標題: Titlebook: Applied Computing and Information Technology; Roger Lee Book 2017 Springer International Publishing AG 2017 Computational Intelligence.App [打印本頁] 作者: 有靈感 時間: 2025-3-21 16:14
書目名稱Applied Computing and Information Technology影響因子(影響力)
書目名稱Applied Computing and Information Technology影響因子(影響力)學科排名
書目名稱Applied Computing and Information Technology網(wǎng)絡(luò)公開度
書目名稱Applied Computing and Information Technology網(wǎng)絡(luò)公開度學科排名
書目名稱Applied Computing and Information Technology被引頻次
書目名稱Applied Computing and Information Technology被引頻次學科排名
書目名稱Applied Computing and Information Technology年度引用
書目名稱Applied Computing and Information Technology年度引用學科排名
書目名稱Applied Computing and Information Technology讀者反饋
書目名稱Applied Computing and Information Technology讀者反饋學科排名
作者: 兵團 時間: 2025-3-21 21:10
A Replicated Study on Relationship Between Code Quality and Method Comments,ents could be a sign of problematic methods. Other studies also show that source code files with comments confessing a technical debt (called self-admitted technical debt, SATD) could be fixed more times. The former studies only considered the amount of comments, and their findings might be due to a作者: 國家明智 時間: 2025-3-22 02:02
A Predictive Model for Standardized Test Performance in Michigan Schools,tandardized test. In this paper, we build a predictive model as an early warning system for schools that may fall below the state average in building level average proficiency in the Michigan Educational Assessment Program (MEAP). We utilize data mining techniques to develop various decision tree mo作者: emulsify 時間: 2025-3-22 08:23 作者: 原諒 時間: 2025-3-22 12:23
Interactive Mobile Applications Development Using Adapting Component Model,they can dynamically adapt their extra functional behavior, in order to optimize the experience perceived by their users. In this paper we discuss some of the problems of the current mobile based human management applications and show how the introduction of adaptive CBD (Component Based Development作者: 規(guī)范要多 時間: 2025-3-22 16:46 作者: Affluence 時間: 2025-3-22 17:56
User Evaluation Prediction Models Based on Conjoint Analysis and Neural Networks for Interactive Ev) implemented by interactive genetic algorithm and interactive differential evolution. In addition, the facial expression generation system described in this paper simulates user evaluation based on personalized models and generates images of happy faces and sad faces automatically as an example. IE作者: babble 時間: 2025-3-23 01:14
Emotional Video Scene Retrieval Using Multilayer Convolutional Network,oposed method will be useful to retrieve interesting scenes from lifelog videos. When an impressive event occurs, a certain facial expression will be observed in a person in the video. It is, therefore, important for the impressive scene retrieval to precisely recognize the facial expression of the 作者: Dysarthria 時間: 2025-3-23 04:21 作者: APEX 時間: 2025-3-23 05:33
Practical Uses of Memory Storage Extension,olatile (NV) memory is also considered to be close. While memory storage provides much higher performance than the current block storage devices, such as SSDs and HDDs, its capacity tends to be limited. Such a limitation makes it difficult to adapt memory storage for mass storage; thus, its uses hav作者: ANTIC 時間: 2025-3-23 11:57 作者: 易怒 時間: 2025-3-23 16:24 作者: Muffle 時間: 2025-3-23 20:55
Empowering MOOCs Through Course Certifying Agency Framework,professor’s courses as MOOC. However, when utilizing the knowledge from MOOCs, learners need to go through a number of hurdles—getting course completion certification (MS Global Learning Consortum: An example of LIP accessibility information, IMS Global Learning Consortium Inc., 2001, [.]) from vari作者: 具體 時間: 2025-3-24 02:00
https://doi.org/10.1007/978-3-319-51472-7Computational Intelligence; Applied Computing; Applied Information Technology; 4th ACIT; ACIT作者: magnanimity 時間: 2025-3-24 06:01 作者: bromide 時間: 2025-3-24 08:14
Gas Pressure and Hydrostatic Pressure,research that has been undertaken to define the term business sustainability by analyzing multiple definitions proposed in the existing literature. The definitions of business sustainability have undergone a process of abstractive decomposition which decomposes the definition into pieces and then co作者: 牙齒 時間: 2025-3-24 12:40
Gas Pressure and Hydrostatic Pressure,ents could be a sign of problematic methods. Other studies also show that source code files with comments confessing a technical debt (called self-admitted technical debt, SATD) could be fixed more times. The former studies only considered the amount of comments, and their findings might be due to a作者: LAVA 時間: 2025-3-24 15:14
Gas Pressure and Hydrostatic Pressure,tandardized test. In this paper, we build a predictive model as an early warning system for schools that may fall below the state average in building level average proficiency in the Michigan Educational Assessment Program (MEAP). We utilize data mining techniques to develop various decision tree mo作者: BULLY 時間: 2025-3-24 19:45 作者: radiograph 時間: 2025-3-25 00:52
https://doi.org/10.1007/978-1-4020-5483-9they can dynamically adapt their extra functional behavior, in order to optimize the experience perceived by their users. In this paper we discuss some of the problems of the current mobile based human management applications and show how the introduction of adaptive CBD (Component Based Development作者: 搜集 時間: 2025-3-25 03:25 作者: configuration 時間: 2025-3-25 08:34
https://doi.org/10.1007/978-1-4020-5483-9) implemented by interactive genetic algorithm and interactive differential evolution. In addition, the facial expression generation system described in this paper simulates user evaluation based on personalized models and generates images of happy faces and sad faces automatically as an example. IE作者: CREEK 時間: 2025-3-25 12:53
Gas Pressure and Hydrostatic Pressure,oposed method will be useful to retrieve interesting scenes from lifelog videos. When an impressive event occurs, a certain facial expression will be observed in a person in the video. It is, therefore, important for the impressive scene retrieval to precisely recognize the facial expression of the 作者: ironic 時間: 2025-3-25 17:12
https://doi.org/10.1007/978-1-4020-5483-9f computing and hardware resources for load distribution and request delays. As a result, ordinary users and website visitors experience timeouts, captchas, and low-speed connections. In this paper, we propose a highly inventive multilayer system for protection against DDoS in the cloud that utilize作者: Aboveboard 時間: 2025-3-25 20:29 作者: Endometrium 時間: 2025-3-26 01:21
Gas Pressure and Hydrostatic Pressure,on, it can also be extremely difficult. In fact, development teams often overcompensate in the early stages by devoting a great deal of time to ideation and design while forgetting to put an equally important amount of effort into back-end operations, including key stages of the process such as main作者: CONE 時間: 2025-3-26 04:20
https://doi.org/10.1007/978-1-4020-5483-9ed to solve several optimization problems. However, It still suffers from some drawbacks such as easily getting stuck at local optima and slow speed of convergence. This paper proposes a new hybrid variant of discrete firefly algorithm, called HDFA, to solve traveling salesman problem (TSP). In the 作者: 巧辦法 時間: 2025-3-26 09:48 作者: drusen 時間: 2025-3-26 15:51 作者: 駭人 時間: 2025-3-26 20:23
Roger LeePresents recent research in Applied Computing and Information Technology.Includes the edited outcome of the 4th International Conference on Applied Computing and Information Technology(ACIT 2016), hel作者: 坦白 時間: 2025-3-27 00:39 作者: 前兆 時間: 2025-3-27 04:22 作者: 符合規(guī)定 時間: 2025-3-27 08:41
Business Sustainability Conceptualization,technological support are paramount for ensuring business sustainability. This study’s significance is the contribution of a newer and comprehensive version of the definition the term business sustainability. The main conceptual contribution of this paper is its holistic presentation of the concept 作者: Emasculate 時間: 2025-3-27 12:04 作者: 負擔 時間: 2025-3-27 15:43 作者: 截斷 時間: 2025-3-27 21:04 作者: 有權(quán) 時間: 2025-3-28 00:24 作者: 截斷 時間: 2025-3-28 05:33
Practical Uses of Memory Storage Extension,ing block storage as backing storage. MSX was implemented in the Linux operating system kernel. This paper discusses the several practical uses of MSX in cloud computing and also in the fundamental operating system architecture.作者: 狗舍 時間: 2025-3-28 08:10 作者: 嚙齒動物 時間: 2025-3-28 13:39 作者: 新鮮 時間: 2025-3-28 15:25
Empowering MOOCs Through Course Certifying Agency Framework,) are adopted and expanded to describe relate MOOC course profiles, learner profiles, learning goals, and related skill sets. It enables matching of qualified learner profiles for a job position and/or to identify a set of related MOOC course profiles for some learning goal. The potential employers 作者: 萬花筒 時間: 2025-3-28 21:00
1860-949X er rigorous rounds of review. This book captures 11 of the conference’s most promising papers, and the readers impatiently await the important contributions that they know these authors are going to bring to th978-3-319-84659-0978-3-319-51472-7Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 神經(jīng) 時間: 2025-3-29 02:58 作者: 幻想 時間: 2025-3-29 03:41
Gas Pressure and Hydrostatic Pressure,e effective to spot fix-prone files and methods than the non-SATD comments. .: Source code comments other than SATD comments could still be a sign of problematic code. This study demonstrates a need for further analysis on the contents of comments and its relation to code quality.作者: Mindfulness 時間: 2025-3-29 10:15
https://doi.org/10.1007/978-1-4020-5483-9g from suitable base classes, without necessarily requiring any changes to users of these resources. We describe the mobile applications frameworks and adaptive component model, which we have developed, based upon these ideas, and show, through a prototype implementation, how we have used the model 作者: 外表讀作 時間: 2025-3-29 12:00 作者: slipped-disk 時間: 2025-3-29 16:55
https://doi.org/10.1007/978-1-4020-5483-9the traffic load by dispatching the traffic to the proxy, if required, and the fifth layer establishes the need for port hopping between the proxy and the target website if the attack targets a specific web-application. A series of experiments were performed and the results demonstrate that this mul作者: 咆哮 時間: 2025-3-29 23:29
https://doi.org/10.1007/978-1-4020-5483-9ing block storage as backing storage. MSX was implemented in the Linux operating system kernel. This paper discusses the several practical uses of MSX in cloud computing and also in the fundamental operating system architecture.作者: 戰(zhàn)勝 時間: 2025-3-30 01:00 作者: 600 時間: 2025-3-30 06:05 作者: 圓桶 時間: 2025-3-30 12:09
https://doi.org/10.1007/978-1-4020-5483-9) are adopted and expanded to describe relate MOOC course profiles, learner profiles, learning goals, and related skill sets. It enables matching of qualified learner profiles for a job position and/or to identify a set of related MOOC course profiles for some learning goal. The potential employers 作者: 吊胃口 時間: 2025-3-30 12:56 作者: squander 時間: 2025-3-30 16:51 作者: 出沒 時間: 2025-3-30 21:07