標(biāo)題: Titlebook: Applied Computing & Information Technology; Roger Lee Book 2018 Springer International Publishing AG 2018 Computational Intelligence.Appli [打印本頁] 作者: 教條 時間: 2025-3-21 16:46
書目名稱Applied Computing & Information Technology影響因子(影響力)
書目名稱Applied Computing & Information Technology影響因子(影響力)學(xué)科排名
書目名稱Applied Computing & Information Technology網(wǎng)絡(luò)公開度
書目名稱Applied Computing & Information Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Applied Computing & Information Technology被引頻次
書目名稱Applied Computing & Information Technology被引頻次學(xué)科排名
書目名稱Applied Computing & Information Technology年度引用
書目名稱Applied Computing & Information Technology年度引用學(xué)科排名
書目名稱Applied Computing & Information Technology讀者反饋
書目名稱Applied Computing & Information Technology讀者反饋學(xué)科排名
作者: nettle 時間: 2025-3-21 20:49
mCITYPASS: Privacy-Preserving Secure Access to Federated Touristic Services with Mobile Devices,, reusability and unsplittability) obtaining a very secure and powerful system. The dispute resolution protocol assures that all the parts are protected against other part’s attacks. Finally, the system allows the user to use the system anonymously, so the privacy of the system is assured.作者: Manifest 時間: 2025-3-22 04:25
Automated Essay Scoring System Based on Rubric,rmation for teachers, by using machine learning techniques such as support vector machine. We try to improve automated scoring algorithms and a variety of input essays in order to improve accuracy of classification over 90%.作者: Arroyo 時間: 2025-3-22 08:06 作者: Anonymous 時間: 2025-3-22 11:39
Coenraad Hartsuijker,J. W. Welleman, reusability and unsplittability) obtaining a very secure and powerful system. The dispute resolution protocol assures that all the parts are protected against other part’s attacks. Finally, the system allows the user to use the system anonymously, so the privacy of the system is assured.作者: 燈絲 時間: 2025-3-22 14:57
Coenraad Hartsuijker,J. W. Wellemanrmation for teachers, by using machine learning techniques such as support vector machine. We try to improve automated scoring algorithms and a variety of input essays in order to improve accuracy of classification over 90%.作者: 創(chuàng)造性 時間: 2025-3-22 19:30
1860-949X lutions adopted to solve them..This book features 12 of the conference’s most promising papers, written by authors who are expected to make important contributions to the field of computer and information science..978-3-319-87709-9978-3-319-64051-8Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 嫌惡 時間: 2025-3-22 23:36
Members Subject to Bending and Extension,n having meals for upper-limb-crippled people. They need system which is able to help them in having meals. There are already several types of robots for meal assist with interface operated with hand originally. The upper-limb-crippled people needs interface with simple operation. Therefore, in this作者: 無底 時間: 2025-3-23 05:10 作者: 易怒 時間: 2025-3-23 09:30 作者: 自戀 時間: 2025-3-23 11:39 作者: Gobble 時間: 2025-3-23 14:50
Coenraad Hartsuijker,J. W. WellemanTs) and unknown word translation mechanism. CSTs consist of a chunk in source-language, a string in target-language, and word alignment information. For unknown word translation, we used WordNet hypernym tree and English-Bengali dictionary. CSTs improved the wide-coverage by 57 points and quality by作者: intoxicate 時間: 2025-3-23 19:37
Coenraad Hartsuijker,J. W. Wellemanpositions using the intersections of the auxiliary and boundary lines of a given area. Experimental results demonstrate that the proposed method is capable of real-time processing and can determine effective label positions.作者: 翻布尋找 時間: 2025-3-24 00:51 作者: 讓步 時間: 2025-3-24 02:50 作者: 積云 時間: 2025-3-24 06:37
Coenraad Hartsuijker,J. W. Wellemane hand, these systems, called citypasses, are usually inefficiently implemented on smartcards. In the other hand, existing e-ticketing proposals are general purpose systems or created for its application to transport services and they are not adapted to the requirements of a citypass system. In this作者: fetter 時間: 2025-3-24 11:37
Members Subject to Bending and Extension,s. Evaluation is done by evaluators by inspecting user interface on each screen of an application against usability design principles or heuristics. The evaluation depends on judgment and experience of the evaluators whether they can spot the problems, and there are many heuristics to check against.作者: Cloudburst 時間: 2025-3-24 17:55 作者: exostosis 時間: 2025-3-24 22:43
https://doi.org/10.1007/978-1-4020-5483-9nt in the development process is needed in order to meet the required standards of mobile development. This paper supports technical software development activities, integrated software management, and software distribution management. It is used in the MTICASE environment (Method Tool Integration C作者: Rejuvenate 時間: 2025-3-25 02:58
Applied Computing & Information Technology978-3-319-64051-8Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: OGLE 時間: 2025-3-25 06:55
Coenraad Hartsuijker,J. W. Wellemanpositions using the intersections of the auxiliary and boundary lines of a given area. Experimental results demonstrate that the proposed method is capable of real-time processing and can determine effective label positions.作者: 有毒 時間: 2025-3-25 07:54 作者: ULCER 時間: 2025-3-25 12:12
https://doi.org/10.1007/978-3-319-64051-8Computational Intelligence; Applied Computing; Applied Information Technology; 5th ACIT; ACIT作者: PTCA635 時間: 2025-3-25 17:23 作者: 法律的瑕疵 時間: 2025-3-25 22:14 作者: 發(fā)誓放棄 時間: 2025-3-26 02:20 作者: Hangar 時間: 2025-3-26 04:23 作者: LAVA 時間: 2025-3-26 11:07 作者: 自作多情 時間: 2025-3-26 16:01
Members Subject to Bending and Extension,s of viewpoints. To show the validity of our method, computer experiments were conducted. We applied our method to three programs with relatively obvious behaviors, and we confirmed that the extracted features were correct by observing real behaviors of the programs.作者: exhibit 時間: 2025-3-26 19:34 作者: 很是迷惑 時間: 2025-3-27 00:36
Members Subject to Bending and Extension,d to be detected by a Kinect sensor connected to control unit based on Raspberry Pi. In addition, the proposed robot with orthogonal structure, that offers simple and stable motions, is able to provide foods to users smoothly. Thus, the system in compact size can complete the food providing effectively.作者: 有發(fā)明天才 時間: 2025-3-27 02:06 作者: 征稅 時間: 2025-3-27 09:04
https://doi.org/10.1007/978-1-4020-5763-2 signature scheme achieves more efficient possession proving than others, we provide concrete security proofs under the random oracle model to demonstrate that the proposed scheme satisfies the properties of anonymous credentials.作者: 聯(lián)邦 時間: 2025-3-27 13:20 作者: CHOIR 時間: 2025-3-27 17:19 作者: RUPT 時間: 2025-3-27 18:31
Binary Blockchain: Solving the Mining Congestion Problem by Dynamically Adjusting the Mining Capaciion period. In this paper, we describe how and when to divide or merge blockchains, how to solve the imbalanced mining problem, and how to handle the difficulty levels and rewards. We then show the simulation results comparing the performance of Binary blockchain and the traditional blockchain.作者: barium-study 時間: 2025-3-28 00:39 作者: 只有 時間: 2025-3-28 04:37
Mobile Development Tools and Method Integration,guages differently. This article shows how a similar set of principles, practices, and programming tools can be combined with recent work by MetaObjects to provide a framework for methods and tools as well as configuration.作者: Kernel 時間: 2025-3-28 09:30 作者: Spongy-Bone 時間: 2025-3-28 12:56 作者: 詳細目錄 時間: 2025-3-28 15:47
Book 2018ation science, and discusses the practical challenges encountered along the way and the solutions adopted to solve them..This book features 12 of the conference’s most promising papers, written by authors who are expected to make important contributions to the field of computer and information science..作者: recede 時間: 2025-3-28 19:49 作者: 性上癮 時間: 2025-3-29 02:44
Heuristic-Based Usability Evaluation Tool for Android Applications, are found. Although only small part of the heuristics can be checked automatically, an experiment shows that the tool can help save evaluation time and can discover usability problems that are missed by evaluators.作者: 協(xié)定 時間: 2025-3-29 04:37
Decision Tree Analysis in Game Informatics,s of viewpoints. To show the validity of our method, computer experiments were conducted. We applied our method to three programs with relatively obvious behaviors, and we confirmed that the extracted features were correct by observing real behaviors of the programs.作者: Wernickes-area 時間: 2025-3-29 09:46
Improve Example-Based Machine Translation Quality for Low-Resource Language Using Ontology, 48.81 points in human evaluation. Currently 64.29% of the test-set translations by the system were acceptable. The combined solutions of CSTs and unknown words generated 67.85% acceptable translations from the test-set. Unknown words mechanism improved translation quality by 3.56 points in human evaluation.作者: modish 時間: 2025-3-29 13:00
Meal-Assistance Robot Operated by Head Movement,n having meals for upper-limb-crippled people. They need system which is able to help them in having meals. There are already several types of robots for meal assist with interface operated with hand originally. The upper-limb-crippled people needs interface with simple operation. Therefore, in this作者: 土產(chǎn) 時間: 2025-3-29 16:38
Decision Tree Analysis in Game Informatics,hinmin use machine-learning techniques, such as the Monte Carlo method, predicting the program’s behavior is difficult. In this study, we extract the features of the player program through decision tree analysis. The features of programs are extracted by generating decision trees based on three type作者: engender 時間: 2025-3-29 23:16
Binary Blockchain: Solving the Mining Congestion Problem by Dynamically Adjusting the Mining Capacicryptocurrency. To mitigate the problem, a number of methods have been used in practice and new ideas have been proposed. However, it is not clear whether these schemes can cope with the ever-growing transaction load of cryptocurrencies in the long run. We propose a novel parallel mining method that作者: discord 時間: 2025-3-30 01:57 作者: Anterior 時間: 2025-3-30 06:51 作者: 永久 時間: 2025-3-30 09:27
A Fast Area Labeling Method Using Auxiliary Lines,positions using the intersections of the auxiliary and boundary lines of a given area. Experimental results demonstrate that the proposed method is capable of real-time processing and can determine effective label positions.