派博傳思國際中心

標(biāo)題: Titlebook: Computational Intelligence; Select Proceedings o Anupam Shukla,B. K. Murthy,Jean-Paul Van Belle Conference proceedings 2023 The Editor(s) ( [打印本頁]

作者: clot-buster    時間: 2025-3-21 17:47
書目名稱Computational Intelligence影響因子(影響力)




書目名稱Computational Intelligence影響因子(影響力)學(xué)科排名




書目名稱Computational Intelligence網(wǎng)絡(luò)公開度




書目名稱Computational Intelligence網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computational Intelligence被引頻次




書目名稱Computational Intelligence被引頻次學(xué)科排名




書目名稱Computational Intelligence年度引用




書目名稱Computational Intelligence年度引用學(xué)科排名




書目名稱Computational Intelligence讀者反饋




書目名稱Computational Intelligence讀者反饋學(xué)科排名





作者: 無價值    時間: 2025-3-21 21:34
978-981-19-7348-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
作者: Infantry    時間: 2025-3-22 00:29
Computational Intelligence978-981-19-7346-8Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: 欺騙世家    時間: 2025-3-22 07:52

作者: 自傳    時間: 2025-3-22 10:12
Lecture Notes in Electrical Engineeringhttp://image.papertrans.cn/c/image/232363.jpg
作者: Critical    時間: 2025-3-22 13:56

作者: Critical    時間: 2025-3-22 21:01
Asymptotics of Integrated Processested by malicious nodes in WSN at the same time, which leads to a black hole (BH) attack in the system. The BH attacks block the data instead of forwarding it to the destination. In order to overcome this, the proposed method adopts deep learning-based scheme to detect BH attacks in WSN. The proposed
作者: 史前    時間: 2025-3-22 22:36

作者: jaunty    時間: 2025-3-23 02:27

作者: attenuate    時間: 2025-3-23 09:05
Springer Texts in Business and Economics-processing of data. The paper elaborates the concept of CNN with architectural details and their application in medical imaging to resolve the problems of detection, segmentation and classification. Limited dataset, scarcity of annotated data, non-standardized evaluation metric and model biasing ar
作者: 爆炸    時間: 2025-3-23 10:50
https://doi.org/10.1007/978-3-662-64711-0rawlers and take document similarity algorithms for selection. We take a different lean resource approach by applying traditional search metrics with a relatively large (more than 100 search terms) ‘bag of domain words’ approach on the colossal clean crawled corpus. This approach enables one to buil
作者: 微塵    時間: 2025-3-23 14:50

作者: 沉著    時間: 2025-3-23 21:50

作者: 緯線    時間: 2025-3-23 23:26

作者: 不易燃    時間: 2025-3-24 05:29

作者: prosperity    時間: 2025-3-24 08:34
https://doi.org/10.1007/978-94-015-9277-2s in identifying the items for the user and might be worthful for creating buying options that are purely rely on recommender. Especially, in the case of a book recommender system, it is necessary to recommend the books to learn in conformity with the learning environment of the learner. The prime o
作者: 來就得意    時間: 2025-3-24 11:46

作者: 黑豹    時間: 2025-3-24 17:36

作者: encomiast    時間: 2025-3-24 22:51
Renata Cioczek-Georges,Murad S. Taqquther. People who sell goods or services on P2P platforms are often ordinary citizens who do not have sophisticated marketing knowledge or skills. It is important that service providers are empowered to know how to market themselves since they are competing globally. In a review of accommodation P2P
作者: Critical    時間: 2025-3-25 02:56

作者: 鋸齒狀    時間: 2025-3-25 03:53
Stochastic Processes and Their Applicationsnt years, predictive modeling using ensemble learning techniques has increased the attention of researchers to develop competent models for various predictive tasks. Ensemble techniques combine the predictions of multiple models to yield a single consolidated decision. Thus, predictive modeling with
作者: Cirrhosis    時間: 2025-3-25 08:35

作者: AGONY    時間: 2025-3-25 12:40
Phase Dependent Population Growth Models to increase port efficiency by integrating state-of-the-art technology with port management and predicting a ship’s estimated time of arrival (ETA) is a critical step towards establishing a smart port system. This study aims to develop a data-driven model to estimate the ETA of incoming ships to Po
作者: 形容詞    時間: 2025-3-25 16:45
Ann-Lee Wang,David Vere-Jones,Xiao-gu Zhengh area for security researchers. Several proposed techniques partially achieve the automatic test case generation of detecting security issues that target specific programming languages or API types. This review paper performs a comparative analysis of research papers published during 2010–21 specif
作者: AROMA    時間: 2025-3-25 21:47
Computational Modeling of Multilevel Organizational Learning: From Conceptual to Computational Mech of organizational learning. It is discussed how various conceptual mechanisms in multilevel organizational learning as identified in the literature, can be formalized by computational mechanisms which provide mathematical formalizations that enable computer simulation. The formalizations have been
作者: 眨眼    時間: 2025-3-26 00:59
Deep Learning-Based Black Hole Detection Model for WSN in Smart Grid,ted by malicious nodes in WSN at the same time, which leads to a black hole (BH) attack in the system. The BH attacks block the data instead of forwarding it to the destination. In order to overcome this, the proposed method adopts deep learning-based scheme to detect BH attacks in WSN. The proposed
作者: Cholecystokinin    時間: 2025-3-26 06:31

作者: fertilizer    時間: 2025-3-26 09:11
Learning to Transfer Knowledge Between Datasets to Enhance Intrusion Detection Systems,ever, by splitting the control layer and data layer, the SDN architecture also attracts numerous types of attacks such as spoofing or information disclosure. In the recent years, a few research articles coped with the security problem by introducing open datasets and classification techniques to det
作者: callous    時間: 2025-3-26 13:05

作者: orthodox    時間: 2025-3-26 19:55
Building Web-Based Subject-Specific Corpora on the Desktop: Evaluation of Search Metrics,rawlers and take document similarity algorithms for selection. We take a different lean resource approach by applying traditional search metrics with a relatively large (more than 100 search terms) ‘bag of domain words’ approach on the colossal clean crawled corpus. This approach enables one to buil
作者: Graduated    時間: 2025-3-27 00:44

作者: debris    時間: 2025-3-27 04:27
Aerial Object Detection Using Deep Learning: A Review,tional methods made use of machine learning algorithms that involved hand-made features. At present, deep learning models have surpassed the conventional machine learning models. Some of the major problems faced in aerial object detection are angle shift and the small sizes of objects in aerial imag
作者: arbovirus    時間: 2025-3-27 08:21

作者: Scleroderma    時間: 2025-3-27 12:59

作者: inhibit    時間: 2025-3-27 16:42
Recommender System Based on Network Structure Link Analysis Technique Through Community Detection is in identifying the items for the user and might be worthful for creating buying options that are purely rely on recommender. Especially, in the case of a book recommender system, it is necessary to recommend the books to learn in conformity with the learning environment of the learner. The prime o
作者: conspicuous    時間: 2025-3-27 21:35

作者: 指數(shù)    時間: 2025-3-27 23:57
Multivariate Partially Blind Signature Scheme, Partial blind signature is used to tackle this problem using a piece of common information shared between the signer and the user. In the family of multivariate public key cryptography, there is no partially blind signature till now. We here design the first multivariate partially blind signature d
作者: Emg827    時間: 2025-3-28 05:00
Topic Analysis and Visualisation of Peer-to-Peer Platform Data: An Airbnb Case Study,ther. People who sell goods or services on P2P platforms are often ordinary citizens who do not have sophisticated marketing knowledge or skills. It is important that service providers are empowered to know how to market themselves since they are competing globally. In a review of accommodation P2P
作者: jungle    時間: 2025-3-28 09:59
Pandemic-Induced Behavioral Change in Mobile Banking Adoption: An Opportunity for Indian Banking Inbanking industry. The study has further identified and analyzed the usage pattern of Indian customers for mobile banking/online banking services in the pre-pandemic phase and progression of Indian customers for mobile banking/online banking services during the pandemic. Secondary data has been used
作者: outset    時間: 2025-3-28 13:04

作者: RENAL    時間: 2025-3-28 16:41

作者: 不怕任性    時間: 2025-3-28 20:26

作者: 無法取消    時間: 2025-3-28 23:48
A Critical Review on Search-Based Security Testing of Programs,h area for security researchers. Several proposed techniques partially achieve the automatic test case generation of detecting security issues that target specific programming languages or API types. This review paper performs a comparative analysis of research papers published during 2010–21 specif
作者: GIST    時間: 2025-3-29 05:39
1876-1100 IT architectures. The book will be useful to researchers, practitioners, and policymakers working in information technology..978-981-19-7348-2978-981-19-7346-8Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: 暗諷    時間: 2025-3-29 07:46

作者: libertine    時間: 2025-3-29 12:50
https://doi.org/10.1007/978-3-662-64711-0 algorithm, Okapi BM25. This demonstrates that the performance of search metrics using a relatively larger number of search key words (> 100) is different than when a small set of search key words is used. We also demonstrate how to optimize the free parameters for Okapi BM25.
作者: Subjugate    時間: 2025-3-29 17:37

作者: 甜得發(fā)膩    時間: 2025-3-29 19:52

作者: Asseverate    時間: 2025-3-30 01:21

作者: Glycogen    時間: 2025-3-30 08:03

作者: 縱火    時間: 2025-3-30 11:29
Stochastic Processes and Their Applicationsperformance measures; area under receiver operator characteristics curve, balance and geometric mean. The results are also examined statistically with statistical analysis. The boosting-based ensemble learning techniques are effective for predicting employee absenteeism according to the results of t
作者: 地名詞典    時間: 2025-3-30 13:18
Ann-Lee Wang,David Vere-Jones,Xiao-gu Zhengram crash), SQL injection, Cross-Site Scripting, and XML injection. We also incorporated the fitness function comparison table for each method, including the merits and limitations. This work will assist security researchers in finding new directions in the field of search-based software security te
作者: 我沒有強(qiáng)迫    時間: 2025-3-30 18:53
Building Web-Based Subject-Specific Corpora on the Desktop: Evaluation of Search Metrics, algorithm, Okapi BM25. This demonstrates that the performance of search metrics using a relatively larger number of search key words (> 100) is different than when a small set of search key words is used. We also demonstrate how to optimize the free parameters for Okapi BM25.
作者: 龍卷風(fēng)    時間: 2025-3-30 21:37
,Descriptive Predictive Model for Parkinson’s Disease Analysis,provide feature-set according to need. We divided the dataset into four modules in first module we have used only five feature-set, and then in second module, we have used ten feature-set and then 15 and 20 feature-set, respectively, and then all features at a time. We have feeded these module to al
作者: 無情    時間: 2025-3-31 00:54
Recommender System Based on Network Structure Link Analysis Technique Through Community Detection ie “l(fā)ink analysis technique” of network structure. The proposed structure utilizes a hybrid technique for a book recommender system. Besides, the paper has tremendous potential to appraise the reader to explore a new book recommender system which further suggests the books to a novice on the social n
作者: canonical    時間: 2025-3-31 05:36

作者: instill    時間: 2025-3-31 10:41

作者: MIRTH    時間: 2025-3-31 15:32
On the Efficacy of Boosting-Based Ensemble Learning Techniques for Predicting Employee Absenteeism,performance measures; area under receiver operator characteristics curve, balance and geometric mean. The results are also examined statistically with statistical analysis. The boosting-based ensemble learning techniques are effective for predicting employee absenteeism according to the results of t
作者: 出沒    時間: 2025-3-31 20:50
A Critical Review on Search-Based Security Testing of Programs,ram crash), SQL injection, Cross-Site Scripting, and XML injection. We also incorporated the fitness function comparison table for each method, including the merits and limitations. This work will assist security researchers in finding new directions in the field of search-based software security te
作者: GREG    時間: 2025-4-1 01:32

作者: Flagging    時間: 2025-4-1 03:51
1876-1100 n cutting-edge, collaborative technologies, and areas of com.The book constitutes the peer-reviewed proceedings of the 2nd International Conference on Information Technology (InCITe-2022): The Next Generation Technology Summit. The theme of the conference is Computational Intelligence: Automate your
作者: 勉勵    時間: 2025-4-1 06:58
Stochastic Processes and Applicationscan be formalized by computational mechanisms which provide mathematical formalizations that enable computer simulation. The formalizations have been expressed using a self-modeling network modeling approach.
作者: gorgeous    時間: 2025-4-1 13:19

作者: 死貓他燒焦    時間: 2025-4-1 15:14
Computational Modeling of Multilevel Organizational Learning: From Conceptual to Computational Mechcan be formalized by computational mechanisms which provide mathematical formalizations that enable computer simulation. The formalizations have been expressed using a self-modeling network modeling approach.
作者: ADOPT    時間: 2025-4-1 19:29
Multivariate Partially Blind Signature Scheme,ultivariate public key cryptography, there is no partially blind signature till now. We here design the first multivariate partially blind signature deploying the Rainbow signature scheme and MQDSS signature scheme. Moreover, we discuss partial blindness and one more unforgeability of the proposed scheme, along with its efficiency.
作者: FELON    時間: 2025-4-2 02:13

作者: Collision    時間: 2025-4-2 03:30





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
柯坪县| 蚌埠市| 惠水县| 历史| 韩城市| 乌兰浩特市| 绵竹市| 尖扎县| 宝鸡市| 洛浦县| 遵义市| 通渭县| 肥东县| 通化市| 开原市| 图木舒克市| 建宁县| 集贤县| 张家口市| 彩票| 威信县| 抚松县| 洞口县| 曲周县| 南丹县| 额尔古纳市| 盐山县| 雅安市| 万荣县| 三门峡市| 昆山市| 麟游县| 仁怀市| 榆林市| 临颍县| 千阳县| 新泰市| 长子县| 海阳市| 桃园市| 来安县|