標(biāo)題: Titlebook: Advances in Computational Intelligence and Informatics; Proceedings of ICACI Raghavendra Rao Chillarige,Salvatore Distefano,San Conference [打印本頁] 作者: Assert 時間: 2025-3-21 20:07
書目名稱Advances in Computational Intelligence and Informatics影響因子(影響力)
書目名稱Advances in Computational Intelligence and Informatics影響因子(影響力)學(xué)科排名
書目名稱Advances in Computational Intelligence and Informatics網(wǎng)絡(luò)公開度
書目名稱Advances in Computational Intelligence and Informatics網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Advances in Computational Intelligence and Informatics被引頻次
書目名稱Advances in Computational Intelligence and Informatics被引頻次學(xué)科排名
書目名稱Advances in Computational Intelligence and Informatics年度引用
書目名稱Advances in Computational Intelligence and Informatics年度引用學(xué)科排名
書目名稱Advances in Computational Intelligence and Informatics讀者反饋
書目名稱Advances in Computational Intelligence and Informatics讀者反饋學(xué)科排名
作者: 推延 時間: 2025-3-21 22:44
Digital HR Strategy in the Modern Business Environment of Ukraine in Conditions of Uncertainty,n Ukraine are HR strategies aimed at using the opportunities identified in the SWOT analysis. The current research shows that digitalization and gamification, lifelong learning, HR branding and HR marketing, and leadership development are the most relevant in personnel management. The strategic dire作者: 議程 時間: 2025-3-22 01:05 作者: 去才蔑視 時間: 2025-3-22 06:20 作者: BILE 時間: 2025-3-22 11:58 作者: 憎惡 時間: 2025-3-22 15:22
Hybrid Method for Discovering DDOS Attack,hich fails under standard DDoS attacks, and SEVEN, a different approach based on adaptive and selective verification, also fail below post-flooding attacks of HTTP since the massive number of indicators used to convey payloads. Consequently, in order to develop the algorithm more accurately, we are 作者: 粘 時間: 2025-3-22 17:29 作者: Eviction 時間: 2025-3-22 21:20
Neural Networks and GPU-Based Weed Detection Under Varying Light Illumination, plants utilizing geometric features in the existing model. The primary objective is to improve the accuracy rate and to reduce the computational time. The proposed system is closed to be more accurate if convolution neural network and region-based convolutional neural network are used. One of the s作者: grudging 時間: 2025-3-23 02:29 作者: Cholagogue 時間: 2025-3-23 09:15 作者: 高深莫測 時間: 2025-3-23 13:17 作者: OUTRE 時間: 2025-3-23 16:25
Optimierung bei mehrfacher Zielsetzung,makers and cybersecurity experts must collaborate to develop and implement stronger security protocols, increase public awareness of connected car security risks, and develop new security standards and regulations.作者: 序曲 時間: 2025-3-23 20:53 作者: 共同確定為確 時間: 2025-3-23 22:33
Grundlagen des Operations Researchhich fails under standard DDoS attacks, and SEVEN, a different approach based on adaptive and selective verification, also fail below post-flooding attacks of HTTP since the massive number of indicators used to convey payloads. Consequently, in order to develop the algorithm more accurately, we are 作者: 仔細(xì)閱讀 時間: 2025-3-24 06:00 作者: Physiatrist 時間: 2025-3-24 09:55 作者: conflate 時間: 2025-3-24 14:10
Advances in Computational Intelligence and InformaticsProceedings of ICACI作者: 同位素 時間: 2025-3-24 14:53 作者: 種子 時間: 2025-3-24 19:26 作者: 無聊的人 時間: 2025-3-25 02:23 作者: obstinate 時間: 2025-3-25 04:44 作者: SPURN 時間: 2025-3-25 08:06 作者: Laconic 時間: 2025-3-25 13:18 作者: Factorable 時間: 2025-3-25 16:23 作者: 起波瀾 時間: 2025-3-25 22:01 作者: 額外的事 時間: 2025-3-26 00:40 作者: 一美元 時間: 2025-3-26 08:18 作者: Engaging 時間: 2025-3-26 10:27
Grundlagen des Operations Researchgital cameras and various communication interfaces. Manufacturers place the highest attention on ensuring quality. Component identification during manufacturing flow must be possible with machines that can use computer vision effectively. In this paper, we present an industrial image-based processing quality management system.作者: entreat 時間: 2025-3-26 16:40
Zum Wesen des Operations Research,nt, secure, transactional, and multicore-enabled mobile agent systems. The findings contribute to the advancement of mobile agent computing by offering a comprehensive understanding of the state of the art in these key areas.作者: 不可接觸 時間: 2025-3-26 19:28 作者: giggle 時間: 2025-3-26 23:29
Simulation und Warteschlangensysteme, This article lists several remote organization security assessments. These measures include FPR, FNR, discovery precision, throughput, latency, energy use, and adaptability. The overview discusses how these measurements can evaluate security conventions’ presentation and sufficiency.作者: 為敵 時間: 2025-3-27 04:05
Grundlagen linearer Optimierung,ical framework that balances innovation and individual rights, emphasizing the need for ongoing dialogue and policy considerations. Ultimately, this paper aims to foster a harmonious coexistence between ethics and innovation in the expanding domain of big data.作者: 貧窮地活 時間: 2025-3-27 06:42
IDSSA: An Intrusion Detection System with Self-adaptive Capabilities for Strengthening the IoT Netwn rules, identifying novel and sophisticated attacks beyond traditional signature-based systems. With an “IoT Contextual Analyzer” to reduce false positives, the self-adaptive IDS improves against emerging threats autonomously, outperforming static systems in detecting known and zero-day attacks, securing IoT networks efficiently.作者: Aspiration 時間: 2025-3-27 10:17 作者: GLIDE 時間: 2025-3-27 13:55
A Model for Quality Management in Industrial Products Based on Machine Learning and Image Processingital cameras and various communication interfaces. Manufacturers place the highest attention on ensuring quality. Component identification during manufacturing flow must be possible with machines that can use computer vision effectively. In this paper, we present an industrial image-based processing quality management system.作者: 抗生素 時間: 2025-3-27 17:54
Exploring the State of the Art in Mobile Agent Computing: A Comparative Study of Adaptive Fault Tolnt, secure, transactional, and multicore-enabled mobile agent systems. The findings contribute to the advancement of mobile agent computing by offering a comprehensive understanding of the state of the art in these key areas.作者: 音的強(qiáng)弱 時間: 2025-3-27 21:57
Water Pumping Requirement Prediction in Irrigation System Using Internet of Things-Assisted Machinented using 1 and 0, respectively. This work is carried out using cross-validation (CRV) by taking the number of folds (NFL) as 3, 5, and 10. These models are evaluated using classification accuracy (CA). This work is implemented using Python-based Orange 3.32.0.作者: 暗指 時間: 2025-3-28 03:29 作者: 愛了嗎 時間: 2025-3-28 09:03
,Big Data’s Ethical Frontier: Addressing Concerns in Data Acquisition and Analysis,ical framework that balances innovation and individual rights, emphasizing the need for ongoing dialogue and policy considerations. Ultimately, this paper aims to foster a harmonious coexistence between ethics and innovation in the expanding domain of big data.作者: 大看臺 時間: 2025-3-28 12:05 作者: magnanimity 時間: 2025-3-28 15:09
Grundlagen des Operations ResearchChatGPT‘s security. This research contributes to the growing body of knowledge on conversational AI security, stressing the importance of proactive measures to protect user data and maintain a secure conversational experience. It also highlights the necessity for ongoing security assessments as AI technology advances.作者: 剛開始 時間: 2025-3-28 20:26
Leveraging Bidirectional Encoder Representations from Transformers (BERT) for Enhanced Sentiment An BERT in improving sentiment comprehension and provides information for wise decision-making. BERT is an open-source machine learning platform for Natural Language Processing (NLP). BERT aims to help computers understand the meaning of ambiguous words in the text by using the surrounding neighboring text to construct meaning.作者: DRAFT 時間: 2025-3-29 01:58 作者: Incise 時間: 2025-3-29 05:17
Optimizing Complex Challenges: Harnessing the Power of Genetic Algorithms and the Nelder-Mead Simpls optimization challenges across benchmark functions and real-world problems. By synergistically combining the exploration capabilities of the GA and the local refinement prowess of the NMA, our approach aims to provide a robust and versatile solution for a wide range of optimization scenarios. We d作者: 樹膠 時間: 2025-3-29 09:13 作者: Noisome 時間: 2025-3-29 15:07 作者: oblique 時間: 2025-3-29 18:17
Privacy and Security Aspects of Indian Population While Using Online Social Network: An Analysis,kedIn, Google+, Myspace are having millions of users across the globe. The user base of Facebook alone is more than 3 Billion. The number of users of all such OSNs is increasing tremendously in India as well as around the world. This paper focuses on the points like whether the user has read and und作者: MANIA 時間: 2025-3-29 21:11
Digital HR Strategy in the Modern Business Environment of Ukraine in Conditions of Uncertainty,pread of the COVID-19 pandemic made the shift to remote employment a necessity, thus the research into the issues of forming a digital strategy and digitization of personnel management has become especially relevant. The generalization of trends and the development of the most relevant personnel man作者: 易于出錯 時間: 2025-3-30 03:13 作者: 頑固 時間: 2025-3-30 08:03 作者: 類人猿 時間: 2025-3-30 11:30 作者: innate 時間: 2025-3-30 16:14
Leveraging Bidirectional Encoder Representations from Transformers (BERT) for Enhanced Sentiment An. Sentiment analysis models can now capture complex emotions and context, thanks to BERT‘s contextual understanding and cutting-edge machine learning techniques like transfer learning. We group models according to domains and learning paradigms and then display their results. By bridging the gap bet作者: Expediency 時間: 2025-3-30 20:36
Securing the Future of Connected Cars: Investigating Vulnerabilities and Preventing Cyberattacks,s popularity has come with a significant downside: the growing threat of cyberattacks. This research provides a comprehensive analysis of the various types of attacks that connected cars are vulnerable to, such as remote access, denial-of-service, and malware attacks. The study also examines the met作者: 效果 時間: 2025-3-30 23:30
Smart Surveillance Using OpenCV,d their property. Many different sensors are used in video surveillance cameras in modern security systems. This initiative seeks to provide you with suggestions on how to make sure that your property is protected and secure. When this technology recognizes an unfamiliar face from a photograph of an作者: Nefarious 時間: 2025-3-31 04:54
Hyperspectral Band Selection Considering Spectral and Spatial Information,hyperspectral images. A hyperspectral image’s extracted features have minimal physical relevance; however, the chosen features (or bands) can maintain the original spectral information. As a result, band selection is increasingly frequently utilized for hyperspectral images. In this article, we offe作者: Fibrin 時間: 2025-3-31 08:43 作者: Pituitary-Gland 時間: 2025-3-31 11:49
Hybrid Method for Discovering DDOS Attack, connection requests that prevent the genuine user from accessing the system. To train a model for the purpose of identifying and categorizing the various kinds of DDoS attacks, this paper aims to design a hybrid algorithm that combines several machine learning techniques. Comparing the hybrid model作者: 枯萎將要 時間: 2025-3-31 14:10
A Novel Chaotic Map-Based Noise-Resistant Image Encryption Scheme for Medical Images,, medical images are crucial. The images comprise sensitive diagnostic procedures such as X-rays, ultrasounds, brain scans, and MRIs of patients. Due to insecurities in the transmission and storage of these images in hospitals, unauthorized parties may get access to them. When it comes to safeguardi作者: 準(zhǔn)則 時間: 2025-3-31 17:42
Survey of Attacks, Detection Techniques, and Evaluation Metrics in Wireless Sensor Networks,been identified, and evaluation measurements and conventions have been developed to neutralize them. In this review study, attacks on various levels, evaluation measurements, and norms in remote organizations will be detailed. First, the article examines attacks on the real, information interface, n作者: BRAVE 時間: 2025-3-31 23:16 作者: Corporeal 時間: 2025-4-1 04:31
Evaluating Security Risks and Protecting Conversational AI: An in-Depth Vulnerability Assessment anas these AI chat systems become more integrated into daily life, ensuring their security is paramount. This research paper conducts a thorough security assessment of ChatGPT, using static and dynamic testing. The study uncovers significant vulnerabilities, including potential data leaks and suscepti作者: 遣返回國 時間: 2025-4-1 09:08
Neural Networks and GPU-Based Weed Detection Under Varying Light Illumination,chniques were used in agriculture to remove unwanted plants or weeds. Since weeds are a major cause of crop yield loss, they compete with productive crops for soil, nutrients, and sunshine. As a result, safer and more effective herbicide products are always being developed. Today, uniform herbicide 作者: 大量 時間: 2025-4-1 14:07
https://doi.org/10.1007/978-981-97-4727-6Computational Intelligence; Soft Computing; Computer Network and Emerging Technologies; Cloud Computing作者: 歡騰 時間: 2025-4-1 14:55
978-981-97-4726-9The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: sperse 時間: 2025-4-1 22:30
Advances in Computational Intelligence and Informatics978-981-97-4727-6Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: 休閑 時間: 2025-4-1 22:53 作者: 夾死提手勢 時間: 2025-4-2 06:16
Grundlagen des Operations Researchpplication offloading has emerged as a technique to enhance the performance and efficiency of mobile devices. Mobile apps offloading defines the operation of resource-transferring tasks from a smart mobile device to distant servers. For reducing the hard task on the mobile device. In other words, mo