)學(xué)科排名
書目名稱Advanced Machine Learning Technologies and Applications網(wǎng)絡(luò)公開度
書目名稱Advanced Machine Learning Technologies and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advanced Machine Learning Technologies and Applications被引頻次
書目名稱Advanced Machine Learning Technologies and Applications被引頻次學(xué)科排名
書目名稱Advanced Machine Learning Technologies and Applications年度引用
書目名稱Advanced Machine Learning Technologies and Applications年度引用學(xué)科排名
書目名稱Advanced Machine Learning Technologies and Applications讀者反饋
書目名稱Advanced Machine Learning Technologies and Applications讀者反饋學(xué)科排名
作者: ANA 時間: 2025-3-21 23:43
Digital Forensic Data and Intelligence,to its origin introduced for the proposed service. Two compression technique (the arithmetic encoding and the transform encoding) chosen to represent each type. For large data sets, it has been proven that, the arithmetic encoding has a fixed recovery ratio equal to one. At the same time, the transf作者: 小步走路 時間: 2025-3-22 02:32
https://doi.org/10.1007/978-3-030-58732-1cution-time is calculated for each service apart and under three different scenarios. An offloading decision is then smartly taken based on real-time comparisons between being executed locally, or compressed and then offloaded, or offloaded directly without compression. The extensive simulation stud作者: Harbor 時間: 2025-3-22 04:50 作者: INCH 時間: 2025-3-22 08:56 作者: SIT 時間: 2025-3-22 16:38
Isolated Printed Arabic Character Recognition Using KNN and Random Forest Tree Classifiers978-3-658-22372-4作者: GUEER 時間: 2025-3-22 18:06 作者: 悠然 時間: 2025-3-22 23:29
Concept Recommendation System for Cloud Services Advertisement978-3-663-08166-1作者: Meditate 時間: 2025-3-23 02:36 作者: 貿(mào)易 時間: 2025-3-23 09:00
Queries Based Workload Management System for the Cloud Environment978-3-322-82157-7作者: Benzodiazepines 時間: 2025-3-23 13:03 作者: modish 時間: 2025-3-23 17:21 作者: 無所不知 時間: 2025-3-23 19:37
Digital Pathological Services Capability Framework978-3-322-94442-9作者: FOR 時間: 2025-3-24 00:18
Investigation of Touch-Based User Authentication Features Using Android Smartphone978-3-663-08878-3作者: GLIDE 時間: 2025-3-24 04:38
Virtual Machine Placement Based on Ant Colony Optimization for Minimizing Resource Wastage978-3-8349-8399-2作者: florid 時間: 2025-3-24 07:00
Advanced Machine Learning Technologies and ApplicationsSecond International作者: 法律的瑕疵 時間: 2025-3-24 14:35
Arabic Sign Language Recognition Using Spatio-Temporal Local Binary Patterns and Support Vector Machbsolute Verkaufszahlen, Verkaufspotentiale, relative Marktanteile, Umsatzwachstum, Umsatzpotentiale oder auch ?weiche’ Faktoren wie die Markentreue dienen. Eine M?glichkeit auf identifizierte negative Entwicklungen zu reagieren, stellt die Modifikation der bisherigen Leistungen dar.作者: 引導(dǎo) 時間: 2025-3-24 15:55 作者: Freeze 時間: 2025-3-24 21:17
iSee: An Android Application for the Assistance of the Visually Impairedes wichtigen Distributionskanals waren die wesentlich geringeren Lizenzgebühren die . verlangte. Das Ergebnis: Wenige Jahre nach der Einführung musste das Video 2000-System wieder vom Markt genommen werden. Im Jahr 1980 wurde das VHS-System zum anerkannten Standard.作者: 共同給與 時間: 2025-3-25 02:23
Highly Secured Multilayered Motion Vector Watermarkinghts besteht darin, sicherzustellen, dass sich ausschlie?lich sichere Produkte auf dem Markt befinden. Dies soll in erster Linie verhindern, dass von Produkten Gefahren, insbesondere für die Sicherheit und Gesundheit von Personen, ausgehen.作者: 裝飾 時間: 2025-3-25 06:57 作者: 主講人 時間: 2025-3-25 11:00
Arabic Text Recognition Based on Neuro-Genetic Feature Selection Approach Hauptdimensionen der Produktivit?tsbetrachtung dieser Arbeit und werden schlie?lich in einem Effizienz-Ressourcen-Portfolio zusammengeführt, das die Positionierung der Anlagensysteme entsprechend der jeweiligen Auspr?gung erm?glicht (Kap. 3.3.).作者: ANTI 時間: 2025-3-25 15:09
https://doi.org/10.1007/978-3-319-13461-1Arabic character recognition; CBR; artificial intelligence; cloud computing; computational intelligence; 作者: Embolic-Stroke 時間: 2025-3-25 16:46
978-3-319-13460-4Springer International Publishing Switzerland 2014作者: Notorious 時間: 2025-3-25 21:18 作者: 去世 時間: 2025-3-26 00:30 作者: Chauvinistic 時間: 2025-3-26 07:09
https://doi.org/10.1007/978-3-319-53300-1n be described as a tool to distinguish an object of one class from another object of another class. It is necessary to define the significant primitives. The size of vector primitives can be large if a large number of primitives are extracted including redundant and irrelevant features. As a result作者: 奴才 時間: 2025-3-26 11:29
State of the Science in Big Data Analyticscted features, which in turn determines the efficient and appropriate classifier for each system. This study is an investigation of using both K- Nearest Neighbor (KNN) and Random Forest Tree (RFT) classifiers with previously tested statistical features. These features are independent of the fonts a作者: macular-edema 時間: 2025-3-26 16:29
https://doi.org/10.1007/978-3-319-53300-1ortant step in an OCR system. Support Vectors Machines (SVM) is among the tool of classification that appears these days. This tool proves its ability to discriminate between the forms and gives encouraging result. In this paper, we present an overview of the Arabic optical character recognition (AO作者: 糾纏,纏繞 時間: 2025-3-26 17:58
State of the Science in Big Data Analyticsl media and photography. While some camera-based approaches provided partial solutions for the visually impaired, they still constitute a cumbersome process for the user. iSee is an Android based application that benefits from the commercially available technology to help the visually impaired peopl作者: RACE 時間: 2025-3-26 23:53
https://doi.org/10.1007/978-3-030-01358-5ign language at word level used by the community of deaf people. The proposed system is based on the combination of Spatio-Temporal local binary pattern (STLBP) feature extraction technique and support vector machine (SVM) classifier. The system takes a sequence of sign images or a video stream as i作者: obeisance 時間: 2025-3-27 04:55 作者: 植物學(xué) 時間: 2025-3-27 08:06
Studies in Systems, Decision and ControlaS) providers compete to address nearly every business and IT application needs. Heterogeneous cloud service advertisements make it difficult for potential users to discover the required service offers. To overcome this problem, the cloud service registry is fundamental for both the cloud users and 作者: fibula 時間: 2025-3-27 10:46 作者: 容易懂得 時間: 2025-3-27 15:20
Darren Quick,Kim-Kwang Raymond Chooem is to manage any unpredictable load imbalance with respect to varying resource capabilities and performances. Key challenges raised by this problem are how to increase control over the running resources to improve the overall performance and response time of the query execution. This paper propos作者: 2否定 時間: 2025-3-27 20:39
Digital Forensic Data and Intelligence,d has an increasing attention of database community. Having security services based on watermarking techniques that enable permanent preservation for data tuples in terms of integrity and recovery for cloud environments presents the milestone of establishing trust between the data owners and the dat作者: reject 時間: 2025-3-28 01:50 作者: Rodent 時間: 2025-3-28 02:47 作者: Provenance 時間: 2025-3-28 09:27 作者: Intractable 時間: 2025-3-28 11:43 作者: Obituary 時間: 2025-3-28 14:53
Manuel Gómez,Rogelio Pérez-Perdomochnology, which yields an improper service. Denial of Service (DoS) attack and its large counterpart Distributed Denial of Service (DDoS) and Flash Crowd attacks are among the most dangerous internet attacks, which overwhelm the web server, thereby slow it down, and eventually take it down completel作者: antecedence 時間: 2025-3-28 20:50
Big Law in Chile: A Glance at the Law Firmsing are demand driven utilized in forms of virtual machines to facilitate the execution of complicated tasks. Virtual machine placement is the process of mapping virtual machines to physical machines. This is an active research topic and different strategies have been adopted in literature for this 作者: attenuate 時間: 2025-3-29 01:37 作者: 觀點 時間: 2025-3-29 05:23 作者: CLAMP 時間: 2025-3-29 08:24
https://doi.org/10.1007/978-3-030-01358-5morphological analyzer to extract new features that will improve the stemming and the POS tagging. Applying standard evaluation metrics, the proposed tokenizer achieves an .. score of 99.99, and the POS tagger achieves an accuracy of 98.05%.作者: notion 時間: 2025-3-29 13:38 作者: 輕率看法 時間: 2025-3-29 19:15 作者: 預(yù)知 時間: 2025-3-29 22:31
iSee: An Android Application for the Assistance of the Visually Impairedfgabe die . des Produkts zu .. Die Bedeutung dieser Phase wird anhand von Praxisbeispielen deutlich. Die Einführung der ersten Homevideo-Systeme in den 1970er Jahren führen Autoren immer wieder als exemplarisch für die Herausforderungen im Rahmen der Wahl einer ad?quaten Markteinführungsstrategie an作者: Cabinet 時間: 2025-3-30 02:14
Arabic Sign Language Recognition Using Spatio-Temporal Local Binary Patterns and Support Vector Maches diese von nun an . und gegebenenfalls zu optimieren. Angestrebte Zielsetzungen liegen dabei insbesondere in der Verl?ngerung der Produktlebenszyklen, der Absicherung und Verteidigung erk?mpfter Marktpositionen, der Steigerung von Umsatz und Gewinn, der Optimierung von Leistungs- und Kundenpotenti作者: WITH 時間: 2025-3-30 04:05 作者: 無法取消 時間: 2025-3-30 12:15 作者: Temporal-Lobe 時間: 2025-3-30 14:44 作者: Biofeedback 時間: 2025-3-30 20:35 作者: 顯微鏡 時間: 2025-3-30 21:34 作者: 漂亮才會豪華 時間: 2025-3-31 00:55 作者: 宣誓書 時間: 2025-3-31 08:15 作者: Lipoprotein 時間: 2025-3-31 12:15
Manuel Gómez,Rogelio Pérez-Perdomoxamined to explore the efficiency of feature and each category (similar processing and representation form). Also, the impact of normalization and seven feature selection algorithms are examined. After applying Exhaustive Search reduction technique to the observation vectors composed of all 12 extracted features, nine features are retained.作者: 觀點 時間: 2025-3-31 17:11
Manuel Gómez,Rogelio Pérez-Perdomo/DDoS and Flash Crowd Attacks. Firstly, the review paper describes them according to the similar category, and then it compares them based on the predefined metrics. Finally, advantages and disadvantages for each category are described.作者: 柔軟 時間: 2025-3-31 21:19
1865-0929 nternational Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2014, held in Cairo, Egypt, in November 2014. The 49 full papers presented were carefully reviewed and selected from 101 initial submissions. The papers are organized in topical sections on machine learning in 作者: STAT 時間: 2025-3-31 23:11
Conference proceedings 2014A 2014, held in Cairo, Egypt, in November 2014. The 49 full papers presented were carefully reviewed and selected from 101 initial submissions. The papers are organized in topical sections on machine learning in Arabic text recognition and assistive technology; recommendation systems for cloud servi作者: 沐浴 時間: 2025-4-1 04:05 作者: diathermy 時間: 2025-4-1 08:15
State of the Science in Big Data Analyticshas been evaluated. RFT found to be better than KNN by more than 11 % recognition rate. The effect of different parameters of these classifiers has also been tested, as well as the effect of noisy characters.作者: APO 時間: 2025-4-1 11:35
Studies in Systems, Decision and Control semantic-based system for unified SaaS service advertisements. We introduce a template for the service registration, a guided registration model, and a registration system. Moreover, we present a semantic similarity model for services metadata matchmaking. Prototypical implementation and evaluation proved the proposed system effectiveness.作者: 圣歌 時間: 2025-4-1 16:07
https://doi.org/10.1007/978-3-030-14298-8so allows users to access the distributed database from anywhere. Moreover, we present an enhanced allocation and replication technique that can be applied at the initial stage of the distributed database design when no information about the query execution is available.作者: arrhythmic 時間: 2025-4-1 20:03 作者: Abominate 時間: 2025-4-2 00:33