標(biāo)題: Titlebook: Applications of Soft Computing for the Web; Rashid Ali,MM Sufyan‘Beg Book 2017 Springer Nature Singapore Pte Ltd. 2017 Soft Computing.Reco [打印本頁(yè)] 作者: 閃爍 時(shí)間: 2025-3-21 17:41
書目名稱Applications of Soft Computing for the Web影響因子(影響力)
書目名稱Applications of Soft Computing for the Web影響因子(影響力)學(xué)科排名
書目名稱Applications of Soft Computing for the Web網(wǎng)絡(luò)公開(kāi)度
書目名稱Applications of Soft Computing for the Web網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Applications of Soft Computing for the Web被引頻次
書目名稱Applications of Soft Computing for the Web被引頻次學(xué)科排名
書目名稱Applications of Soft Computing for the Web年度引用
書目名稱Applications of Soft Computing for the Web年度引用學(xué)科排名
書目名稱Applications of Soft Computing for the Web讀者反饋
書目名稱Applications of Soft Computing for the Web讀者反饋學(xué)科排名
作者: Counteract 時(shí)間: 2025-3-21 20:36
Context Similarity Measurement Based on Genetic Algorithm for Improved Recommendationsn overload problem on the Web. Collaborative Filtering (CF), the most known and commonly used recommendation technique in the domain of RSs, generates recommendations toward items which were preferred by other like-minded users in the past. Computing similarity among users efficiently in case of spa作者: 驚呼 時(shí)間: 2025-3-22 00:40
Enhanced Multi-criteria Recommender System Based on AHPposed method is evaluated on a sample dataset collected from U. S. news dataset. The U. S. dataset consists of ratings on various aspects of many different colleges from multiple users. We have used eight criteria and eight colleges. The method builds an analytic hierarchy structure of multiple crit作者: 舊石器時(shí)代 時(shí)間: 2025-3-22 05:54 作者: oracle 時(shí)間: 2025-3-22 09:51 作者: aggravate 時(shí)間: 2025-3-22 13:11 作者: 平躺 時(shí)間: 2025-3-22 19:40 作者: GOUGE 時(shí)間: 2025-3-22 22:10
Crop Selection Using Fuzzy Logic-Based Expert Systemdge acquisition from one human by another. This paper discusses a fuzzy logic-based expert system for crop selection which will assist farmer by considering as input the climatic conditions and soil properties prevailing in his region. The system is found to be effective in predicting the correct cr作者: Blemish 時(shí)間: 2025-3-23 02:00
Fuzzy Logic Based Web Application for Gynaecology Disease Diagnosising various techniques, some of which are using fuzzy logic. The simulation of differential diagnosis process developed using fuzzy formalisms works in three stages. Initial screening stage accepts symptoms of patient and after computations results into an output as single or multiple diseases. For 作者: 大罵 時(shí)間: 2025-3-23 08:32 作者: AIL 時(shí)間: 2025-3-23 12:16
Fuzzy Game Theory for Web Securityrelated to web applications still exist. Game theoretic models have been applied to tackle diverse network security threats and have been proved to be useful. This paper focuses on using static fuzzy game theory approach to combat web application security threats. In the web security game, the attac作者: 無(wú)孔 時(shí)間: 2025-3-23 14:30
Energetische Verwertung von Biomasse,hich can incorporate human’s intelligence, filter out irrelevant information, search through nonstructural data, and provide suitable answers to user’s questions as per their need in different fields of e-commerce, e-business, e-health, adaptive web systems, and information retrieval are needed. In 作者: 一再困擾 時(shí)間: 2025-3-23 19:04 作者: Nerve-Block 時(shí)間: 2025-3-24 00:26
,Liberalisierung der Energiem?rkte,posed method is evaluated on a sample dataset collected from U. S. news dataset. The U. S. dataset consists of ratings on various aspects of many different colleges from multiple users. We have used eight criteria and eight colleges. The method builds an analytic hierarchy structure of multiple crit作者: obviate 時(shí)間: 2025-3-24 06:22 作者: BUDGE 時(shí)間: 2025-3-24 06:30
Energetische Verwertung von Biomasse,asingly important role for a user in order to deal with information overload problem on the Web. Recent studies demonstrate that incorporation of soft computing techniques into traditional RSs can improve the accuracy of recommendations. This paper, therefore, presents a review of the field of recom作者: chandel 時(shí)間: 2025-3-24 10:57
Regenerative und alternative Energiequellen,etc., people also tweet about happenings at the places near them and retweet about major breaking news posted by traditional news media like BBC, NDTV, etc. A large number of tweets about news events are posted every minute. Also, the tweets are itself noisy, redundant, and bursty due to the social 作者: Harass 時(shí)間: 2025-3-24 16:04
Konventionelle Dampfkraftwerke,ve and efficient means, into these online sources. The quality of data thus extracted depends largely upon the methodology used to search for the desired results. Search engines have been used for long to look for relevant information on the Web but currently, they are limited to a simple relevance-作者: 是比賽 時(shí)間: 2025-3-24 22:26 作者: 革新 時(shí)間: 2025-3-25 00:05 作者: 溫和女人 時(shí)間: 2025-3-25 05:44 作者: 稀釋前 時(shí)間: 2025-3-25 08:14
https://doi.org/10.1007/978-3-658-30621-2related to web applications still exist. Game theoretic models have been applied to tackle diverse network security threats and have been proved to be useful. This paper focuses on using static fuzzy game theory approach to combat web application security threats. In the web security game, the attac作者: 共同時(shí)代 時(shí)間: 2025-3-25 13:21 作者: BOOST 時(shí)間: 2025-3-25 18:43
978-981-13-4994-2Springer Nature Singapore Pte Ltd. 2017作者: corpuscle 時(shí)間: 2025-3-25 21:28
Rashid Ali,MM Sufyan‘BegProvides a single-source introduction to the applications of soft computing techniques for various web-based problems.Presents new applications such as Soft-computing-based Recommender Systems, Online作者: 暴發(fā)戶 時(shí)間: 2025-3-26 00:20 作者: Thrombolysis 時(shí)間: 2025-3-26 06:30
Book 2017gation guides, User profiles extraction, Web-based distributed information systems,? Web security applications, Internet of Things Applications and so on. . .The book is aimed for researchers and practitioner who are engaged in developing and applying intelligent systems principles for solving real-作者: 浮雕 時(shí)間: 2025-3-26 12:02
ecurity applications, Internet of Things Applications and so on. . .The book is aimed for researchers and practitioner who are engaged in developing and applying intelligent systems principles for solving real-978-981-13-4994-2978-981-10-7098-3作者: 卵石 時(shí)間: 2025-3-26 13:33 作者: linguistics 時(shí)間: 2025-3-26 18:31 作者: Foregery 時(shí)間: 2025-3-27 00:53 作者: 無(wú)思維能力 時(shí)間: 2025-3-27 01:43
Bibliographic Data Extraction from the Web Using Fuzzy-Based Techniques been used to programmatically extract data of interest from a Web source but they have their own limitations including their inability to distinguish relevant data from the irrelevant. In such situations, fuzzy-based techniques can be used to mine relevant data from various sources on the Web. This作者: 精致 時(shí)間: 2025-3-27 07:48
Fuzzy Logic Based Web Application for Gynaecology Disease Diagnosisreasing utility of the model. The proposed system uses REST (Representational State Transfer) web service architecture having thin UI (User Interface) client serving multiple devices. Input is communicated to web server by client browser; web server in turn forward the request to application server.作者: Exonerate 時(shí)間: 2025-3-27 12:43 作者: 民間傳說(shuō) 時(shí)間: 2025-3-27 16:02 作者: Prosaic 時(shí)間: 2025-3-27 17:52 作者: 食品室 時(shí)間: 2025-3-28 00:22 作者: 先行 時(shí)間: 2025-3-28 02:48
Konventionelle Dampfkraftwerke, been used to programmatically extract data of interest from a Web source but they have their own limitations including their inability to distinguish relevant data from the irrelevant. In such situations, fuzzy-based techniques can be used to mine relevant data from various sources on the Web. This作者: 流浪者 時(shí)間: 2025-3-28 09:37 作者: 領(lǐng)袖氣質(zhì) 時(shí)間: 2025-3-28 11:09 作者: cyanosis 時(shí)間: 2025-3-28 17:14 作者: Limpid 時(shí)間: 2025-3-28 22:20 作者: 遣返回國(guó) 時(shí)間: 2025-3-29 02:34
Fuzzy Game Theory for Web Securityand the ubiquitous attacker. A non-cooperative game is formulated where the attacker tries to access and modify data assets of an organization and the defender tries to protect the resources. The suboptimal Nash equilibrium guarantees that irrespective of the attacker’s strategy the defender’s strategy is optimal.作者: Flinch 時(shí)間: 2025-3-29 04:12 作者: 華而不實(shí) 時(shí)間: 2025-3-29 07:56
Use of Soft Computing Techniques for Recommender Systems: An Overview. We also provide the classification for each technique, their ability to address the challenges, explain their framework, and discuss possible extensions to further improvement in the recommendation accuracy, which can be served as a roadmap for research in this area.作者: flourish 時(shí)間: 2025-3-29 11:50
Book 2017 recent developments in the field of soft computing applications, from web-based information retrieval to online marketing and online healthcare. In each chapter author endeavor to explain the basic ideas behind the proposed applications in an accessible format for readers who may not possess a back作者: Pcos971 時(shí)間: 2025-3-29 18:13 作者: Lethargic 時(shí)間: 2025-3-29 20:31
,Liberalisierung der Energiem?rkte,eria and alternatives to ease the decision-making process. The ranking of each college is based on the overall score considering multiple criteria. The experimental results demonstrate the effectiveness of the use of AHP in college selection process.