派博傳思國際中心

標(biāo)題: Titlebook: Applied Computing & Information Technology; Roger Lee Book 2018 Springer International Publishing AG 2018 Computational Intelligence.Appli [打印本頁]

作者: 教條    時間: 2025-3-21 16:46
書目名稱Applied Computing & Information Technology影響因子(影響力)




書目名稱Applied Computing & Information Technology影響因子(影響力)學(xué)科排名




書目名稱Applied Computing & Information Technology網(wǎng)絡(luò)公開度




書目名稱Applied Computing & Information Technology網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Applied Computing & Information Technology被引頻次




書目名稱Applied Computing & Information Technology被引頻次學(xué)科排名




書目名稱Applied Computing & Information Technology年度引用




書目名稱Applied Computing & Information Technology年度引用學(xué)科排名




書目名稱Applied Computing & Information Technology讀者反饋




書目名稱Applied Computing & Information Technology讀者反饋學(xué)科排名





作者: nettle    時間: 2025-3-21 20:49
mCITYPASS: Privacy-Preserving Secure Access to Federated Touristic Services with Mobile Devices,, reusability and unsplittability) obtaining a very secure and powerful system. The dispute resolution protocol assures that all the parts are protected against other part’s attacks. Finally, the system allows the user to use the system anonymously, so the privacy of the system is assured.
作者: Manifest    時間: 2025-3-22 04:25
Automated Essay Scoring System Based on Rubric,rmation for teachers, by using machine learning techniques such as support vector machine. We try to improve automated scoring algorithms and a variety of input essays in order to improve accuracy of classification over 90%.
作者: Arroyo    時間: 2025-3-22 08:06

作者: Anonymous    時間: 2025-3-22 11:39
Coenraad Hartsuijker,J. W. Welleman, reusability and unsplittability) obtaining a very secure and powerful system. The dispute resolution protocol assures that all the parts are protected against other part’s attacks. Finally, the system allows the user to use the system anonymously, so the privacy of the system is assured.
作者: 燈絲    時間: 2025-3-22 14:57
Coenraad Hartsuijker,J. W. Wellemanrmation for teachers, by using machine learning techniques such as support vector machine. We try to improve automated scoring algorithms and a variety of input essays in order to improve accuracy of classification over 90%.
作者: 創(chuàng)造性    時間: 2025-3-22 19:30
1860-949X lutions adopted to solve them..This book features 12 of the conference’s most promising papers, written by authors who are expected to make important contributions to the field of computer and information science..978-3-319-87709-9978-3-319-64051-8Series ISSN 1860-949X Series E-ISSN 1860-9503
作者: 嫌惡    時間: 2025-3-22 23:36
Members Subject to Bending and Extension,n having meals for upper-limb-crippled people. They need system which is able to help them in having meals. There are already several types of robots for meal assist with interface operated with hand originally. The upper-limb-crippled people needs interface with simple operation. Therefore, in this
作者: 無底    時間: 2025-3-23 05:10

作者: 易怒    時間: 2025-3-23 09:30

作者: 自戀    時間: 2025-3-23 11:39

作者: Gobble    時間: 2025-3-23 14:50
Coenraad Hartsuijker,J. W. WellemanTs) and unknown word translation mechanism. CSTs consist of a chunk in source-language, a string in target-language, and word alignment information. For unknown word translation, we used WordNet hypernym tree and English-Bengali dictionary. CSTs improved the wide-coverage by 57 points and quality by
作者: intoxicate    時間: 2025-3-23 19:37
Coenraad Hartsuijker,J. W. Wellemanpositions using the intersections of the auxiliary and boundary lines of a given area. Experimental results demonstrate that the proposed method is capable of real-time processing and can determine effective label positions.
作者: 翻布尋找    時間: 2025-3-24 00:51

作者: 讓步    時間: 2025-3-24 02:50

作者: 積云    時間: 2025-3-24 06:37
Coenraad Hartsuijker,J. W. Wellemane hand, these systems, called citypasses, are usually inefficiently implemented on smartcards. In the other hand, existing e-ticketing proposals are general purpose systems or created for its application to transport services and they are not adapted to the requirements of a citypass system. In this
作者: fetter    時間: 2025-3-24 11:37
Members Subject to Bending and Extension,s. Evaluation is done by evaluators by inspecting user interface on each screen of an application against usability design principles or heuristics. The evaluation depends on judgment and experience of the evaluators whether they can spot the problems, and there are many heuristics to check against.
作者: Cloudburst    時間: 2025-3-24 17:55

作者: exostosis    時間: 2025-3-24 22:43
https://doi.org/10.1007/978-1-4020-5483-9nt in the development process is needed in order to meet the required standards of mobile development. This paper supports technical software development activities, integrated software management, and software distribution management. It is used in the MTICASE environment (Method Tool Integration C
作者: Rejuvenate    時間: 2025-3-25 02:58
Applied Computing & Information Technology978-3-319-64051-8Series ISSN 1860-949X Series E-ISSN 1860-9503
作者: OGLE    時間: 2025-3-25 06:55
Coenraad Hartsuijker,J. W. Wellemanpositions using the intersections of the auxiliary and boundary lines of a given area. Experimental results demonstrate that the proposed method is capable of real-time processing and can determine effective label positions.
作者: 有毒    時間: 2025-3-25 07:54

作者: ULCER    時間: 2025-3-25 12:12
https://doi.org/10.1007/978-3-319-64051-8Computational Intelligence; Applied Computing; Applied Information Technology; 5th ACIT; ACIT
作者: PTCA635    時間: 2025-3-25 17:23

作者: 法律的瑕疵    時間: 2025-3-25 22:14

作者: 發(fā)誓放棄    時間: 2025-3-26 02:20

作者: Hangar    時間: 2025-3-26 04:23

作者: LAVA    時間: 2025-3-26 11:07

作者: 自作多情    時間: 2025-3-26 16:01
Members Subject to Bending and Extension,s of viewpoints. To show the validity of our method, computer experiments were conducted. We applied our method to three programs with relatively obvious behaviors, and we confirmed that the extracted features were correct by observing real behaviors of the programs.
作者: exhibit    時間: 2025-3-26 19:34

作者: 很是迷惑    時間: 2025-3-27 00:36
Members Subject to Bending and Extension,d to be detected by a Kinect sensor connected to control unit based on Raspberry Pi. In addition, the proposed robot with orthogonal structure, that offers simple and stable motions, is able to provide foods to users smoothly. Thus, the system in compact size can complete the food providing effectively.
作者: 有發(fā)明天才    時間: 2025-3-27 02:06

作者: 征稅    時間: 2025-3-27 09:04
https://doi.org/10.1007/978-1-4020-5763-2 signature scheme achieves more efficient possession proving than others, we provide concrete security proofs under the random oracle model to demonstrate that the proposed scheme satisfies the properties of anonymous credentials.
作者: 聯(lián)邦    時間: 2025-3-27 13:20

作者: CHOIR    時間: 2025-3-27 17:19

作者: RUPT    時間: 2025-3-27 18:31
Binary Blockchain: Solving the Mining Congestion Problem by Dynamically Adjusting the Mining Capaciion period. In this paper, we describe how and when to divide or merge blockchains, how to solve the imbalanced mining problem, and how to handle the difficulty levels and rewards. We then show the simulation results comparing the performance of Binary blockchain and the traditional blockchain.
作者: barium-study    時間: 2025-3-28 00:39

作者: 只有    時間: 2025-3-28 04:37
Mobile Development Tools and Method Integration,guages differently. This article shows how a similar set of principles, practices, and programming tools can be combined with recent work by MetaObjects to provide a framework for methods and tools as well as configuration.
作者: Kernel    時間: 2025-3-28 09:30

作者: Spongy-Bone    時間: 2025-3-28 12:56

作者: 詳細目錄    時間: 2025-3-28 15:47
Book 2018ation science, and discusses the practical challenges encountered along the way and the solutions adopted to solve them..This book features 12 of the conference’s most promising papers, written by authors who are expected to make important contributions to the field of computer and information science..
作者: recede    時間: 2025-3-28 19:49

作者: 性上癮    時間: 2025-3-29 02:44
Heuristic-Based Usability Evaluation Tool for Android Applications, are found. Although only small part of the heuristics can be checked automatically, an experiment shows that the tool can help save evaluation time and can discover usability problems that are missed by evaluators.
作者: 協(xié)定    時間: 2025-3-29 04:37
Decision Tree Analysis in Game Informatics,s of viewpoints. To show the validity of our method, computer experiments were conducted. We applied our method to three programs with relatively obvious behaviors, and we confirmed that the extracted features were correct by observing real behaviors of the programs.
作者: Wernickes-area    時間: 2025-3-29 09:46
Improve Example-Based Machine Translation Quality for Low-Resource Language Using Ontology, 48.81 points in human evaluation. Currently 64.29% of the test-set translations by the system were acceptable. The combined solutions of CSTs and unknown words generated 67.85% acceptable translations from the test-set. Unknown words mechanism improved translation quality by 3.56 points in human evaluation.
作者: modish    時間: 2025-3-29 13:00
Meal-Assistance Robot Operated by Head Movement,n having meals for upper-limb-crippled people. They need system which is able to help them in having meals. There are already several types of robots for meal assist with interface operated with hand originally. The upper-limb-crippled people needs interface with simple operation. Therefore, in this
作者: 土產(chǎn)    時間: 2025-3-29 16:38
Decision Tree Analysis in Game Informatics,hinmin use machine-learning techniques, such as the Monte Carlo method, predicting the program’s behavior is difficult. In this study, we extract the features of the player program through decision tree analysis. The features of programs are extracted by generating decision trees based on three type
作者: engender    時間: 2025-3-29 23:16
Binary Blockchain: Solving the Mining Congestion Problem by Dynamically Adjusting the Mining Capacicryptocurrency. To mitigate the problem, a number of methods have been used in practice and new ideas have been proposed. However, it is not clear whether these schemes can cope with the ever-growing transaction load of cryptocurrencies in the long run. We propose a novel parallel mining method that
作者: discord    時間: 2025-3-30 01:57

作者: Anterior    時間: 2025-3-30 06:51

作者: 永久    時間: 2025-3-30 09:27
A Fast Area Labeling Method Using Auxiliary Lines,positions using the intersections of the auxiliary and boundary lines of a given area. Experimental results demonstrate that the proposed method is capable of real-time processing and can determine effective label positions.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
申扎县| 萨迦县| 大冶市| 宁强县| 清流县| 密山市| 托克逊县| 新竹县| 屏山县| 吴忠市| 清流县| 五寨县| 岚皋县| 拉孜县| 新乡市| 临清市| 当涂县| 永济市| 尉犁县| 措勤县| 宾阳县| 余江县| 昌平区| 云安县| 伊金霍洛旗| 辽宁省| 潞西市| 宁海县| 安多县| 裕民县| 云霄县| 巫山县| 博湖县| 黔西| 漯河市| 隆昌县| 安多县| 东源县| 车险| 太原市| 韩城市|