作者: 無價值 時間: 2025-3-21 21:34
978-981-19-7348-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: Infantry 時間: 2025-3-22 00:29
Computational Intelligence978-981-19-7346-8Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 欺騙世家 時間: 2025-3-22 07:52 作者: 自傳 時間: 2025-3-22 10:12
Lecture Notes in Electrical Engineeringhttp://image.papertrans.cn/c/image/232363.jpg作者: Critical 時間: 2025-3-22 13:56 作者: Critical 時間: 2025-3-22 21:01
Asymptotics of Integrated Processested by malicious nodes in WSN at the same time, which leads to a black hole (BH) attack in the system. The BH attacks block the data instead of forwarding it to the destination. In order to overcome this, the proposed method adopts deep learning-based scheme to detect BH attacks in WSN. The proposed作者: 史前 時間: 2025-3-22 22:36 作者: jaunty 時間: 2025-3-23 02:27 作者: attenuate 時間: 2025-3-23 09:05
Springer Texts in Business and Economics-processing of data. The paper elaborates the concept of CNN with architectural details and their application in medical imaging to resolve the problems of detection, segmentation and classification. Limited dataset, scarcity of annotated data, non-standardized evaluation metric and model biasing ar作者: 爆炸 時間: 2025-3-23 10:50
https://doi.org/10.1007/978-3-662-64711-0rawlers and take document similarity algorithms for selection. We take a different lean resource approach by applying traditional search metrics with a relatively large (more than 100 search terms) ‘bag of domain words’ approach on the colossal clean crawled corpus. This approach enables one to buil作者: 微塵 時間: 2025-3-23 14:50 作者: 沉著 時間: 2025-3-23 21:50 作者: 緯線 時間: 2025-3-23 23:26 作者: 不易燃 時間: 2025-3-24 05:29 作者: prosperity 時間: 2025-3-24 08:34
https://doi.org/10.1007/978-94-015-9277-2s in identifying the items for the user and might be worthful for creating buying options that are purely rely on recommender. Especially, in the case of a book recommender system, it is necessary to recommend the books to learn in conformity with the learning environment of the learner. The prime o作者: 來就得意 時間: 2025-3-24 11:46 作者: 黑豹 時間: 2025-3-24 17:36 作者: encomiast 時間: 2025-3-24 22:51
Renata Cioczek-Georges,Murad S. Taqquther. People who sell goods or services on P2P platforms are often ordinary citizens who do not have sophisticated marketing knowledge or skills. It is important that service providers are empowered to know how to market themselves since they are competing globally. In a review of accommodation P2P 作者: Critical 時間: 2025-3-25 02:56 作者: 鋸齒狀 時間: 2025-3-25 03:53
Stochastic Processes and Their Applicationsnt years, predictive modeling using ensemble learning techniques has increased the attention of researchers to develop competent models for various predictive tasks. Ensemble techniques combine the predictions of multiple models to yield a single consolidated decision. Thus, predictive modeling with作者: Cirrhosis 時間: 2025-3-25 08:35 作者: AGONY 時間: 2025-3-25 12:40
Phase Dependent Population Growth Models to increase port efficiency by integrating state-of-the-art technology with port management and predicting a ship’s estimated time of arrival (ETA) is a critical step towards establishing a smart port system. This study aims to develop a data-driven model to estimate the ETA of incoming ships to Po作者: 形容詞 時間: 2025-3-25 16:45
Ann-Lee Wang,David Vere-Jones,Xiao-gu Zhengh area for security researchers. Several proposed techniques partially achieve the automatic test case generation of detecting security issues that target specific programming languages or API types. This review paper performs a comparative analysis of research papers published during 2010–21 specif作者: AROMA 時間: 2025-3-25 21:47
Computational Modeling of Multilevel Organizational Learning: From Conceptual to Computational Mech of organizational learning. It is discussed how various conceptual mechanisms in multilevel organizational learning as identified in the literature, can be formalized by computational mechanisms which provide mathematical formalizations that enable computer simulation. The formalizations have been 作者: 眨眼 時間: 2025-3-26 00:59
Deep Learning-Based Black Hole Detection Model for WSN in Smart Grid,ted by malicious nodes in WSN at the same time, which leads to a black hole (BH) attack in the system. The BH attacks block the data instead of forwarding it to the destination. In order to overcome this, the proposed method adopts deep learning-based scheme to detect BH attacks in WSN. The proposed作者: Cholecystokinin 時間: 2025-3-26 06:31 作者: fertilizer 時間: 2025-3-26 09:11
Learning to Transfer Knowledge Between Datasets to Enhance Intrusion Detection Systems,ever, by splitting the control layer and data layer, the SDN architecture also attracts numerous types of attacks such as spoofing or information disclosure. In the recent years, a few research articles coped with the security problem by introducing open datasets and classification techniques to det作者: callous 時間: 2025-3-26 13:05 作者: orthodox 時間: 2025-3-26 19:55
Building Web-Based Subject-Specific Corpora on the Desktop: Evaluation of Search Metrics,rawlers and take document similarity algorithms for selection. We take a different lean resource approach by applying traditional search metrics with a relatively large (more than 100 search terms) ‘bag of domain words’ approach on the colossal clean crawled corpus. This approach enables one to buil作者: Graduated 時間: 2025-3-27 00:44 作者: debris 時間: 2025-3-27 04:27
Aerial Object Detection Using Deep Learning: A Review,tional methods made use of machine learning algorithms that involved hand-made features. At present, deep learning models have surpassed the conventional machine learning models. Some of the major problems faced in aerial object detection are angle shift and the small sizes of objects in aerial imag作者: arbovirus 時間: 2025-3-27 08:21 作者: Scleroderma 時間: 2025-3-27 12:59 作者: inhibit 時間: 2025-3-27 16:42
Recommender System Based on Network Structure Link Analysis Technique Through Community Detection is in identifying the items for the user and might be worthful for creating buying options that are purely rely on recommender. Especially, in the case of a book recommender system, it is necessary to recommend the books to learn in conformity with the learning environment of the learner. The prime o作者: conspicuous 時間: 2025-3-27 21:35 作者: 指數(shù) 時間: 2025-3-27 23:57
Multivariate Partially Blind Signature Scheme, Partial blind signature is used to tackle this problem using a piece of common information shared between the signer and the user. In the family of multivariate public key cryptography, there is no partially blind signature till now. We here design the first multivariate partially blind signature d作者: Emg827 時間: 2025-3-28 05:00
Topic Analysis and Visualisation of Peer-to-Peer Platform Data: An Airbnb Case Study,ther. People who sell goods or services on P2P platforms are often ordinary citizens who do not have sophisticated marketing knowledge or skills. It is important that service providers are empowered to know how to market themselves since they are competing globally. In a review of accommodation P2P 作者: jungle 時間: 2025-3-28 09:59
Pandemic-Induced Behavioral Change in Mobile Banking Adoption: An Opportunity for Indian Banking Inbanking industry. The study has further identified and analyzed the usage pattern of Indian customers for mobile banking/online banking services in the pre-pandemic phase and progression of Indian customers for mobile banking/online banking services during the pandemic. Secondary data has been used 作者: outset 時間: 2025-3-28 13:04 作者: RENAL 時間: 2025-3-28 16:41 作者: 不怕任性 時間: 2025-3-28 20:26 作者: 無法取消 時間: 2025-3-28 23:48
A Critical Review on Search-Based Security Testing of Programs,h area for security researchers. Several proposed techniques partially achieve the automatic test case generation of detecting security issues that target specific programming languages or API types. This review paper performs a comparative analysis of research papers published during 2010–21 specif作者: GIST 時間: 2025-3-29 05:39
1876-1100 IT architectures. The book will be useful to researchers, practitioners, and policymakers working in information technology..978-981-19-7348-2978-981-19-7346-8Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 暗諷 時間: 2025-3-29 07:46 作者: libertine 時間: 2025-3-29 12:50
https://doi.org/10.1007/978-3-662-64711-0 algorithm, Okapi BM25. This demonstrates that the performance of search metrics using a relatively larger number of search key words (> 100) is different than when a small set of search key words is used. We also demonstrate how to optimize the free parameters for Okapi BM25.作者: Subjugate 時間: 2025-3-29 17:37 作者: 甜得發(fā)膩 時間: 2025-3-29 19:52 作者: Asseverate 時間: 2025-3-30 01:21 作者: Glycogen 時間: 2025-3-30 08:03 作者: 縱火 時間: 2025-3-30 11:29
Stochastic Processes and Their Applicationsperformance measures; area under receiver operator characteristics curve, balance and geometric mean. The results are also examined statistically with statistical analysis. The boosting-based ensemble learning techniques are effective for predicting employee absenteeism according to the results of t作者: 地名詞典 時間: 2025-3-30 13:18
Ann-Lee Wang,David Vere-Jones,Xiao-gu Zhengram crash), SQL injection, Cross-Site Scripting, and XML injection. We also incorporated the fitness function comparison table for each method, including the merits and limitations. This work will assist security researchers in finding new directions in the field of search-based software security te作者: 我沒有強(qiáng)迫 時間: 2025-3-30 18:53
Building Web-Based Subject-Specific Corpora on the Desktop: Evaluation of Search Metrics, algorithm, Okapi BM25. This demonstrates that the performance of search metrics using a relatively larger number of search key words (> 100) is different than when a small set of search key words is used. We also demonstrate how to optimize the free parameters for Okapi BM25.作者: 龍卷風(fēng) 時間: 2025-3-30 21:37
,Descriptive Predictive Model for Parkinson’s Disease Analysis,provide feature-set according to need. We divided the dataset into four modules in first module we have used only five feature-set, and then in second module, we have used ten feature-set and then 15 and 20 feature-set, respectively, and then all features at a time. We have feeded these module to al作者: 無情 時間: 2025-3-31 00:54
Recommender System Based on Network Structure Link Analysis Technique Through Community Detection ie “l(fā)ink analysis technique” of network structure. The proposed structure utilizes a hybrid technique for a book recommender system. Besides, the paper has tremendous potential to appraise the reader to explore a new book recommender system which further suggests the books to a novice on the social n作者: canonical 時間: 2025-3-31 05:36 作者: instill 時間: 2025-3-31 10:41 作者: MIRTH 時間: 2025-3-31 15:32
On the Efficacy of Boosting-Based Ensemble Learning Techniques for Predicting Employee Absenteeism,performance measures; area under receiver operator characteristics curve, balance and geometric mean. The results are also examined statistically with statistical analysis. The boosting-based ensemble learning techniques are effective for predicting employee absenteeism according to the results of t作者: 出沒 時間: 2025-3-31 20:50
A Critical Review on Search-Based Security Testing of Programs,ram crash), SQL injection, Cross-Site Scripting, and XML injection. We also incorporated the fitness function comparison table for each method, including the merits and limitations. This work will assist security researchers in finding new directions in the field of search-based software security te作者: GREG 時間: 2025-4-1 01:32 作者: Flagging 時間: 2025-4-1 03:51
1876-1100 n cutting-edge, collaborative technologies, and areas of com.The book constitutes the peer-reviewed proceedings of the 2nd International Conference on Information Technology (InCITe-2022): The Next Generation Technology Summit. The theme of the conference is Computational Intelligence: Automate your作者: 勉勵 時間: 2025-4-1 06:58
Stochastic Processes and Applicationscan be formalized by computational mechanisms which provide mathematical formalizations that enable computer simulation. The formalizations have been expressed using a self-modeling network modeling approach.作者: gorgeous 時間: 2025-4-1 13:19 作者: 死貓他燒焦 時間: 2025-4-1 15:14
Computational Modeling of Multilevel Organizational Learning: From Conceptual to Computational Mechcan be formalized by computational mechanisms which provide mathematical formalizations that enable computer simulation. The formalizations have been expressed using a self-modeling network modeling approach.作者: ADOPT 時間: 2025-4-1 19:29
Multivariate Partially Blind Signature Scheme,ultivariate public key cryptography, there is no partially blind signature till now. We here design the first multivariate partially blind signature deploying the Rainbow signature scheme and MQDSS signature scheme. Moreover, we discuss partial blindness and one more unforgeability of the proposed scheme, along with its efficiency.作者: FELON 時間: 2025-4-2 02:13 作者: Collision 時間: 2025-4-2 03:30