標(biāo)題: Titlebook: Advances in Machine Learning and Data Science; Recent Achievements Damodar Reddy Edla,Pawan Lingras,Venkatanareshbabu Conference proceedin [打印本頁] 作者: T-Lymphocyte 時間: 2025-3-21 18:10
書目名稱Advances in Machine Learning and Data Science影響因子(影響力)
書目名稱Advances in Machine Learning and Data Science影響因子(影響力)學(xué)科排名
書目名稱Advances in Machine Learning and Data Science網(wǎng)絡(luò)公開度
書目名稱Advances in Machine Learning and Data Science網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Machine Learning and Data Science被引頻次
書目名稱Advances in Machine Learning and Data Science被引頻次學(xué)科排名
書目名稱Advances in Machine Learning and Data Science年度引用
書目名稱Advances in Machine Learning and Data Science年度引用學(xué)科排名
書目名稱Advances in Machine Learning and Data Science讀者反饋
書目名稱Advances in Machine Learning and Data Science讀者反饋學(xué)科排名
作者: evanescent 時間: 2025-3-21 22:13
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/a/image/148707.jpg作者: 高興一回 時間: 2025-3-22 02:30
Advances in Machine Learning and Data Science978-981-10-8569-7Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: Arroyo 時間: 2025-3-22 06:39
https://doi.org/10.1007/3-540-58808-6ese systems, more and more concerns over the risk and security issues in networks have raised. In this paper, we have proposed approach using particle swarm optimization to optimize ART. Adaptive resonance theory is one of the most well-known machine-learning-based unsupervised neural networks, whic作者: Foregery 時間: 2025-3-22 09:27
https://doi.org/10.1007/978-1-4471-5140-1on has enabled enormous research opportunities in the field of machine learning to introduce new and improved techniques that deal with the challenging tasks of higher level. However, this rise in size of data quality has introduced a new challenge in this field, regarding the processing of such hug作者: Libido 時間: 2025-3-22 16:53
https://doi.org/10.1007/978-1-4471-5140-1interlinked data from different database sources. The term data provenance is defined as lineage of data and movement between databases. Scientists and enterprises use their own analytical tools to process the data provenance. In the current scenario, workflow management systems are popular in scien作者: 迎合 時間: 2025-3-22 17:38
,A 30?years Learning Experience,given, and a QA system attempts to search for the correct answer to the question posed in natural language. Question classification (QC), which is a part of QA system, helps to categorize each question. In QC, the entity type of the answering sentence for a given question in natural language is pred作者: 親愛 時間: 2025-3-22 22:16 作者: mercenary 時間: 2025-3-23 03:51
R. Lemke,D. Klaus,D. W. Lübbersdue to varied biological and psychological reasons. If high blood pressure state is sustained for a longer cycle, then the person may be the victim of heart attack or brain stroke or kidney disease. This paper uses a decision tree-based J48 algorithm, to predict whether a person is prone to high blo作者: Outspoken 時間: 2025-3-23 08:52
R. Lemke,D. Klaus,D. W. Lübbersea-efficient shift register using transmission gate. Shift register is used small number of pulse clock signal by alignment latches to several shift register and additional temporary latches. The non-stop flow of pulse signal from input side due to this unnecessary of signal flow so the power and de作者: defendant 時間: 2025-3-23 12:04
M. Yamashita,H. Ishihara,T. Oyamachine intelligence that can help to diagnose in advance so that doctors start the treatment faster and save time. The machine intelligence is a way to predict the liver-related problems; in this study, the linear regression is used to predict the same, more accurately. The albumin levels are highly 作者: 有機(jī)體 時間: 2025-3-23 14:48 作者: 廣大 時間: 2025-3-23 21:10
R. Lemke,D. Klaus,D. W. Lübbersf features that are frequently found together in a same location is called co-location pattern discovery. Earlier methods to find co-location patterns focuses on converting neighbourhood relations to item sets. Once item sets are obtained then can apply any method for finding patterns. The criteria 作者: Encapsulate 時間: 2025-3-23 22:14
Monitors in Closed-Circuit Anaesthesia layer of RBFNN grows on par with the growing dataset size. This results in increase in network complexity, training time, and testing times. It is desirable to design appropriate RBFNN which balance between simplicity and accuracy. In the literature, many approaches are proposed for reducing the ne作者: 序曲 時間: 2025-3-24 05:05
https://doi.org/10.1007/978-3-642-71328-6nditional random fields (CRF). Keyphrase is a word or set of words that describe the close relationship of content and context in particular documents (Sharan, International conference on advances in computing communications and informatics (ICACCI), 2014) [.]. Keyphrases may be the topics of the do作者: preeclampsia 時間: 2025-3-24 10:17
On-Line Estimation of Cerebral Oxygenationfor three different types of configurations at two, four, five, and six NPRs. The results are captured and compared to one another. The rectangular crosswire is used as a passive control and tested at Mach number of two. The crosswire running along the major axis of the elliptical jet exits. The pit作者: 迎合 時間: 2025-3-24 10:57
Seth C. Anderson,Jeffery A. Bornimized through the incorporation of regularization to gain convenient results, and the Tikhonov regularization is frequently used. Regularization benefits in improving the generalized performance than traditional ELM. The estimation of regularization parameter mainly follows heuristic approaches or 作者: 嚴(yán)厲譴責(zé) 時間: 2025-3-24 15:28 作者: 高度 時間: 2025-3-24 20:49
Exchange-Traded Funds: Issues and Studies,r opponents. As this interdependence continues to grow in scope, the need to devise an efficient security solution has become challenging to the security researchers and practitioners. We aim to explore the potential applicability of game theory to model the strategic interactions between these agen作者: 夸張 時間: 2025-3-25 02:24
https://doi.org/10.1007/978-1-4419-0168-2 explicitly programmed as most of the technological systems are in an insurrection to be operated by intelligent machines capable to make the human like verdict to automatically solve human task with perfect results. Artificial intelligence is the heart of every major technological system in the wor作者: expeditious 時間: 2025-3-25 06:46
Seth C. Anderson,Jeffery A. Bornprevented only if it is detected at an early stage. Early diagnosis of glaucoma is possible by measuring the level of intra-ocular pressure (IOP) and the amount of neuro-retinal rim (NRR) area loss. The diagnosis accuracy depends on the experience and domain knowledge of the ophthalmologist. Hence, 作者: 潛移默化 時間: 2025-3-25 09:30 作者: MIR 時間: 2025-3-25 12:27 作者: SEED 時間: 2025-3-25 18:43
978-981-10-8568-0Springer Nature Singapore Pte Ltd. 2018作者: 慟哭 時間: 2025-3-25 20:37
2194-5357 data mining.Serves as a good reference material for future w.The Volume of “.Advances in Machine Learning and Data Science - Recent Achievements and Research Directives.” constitutes the proceedings of First International Conference on Latest Advances in Machine Learning and Data Science (LAMDA 2017作者: NORM 時間: 2025-3-26 00:30
Monitors in Closed-Circuit Anaesthesiasirable to design appropriate RBFNN which balance between simplicity and accuracy. In the literature, many approaches are proposed for reducing the neurons in the RBFNN hidden layer. In this paper, a comprehensive survey is performed on hidden layer reduction techniques with respect to Pima Indians Diabetes (PID) dataset.作者: Acetabulum 時間: 2025-3-26 05:35 作者: Lamina 時間: 2025-3-26 10:28 作者: Cerumen 時間: 2025-3-26 14:05
https://doi.org/10.1007/978-1-4471-5140-1ccelerate the training and testing phases of machine learning problems. We also emphasize to demonstrate the efficiency achieved via predicting airline delay through both the sequential as well as CUDA-based parallel approach. Experimental results show that the proposed parallel CUDA approach outperforms in terms of its execution time.作者: 圓木可阻礙 時間: 2025-3-26 19:57
Seth C. Anderson,Jeffery A. Borngram of oriented gradients (HOG) feature extraction and GCV-based regularized ELM are applied. Experimental results on facial expression database JAFFE demonstrate promising performance which outperforms the other two classifiers, namely support vector machine (SVM) and k-nearest neighbor (KNN).作者: dissolution 時間: 2025-3-26 22:38
https://doi.org/10.1007/978-1-4419-0168-2 for detection of Brain tumor by artificial intelligence using the algorithm of k-nearest neighbor which is established on the training a model with different values of k and the appropriate distance metrics are used for the distance calculation between pixels.作者: 帽子 時間: 2025-3-27 03:54
https://doi.org/10.1007/3-540-58808-6problem and easy to implement. The method is based on anomaly detection as it can also detect unknown attack types. PSO is used to optimize vigilance parameter of ART-1 and to classify network data into attack or normal. KDD ’99 (knowledge discovery and data mining) dataset has been used for this purpose.作者: LAVE 時間: 2025-3-27 08:02
R. Lemke,D. Klaus,D. W. Lübbersevel. We have taken the real-time data set of 1045 diagnostic records of patients in the age between 18 and 65. These are collected from a medical diagnosis center Doctor C, Hyderabad. Records (66%) are used to train the model, and remaining 34% records are used to test the model. Our results showed 88.45% accuracy.作者: Recess 時間: 2025-3-27 12:46
M. Yamashita,H. Ishihara,T. Oyamae total average accuracy achieved in this proposed model was 89.34% which is much more than the previously identified research work of Wold et al. (SIAM J Sci Stat Comput, 5(3), 735–743, 1984, [.]) of 84.22%.作者: 殘忍 時間: 2025-3-27 13:53 作者: Morsel 時間: 2025-3-27 21:02
https://doi.org/10.1007/978-3-642-71328-6ion, query or topic generation, question-answering system, search engine, information retrieval, document classification, etc. The relationships of the keyphrases are also extracted. Two types of relations are considered—synonym and hyponyms. The result shows that our proposed system outperforms the existing systems.作者: 考博 時間: 2025-3-27 22:23 作者: 前奏曲 時間: 2025-3-28 02:11
Exchange-Traded Funds: Issues and Studies, players are obtained by computing the Nash equilibrium. Our goal is to refine the key insights to illustrate the current state of game theory, concentrating on areas relevant to security analysis in cyber warfare.作者: Ovulation 時間: 2025-3-28 09:32
Seth C. Anderson,Jeffery A. Bornew the different segmentation algorithms used to develop a computer-aided diagnostic (CAD) system for the detection of glaucoma from fundus images, and additionally, the future work is also highlighted.作者: PAEAN 時間: 2025-3-28 10:36
Game Theory-Based Defense Mechanisms of Cyber Warfare,he an den entgegengesetzten Stationen aufgestellt sind und durch lokale Batterieen ., .. in Th?tigkeit gesetzt werden. Die lokalen Ketten sind punktirt dargestellt. ., .. sind die transmittirenden Instrumente, deren jedes aus zwei Elektromagneten ., . und den Hebeln ., . aus weichem Eisen besteht, w作者: 本能 時間: 2025-3-28 15:49 作者: NIL 時間: 2025-3-28 19:46 作者: 紅腫 時間: 2025-3-29 00:23
2194-5357 and extract useful information from data. In field of data science, machine learning algorithms are used frequently to identify valuable knowledge from commercial databases containing records of different indus978-981-10-8568-0978-981-10-8569-7Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: Genteel 時間: 2025-3-29 05:36
Game Theory-Based Defense Mechanisms of Cyber Warfare,Apparates. ., .. sind Widerstandspiralen, bestehend aus einem dünnen Neusilberdraht von betr?chtlicher L?nge, welcher einen Widerstand gleich demjenigen des Telegraphendrahtes darbietet. Dieser Widerstand kann durch Umdrehung der kleinen Zeiger ., .. regulirt werden. ., .. sind galvanische Batteriee作者: organic-matrix 時間: 2025-3-29 10:09 作者: Awning 時間: 2025-3-29 13:38 作者: poliosis 時間: 2025-3-29 17:20 作者: 他一致 時間: 2025-3-29 23:14
IDPC-XML: Integrated Data Provenance Capture in XML,978-3-662-24684-9作者: META 時間: 2025-3-30 02:37 作者: 最有利 時間: 2025-3-30 04:32 作者: ADORE 時間: 2025-3-30 11:14 作者: 金盤是高原 時間: 2025-3-30 13:31
Design of Low-Power Area-Efficient Shift Register Using Transmission Gate,978-3-642-99673-3作者: Vital-Signs 時間: 2025-3-30 18:31 作者: Flinch 時間: 2025-3-30 22:57 作者: Fracture 時間: 2025-3-31 02:48
Spatial Co-location Pattern Mining Using Delaunay Triangulation,978-3-642-99591-0作者: Cerebrovascular 時間: 2025-3-31 07:07
Review on RBFNN Design Approaches: A Case Study on Diabetes Data,978-3-663-01285-6作者: Cerebrovascular 時間: 2025-3-31 10:17 作者: hypnogram 時間: 2025-3-31 14:25
Mixing and Entrainment Characteristics of Jet Control with Crosswire,978-3-658-19650-9作者: cravat 時間: 2025-3-31 18:48 作者: 魔鬼在游行 時間: 2025-3-31 22:16
Prediction of Social Dimensions in a Heterogeneous Social Network,978-3-662-36584-7作者: 孵卵器 時間: 2025-4-1 03:14 作者: Incisor 時間: 2025-4-1 09:26 作者: VEST 時間: 2025-4-1 14:11
https://doi.org/10.1007/978-1-4471-5140-1ocessing and managing the internal data using XML file. This tool collects data provenance obtrusively in a local system using self-generated log and also collects provenance data in XML format which can be visualized as a directed graph to understand the convergence. Relevant case studies of IDPC-X作者: Explosive 時間: 2025-4-1 15:47 作者: 起來了 時間: 2025-4-1 22:13
Rhinoplasty Problems and Misconceptions,atasets justify the effectiveness of the proposed clustering algorithm. Further, discussion on how the proposed clustering algorithm works in sensor-based system is provided which will be helpful for domain experts.作者: 雄辯 時間: 2025-4-2 01:47 作者: 有助于 時間: 2025-4-2 03:16
M. Yamashita,H. Ishihara,T. Oyamace for finding the manipulated region in manageable time. For each extracted interest point, SIFT is used for calculating the descriptors. Now obtained descriptors are matched using the outlier rejection with nearest neighbour. Here RANSAC is used to find the best set of matches to identify the mani作者: 怎樣才咆哮 時間: 2025-4-2 08:02