派博傳思國際中心

標(biāo)題: Titlebook: Computational Intelligence in Information Systems; Proceedings of the C Wida Susanty Haji Suhaili,Nor Zainah Siau,Somnuk P Conference proce [打印本頁]

作者: decoction    時(shí)間: 2025-3-21 19:45
書目名稱Computational Intelligence in Information Systems影響因子(影響力)




書目名稱Computational Intelligence in Information Systems影響因子(影響力)學(xué)科排名




書目名稱Computational Intelligence in Information Systems網(wǎng)絡(luò)公開度




書目名稱Computational Intelligence in Information Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computational Intelligence in Information Systems被引頻次




書目名稱Computational Intelligence in Information Systems被引頻次學(xué)科排名




書目名稱Computational Intelligence in Information Systems年度引用




書目名稱Computational Intelligence in Information Systems年度引用學(xué)科排名




書目名稱Computational Intelligence in Information Systems讀者反饋




書目名稱Computational Intelligence in Information Systems讀者反饋學(xué)科排名





作者: Isthmus    時(shí)間: 2025-3-21 20:52
Walther Kindt,Yvonne Rittgeroth whether traditional bullying or cyberbullying, suffer emotionally and psychologically. Support from family, friends, schools, health care providers play an essential role in helping students overcome cyberbullying and negative after-effects of cyberbullying.
作者: LAY    時(shí)間: 2025-3-22 01:22
Strategien der extremen Rechtenide virtual mental health assistance using artificial intelligence (AI) based chat bot, virtual therapy through videos and audios, support to establish communication with doctors for getting the mental health services, and a list of authentic news sources. Finally, the usability and usefulness of th
作者: Overstate    時(shí)間: 2025-3-22 08:03

作者: Corral    時(shí)間: 2025-3-22 10:46

作者: Nonflammable    時(shí)間: 2025-3-22 13:30
https://doi.org/10.1007/978-3-8349-4438-2tion to use the employee monitoring technology by employees by considering various organizational, contextual and individual factors. Data analysis has used Cronbach’s alpha, correlation, and linear regression. Questionnaire consistency has been found to hold. In order to establish the statistically
作者: Nonflammable    時(shí)間: 2025-3-22 18:50
Strategien des Personalmarketingcompare the performance of seven supervised machine learning techniques. It has been demonstrated that the Ensemble Bagged classifier with 3% PCA variance outperforms other six supervised methods resulting in 88% prediction accuracy.
作者: harbinger    時(shí)間: 2025-3-22 23:52

作者: 神刊    時(shí)間: 2025-3-23 03:18

作者: Arthropathy    時(shí)間: 2025-3-23 06:22

作者: 糾纏    時(shí)間: 2025-3-23 12:56
Destructive Digital Ecosystem of Cyber Bullying Perfective Within the Information Technology Age whether traditional bullying or cyberbullying, suffer emotionally and psychologically. Support from family, friends, schools, health care providers play an essential role in helping students overcome cyberbullying and negative after-effects of cyberbullying.
作者: 咒語    時(shí)間: 2025-3-23 13:58

作者: promote    時(shí)間: 2025-3-23 18:14

作者: 把手    時(shí)間: 2025-3-23 22:41
SMAC (Social, Mobile, Analytics, Cloud)-Based Learning Intervention for Introductory Programming – Tbling ubiquitous learning (mobile element), analysing students’ behaviour and predicting their performance (analytics element), and enabling coding on the cloud (cloud element). Most importantly, the SLR results presented a research gap in the use of all four SMAC elements to design a learning inter
作者: 推測    時(shí)間: 2025-3-24 03:59
Privacy Policy, Training and Adaption of Employee Monitoring Technology to Curtail Workplace Harassmtion to use the employee monitoring technology by employees by considering various organizational, contextual and individual factors. Data analysis has used Cronbach’s alpha, correlation, and linear regression. Questionnaire consistency has been found to hold. In order to establish the statistically
作者: SUGAR    時(shí)間: 2025-3-24 07:20
A Comparative Study of Supervised Machine Learning Techniques for Deceptive Review Identification Uscompare the performance of seven supervised machine learning techniques. It has been demonstrated that the Ensemble Bagged classifier with 3% PCA variance outperforms other six supervised methods resulting in 88% prediction accuracy.
作者: 發(fā)怨言    時(shí)間: 2025-3-24 13:57
A Robust Ensemble Method for Classification in Imbalanced Datasets in the Presence of Noisef each instance in a training dataset, and ensuring that bootstraps are balanced, and at the same time have instances of varying degrees of hardness (Easy, Normal, and Hard). We evaluate the performance of the proposed method on 30 synthetic imbalanced datasets with different levels of noise and imb
作者: 存在主義    時(shí)間: 2025-3-24 14:51
A Development Framework for Automated Facial Expression Recognition Systemss unclear which dataset to start with, and 6) no development framework and methodologies to systematically implement and test new models. In this paper, we present a framework with complete source code and algorithms to: 1) detect faces and crop face images in a given dataset for AFER; 2) extract fa
作者: 非實(shí)體    時(shí)間: 2025-3-24 19:43

作者: 誘拐    時(shí)間: 2025-3-25 02:31

作者: condemn    時(shí)間: 2025-3-25 04:32
Alexander H?usler,Rainer Roesercurrent location to the desired destination. We discuss the system design and report the testing to evaluate the device effectiveness for obstacle distance feedback as well as the effectiveness of the spatial sound cues for navigation feedback.
作者: LAST    時(shí)間: 2025-3-25 11:16

作者: Semblance    時(shí)間: 2025-3-25 14:17
Strategien erfolgreich verwirklichench) contain footages of the night sky which were recorded from various locations in different countries. This work shows a proof of concept that the number of stars observed can correlate well with climate information. We also discuss some of the issues faced and make recommendations for future projects.
作者: 輕信    時(shí)間: 2025-3-25 18:44
Innovation Development and R&D Project Management in Science Organizations and Universities - Data-D are: 1) New insights to the topic of innovation development and R&D projects management in science organizations and universities from project and innovation management perspective and 2) Data-driven model and application for systematic literature review (based on word and context analysis).
作者: 分離    時(shí)間: 2025-3-25 21:25

作者: 青春期    時(shí)間: 2025-3-26 01:57

作者: 宇宙你    時(shí)間: 2025-3-26 08:10

作者: Efflorescent    時(shí)間: 2025-3-26 09:18
Conference proceedings 20212021. The CIIS conference provides a platform for researchers to exchange the latest ideas and to present new research advances in general areas related to computational intelligence and its applications. The 23 revised papers presented in this book have been carefully selected from 55 submissions.?
作者: 過于平凡    時(shí)間: 2025-3-26 14:37
Alexander Geisler,Martin Gerstered academic credentials issued by higher institutions in Brunei Darussalam under the governing body of the sultanate’s Ministry of Education. The feasibility of the designed system is tested through the execution of smart contracts onto the Kovan Ethereum test network.
作者: Expiration    時(shí)間: 2025-3-26 19:54

作者: JUST    時(shí)間: 2025-3-26 22:29
https://doi.org/10.1007/978-3-322-99217-8an detect 23 events. The false-positive events of the proposed and conventional methods are 1 and 15, respectively. In contrast, for 52,000 points, the proposed method is about 16 times faster. Also, this paper suggests a simple means to estimate the parameters used in the spatial clustering algorithm.
作者: 壁畫    時(shí)間: 2025-3-27 01:19

作者: instructive    時(shí)間: 2025-3-27 08:01
Blockchain for the Authentication and Immutability of Academic Credentials Issued in Brunei Darussaled academic credentials issued by higher institutions in Brunei Darussalam under the governing body of the sultanate’s Ministry of Education. The feasibility of the designed system is tested through the execution of smart contracts onto the Kovan Ethereum test network.
作者: HUSH    時(shí)間: 2025-3-27 11:03
Extreme Learning Machine Based Model Improved with Adaptive Activation Functionsmodels’ performance in a benchmark of ten regression problems. The results showed that Extreme Learning Machine with adaptive activation functions, in general, outperforms standard functions with the same architecture.
作者: 傷心    時(shí)間: 2025-3-27 16:48
Rockfall Detection from Terrestrial LiDAR Point Clouds by Using DBSCAN with Clutter Removal Based onan detect 23 events. The false-positive events of the proposed and conventional methods are 1 and 15, respectively. In contrast, for 52,000 points, the proposed method is about 16 times faster. Also, this paper suggests a simple means to estimate the parameters used in the spatial clustering algorithm.
作者: Curmudgeon    時(shí)間: 2025-3-27 18:08

作者: 容易做    時(shí)間: 2025-3-27 22:43
2194-5357 on Computational Intelligence in Information Systems held i.This book constitutes the Proceeding of the Computational Intelligence in Information Systems conference (CIIS 2020), held in Brunei, January 25–27, 2021. The CIIS conference provides a platform for researchers to exchange the latest ideas
作者: Hla461    時(shí)間: 2025-3-28 03:11

作者: Flawless    時(shí)間: 2025-3-28 07:59

作者: Preserve    時(shí)間: 2025-3-28 11:01

作者: fructose    時(shí)間: 2025-3-28 18:23
Strategien der extremen Rechten developed to fight the COVID-19 pandemic, little attention has been paid to develop any useful digital solution for providing mental support, especially in the context of Bangladesh. Therefore, the objectives of this research are to elicit the primary user requirements for developing a digital solu
作者: CODA    時(shí)間: 2025-3-28 19:42

作者: 好開玩笑    時(shí)間: 2025-3-28 23:08
Strategien der extremen Rechtenvalent techniques that have been indicated by visually impaired people are intelligent tools; however, it possesses limitations. With the recent technological innovation, it isn’t easy to prolong the assistance acquire for people who have visual disabilities throughout their movability. Thus, this d
作者: linguistics    時(shí)間: 2025-3-29 05:25

作者: 約會(huì)    時(shí)間: 2025-3-29 07:16

作者: EPT    時(shí)間: 2025-3-29 11:35
https://doi.org/10.1007/978-3-8349-4438-2 employees may accept such changes effortlessly, but some will resist to adopt to the digitization and monitoring technologies’ implementation because of several concerns including the concerns of privacy violation. This gives rise to a research question about the adaption of the monitoring technolo
作者: 天空    時(shí)間: 2025-3-29 15:37

作者: 緩解    時(shí)間: 2025-3-29 21:49

作者: 裹住    時(shí)間: 2025-3-30 02:15
https://doi.org/10.1007/978-3-658-11028-4 related to machine learning seeks to solve a given problem in the best possible way, generating increasingly accurate generalist predictive models. On the other hand, these models become more complex, requiring massive computational power to train and make inferences. The use of adaptive activation
作者: muscle-fibers    時(shí)間: 2025-3-30 06:58

作者: 獎(jiǎng)牌    時(shí)間: 2025-3-30 09:07

作者: 嚴(yán)重傷害    時(shí)間: 2025-3-30 15:08

作者: allude    時(shí)間: 2025-3-30 19:26

作者: SLUMP    時(shí)間: 2025-3-31 00:11

作者: 萬神殿    時(shí)間: 2025-3-31 03:50

作者: 無思維能力    時(shí)間: 2025-3-31 07:04

作者: blackout    時(shí)間: 2025-3-31 09:53

作者: 是貪求    時(shí)間: 2025-3-31 13:27

作者: Myocarditis    時(shí)間: 2025-3-31 19:15
Wida Susanty Haji Suhaili,Nor Zainah Siau,Somnuk PPresents recent research on computational intelligence in information systems.Includes selected papers from the 4th International Conference on Computational Intelligence in Information Systems held i
作者: 執(zhí)    時(shí)間: 2025-4-1 00:29

作者: 認(rèn)為    時(shí)間: 2025-4-1 03:02

作者: 使成波狀    時(shí)間: 2025-4-1 07:14





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
唐河县| 襄城县| 柘城县| 康定县| 从化市| 玛纳斯县| 绥江县| 新乐市| 宁明县| 合阳县| 棋牌| 察隅县| 绥棱县| 婺源县| 多伦县| 长治县| 阿合奇县| 玛沁县| 米泉市| 察雅县| 长武县| 江安县| 阳江市| 界首市| 翼城县| 青海省| 措勤县| 西昌市| 东阿县| 岢岚县| 渝北区| 朝阳区| 合川市| 北票市| 和硕县| 汤原县| 隆昌县| 博客| 池州市| 邵东县| 北碚区|