標題: Titlebook: Computational Intelligence in Information Systems; Proceedings of the C Saiful Omar,Wida Susanty Haji Suhaili,Somnuk Phon- Conference proce [打印本頁] 作者: 民俗學 時間: 2025-3-21 16:29
書目名稱Computational Intelligence in Information Systems影響因子(影響力)
書目名稱Computational Intelligence in Information Systems影響因子(影響力)學科排名
書目名稱Computational Intelligence in Information Systems網(wǎng)絡(luò)公開度
書目名稱Computational Intelligence in Information Systems網(wǎng)絡(luò)公開度學科排名
書目名稱Computational Intelligence in Information Systems被引頻次
書目名稱Computational Intelligence in Information Systems被引頻次學科排名
書目名稱Computational Intelligence in Information Systems年度引用
書目名稱Computational Intelligence in Information Systems年度引用學科排名
書目名稱Computational Intelligence in Information Systems讀者反饋
書目名稱Computational Intelligence in Information Systems讀者反饋學科排名
作者: 搏斗 時間: 2025-3-21 22:38 作者: 商議 時間: 2025-3-22 02:32
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Networks take over the device of their victim and performs malicious activities on its system. Although many solutions have been developed to address the detection of Botnet in real time, these solutions are still prone to several problems that may critically affect the efficiency and capability of identif作者: incredulity 時間: 2025-3-22 08:12 作者: sterilization 時間: 2025-3-22 12:48
An Efficient Robust Hyper-Heuristic Algorithm to Clustering Problemristic and hybrid of heuristic algorithms have been widely used to solve optimization problems because they have been provided efficient way to find an approximate solution but they are limited to use number of different heuristic algorithm and they are so problem-depend. Hyper-heuristic is a set of作者: 形狀 時間: 2025-3-22 14:41
Test Case and Requirement Selection Using Rough Set Theory and Conditional Entropy test cases becomes a crucial task, where there is an increment of source codes and a rapid change of the requirements. Therefore, the selection of effective test cases becomes problematic, when the test cases are redundant and having common requirements. Thus, new challenges arose to reduce the unn作者: 形狀 時間: 2025-3-22 17:24 作者: 癡呆 時間: 2025-3-22 21:20
A Performance Study of High-End Fog and Fog Cluster in iFogSimof the IoT-generated data. Existing studies have shown that fog computing is able to reduce the latency and provide other benefits in the IoT-fog-cloud environment. While fog is heterogeneous since can be any device with computing, networking and storage ability, its scalability must be ensured. Cur作者: 接觸 時間: 2025-3-23 05:04
Load Balancing in Mobile Cloud Computing Using Bin Packing’s First Fit Decreasing Methodireless networks, which enables the mobile application developers can create platform independent mobile applications for the users. Cloud Computing is the base for Mobile Cloud Computing to distribute its tasks among various mobile applications. Due to the rapid growth of mobile and wireless device作者: 寡頭政治 時間: 2025-3-23 06:10
Independent and Distributed Access to Encrypted Cloud Databases the world. Since data in the cloud is going to be placed online, it is important that these data in the clouds are well secured. The most important security challenge with data in the clouds is that the client was not aware of where the data is stored. Which may be preyed on by 3rd party clients or作者: crescendo 時間: 2025-3-23 13:27 作者: STENT 時間: 2025-3-23 16:15 作者: 空洞 時間: 2025-3-23 18:09 作者: 集中營 時間: 2025-3-23 23:07
Towards Developing a Peatland Fire Prevention System for Brunei Darussalamcted the ecosystem that leads to the degradation of the peatland forest in Brunei. These degraded areas have become prone to fire with the right conditions. To date, there are no forest fire detection devices or monitoring system installed in Brunei. This paper presents a prototype which aims to pre作者: Benign 時間: 2025-3-24 06:17 作者: zonules 時間: 2025-3-24 09:38
A Data Mining Approach for Inventory Forecasting: A Case Study of a Medical Storeorecasting mechanisms. Unforeseen shortage of perhaps lifesaving medication potentially translates to a loss of lives, while overstocking can affect both medical budgeting as well as healthcare provision. Evidence from literature indicates that forecasting techniques can be a robust approach to addr作者: MUMP 時間: 2025-3-24 12:06
2194-5357 nal Intelligence in Information Systems Conference (CIIS 201.This book constitutes the Proceeding of the Computational?Intelligence in Information Systems conference?(CIIS 2018), held in Brunei,?November 16 - 18, 2018. The CIIS conference provides a platform for researchers?to exchange the latest id作者: Ophthalmologist 時間: 2025-3-24 16:07
Conference proceedings 2019?Intelligence Techniques, Data Mining, Big Data, the Internet of?Things (IoTs),?Machine Learning, Predictive Analytics, Product and Design technology, Smart?Products,?Human Centered Design (HCD), Additive Manufacturing, Information?Security, Computer Networks and Cyber?Technologies..?.作者: 描述 時間: 2025-3-24 19:05 作者: OUTRE 時間: 2025-3-25 03:10
Strategien für Zulieferunternehmenexperiment using the Java language, computation is done before a website is compromised and after a website is compromised and the results are compared. The results show that when a website is compromised, its PageRank can go do down to indicate that this website is compromised.作者: Favorable 時間: 2025-3-25 07:12
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network13 dataset to train and evaluate the Botnet detection classifier. It is implemented and tested in various neural network designs with different hidden layers. Results demonstrate that the proposed technique is promising in terms of accuracy and efficiency of Botnet detection.作者: 評論者 時間: 2025-3-25 07:43
A Framework to Detect Compromised Websites Using Link Structure Anomaliesexperiment using the Java language, computation is done before a website is compromised and after a website is compromised and the results are compared. The results show that when a website is compromised, its PageRank can go do down to indicate that this website is compromised.作者: Magnificent 時間: 2025-3-25 11:48 作者: RODE 時間: 2025-3-25 15:58
M. Werner,G. W. Cole,S. H. Brookstandard Kalman filtering algorithm, data obtained from one low-cost sensor together with an AR of order 1 are used in the prediction stage, and data obtained from another sensor are used in the measurement update stage. Experimental results show that this technique can improve the measurement accuracy between approximately . and ..作者: 隼鷹 時間: 2025-3-25 20:48
Independent and Distributed Access to Encrypted Cloud DatabasesWe propose Secure DBaaS architecture because this enables cloud tenants to acquire full advantage of DBaaS qualities, like accessibility, scalability and reliability, while not exposing unencrypted information to the cloud supplier.作者: 果仁 時間: 2025-3-26 02:40
Improving Accuracy of Dissolved Oxygen Measurement in an Automatic Aerator-Control System for Shrimptandard Kalman filtering algorithm, data obtained from one low-cost sensor together with an AR of order 1 are used in the prediction stage, and data obtained from another sensor are used in the measurement update stage. Experimental results show that this technique can improve the measurement accuracy between approximately . and ..作者: Gobble 時間: 2025-3-26 08:11 作者: 六邊形 時間: 2025-3-26 10:02
Higher Order Spectral Analysis of Vibration Signals and Convolutional Neural Network for the Fault Dnetwork (CNN) to complete the desired task. The results of the proposed algorithm show satisfactory performance under variable speed conditions. The results are compared with that of two other algorithms that advocate the efficacy of the proposed model under variable shaft speed.作者: Expand 時間: 2025-3-26 14:34 作者: Parallel 時間: 2025-3-26 17:37 作者: scrape 時間: 2025-3-26 23:19
An Efficient Robust Hyper-Heuristic Algorithm to Clustering Problemevel heuristics simultaneously in the search strategies. In this study, an efficient robust hyperheuristic clustering algorithm is proposed to find the robust and optimum clustering results based on a set of easy-to-implement low-level heuristics. Several data sets are tested to appraise the perform作者: perpetual 時間: 2025-3-27 05:05 作者: Handedness 時間: 2025-3-27 09:00 作者: 出價 時間: 2025-3-27 09:36 作者: 嘮叨 時間: 2025-3-27 14:32 作者: 使無效 時間: 2025-3-27 18:58
Big Data Analytics and IoT Gadgets for Tech Savvy Cities abridge Huge Information. It can be utilized for dumping movement information in Hadoop Circulated Record Framework. We utilize sensors structure including keen home sensors, vehicular systems administration, climate and water sensors, smart stopping sensors, observation objects, and so on. The tot作者: Obsessed 時間: 2025-3-27 23:45 作者: ALT 時間: 2025-3-28 06:05
Smartwatch-Based Application for Enhanced Healthy Lifestyle in Indoor Environmentsss communication technologies and offers modularity, scalability, easy installation and smartwatch compatibility. The real-time monitoring data is stored in a cloud service named ThingSpeak and can be accessed by a smartwatch application denominated by iAQ Watchapp which allow easier access to the l作者: recession 時間: 2025-3-28 08:14
A Data Mining Approach for Inventory Forecasting: A Case Study of a Medical Storehniques (Support Vector Machine Regression (SMOreg), Multilayer Perceptron (MLP) and Linear Regression (LR)) for four weeks ahead prediction. The proposed solution is based on secondary data and can be replicated or altered to suit different constraints of other medical stores. Therefore, this work 作者: machination 時間: 2025-3-28 11:03
2194-5357 arning, Predictive Analytics, Product and Design technology, Smart?Products,?Human Centered Design (HCD), Additive Manufacturing, Information?Security, Computer Networks and Cyber?Technologies..?.978-3-030-03301-9978-3-030-03302-6Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 朦朧 時間: 2025-3-28 17:02
https://doi.org/10.1007/978-3-531-92836-4network (CNN) to complete the desired task. The results of the proposed algorithm show satisfactory performance under variable speed conditions. The results are compared with that of two other algorithms that advocate the efficacy of the proposed model under variable shaft speed.作者: Hyperlipidemia 時間: 2025-3-28 21:07 作者: 搖曳 時間: 2025-3-29 00:44 作者: 使厭惡 時間: 2025-3-29 06:28
Strategien externen Unternehmenswachstumsevel heuristics simultaneously in the search strategies. In this study, an efficient robust hyperheuristic clustering algorithm is proposed to find the robust and optimum clustering results based on a set of easy-to-implement low-level heuristics. Several data sets are tested to appraise the perform作者: packet 時間: 2025-3-29 10:59 作者: 嘲笑 時間: 2025-3-29 14:25 作者: defibrillator 時間: 2025-3-29 16:25 作者: exceptional 時間: 2025-3-29 21:01
https://doi.org/10.1007/978-3-322-87010-0as Class Lecture on Demand (CLD) service that can be easily adopted in a campus. CLD defines the policies for admitting number of clients that request for video streaming service taking into account peak hour and off-peak hour background traffic load. This paper provides a detailed procedures, showi作者: chuckle 時間: 2025-3-30 02:56 作者: Optometrist 時間: 2025-3-30 06:28 作者: 一個姐姐 時間: 2025-3-30 08:42 作者: nettle 時間: 2025-3-30 16:11
M. Werner,G. W. Cole,S. H. Brookshniques (Support Vector Machine Regression (SMOreg), Multilayer Perceptron (MLP) and Linear Regression (LR)) for four weeks ahead prediction. The proposed solution is based on secondary data and can be replicated or altered to suit different constraints of other medical stores. Therefore, this work 作者: APRON 時間: 2025-3-30 17:53 作者: THE 時間: 2025-3-30 21:56
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/c/image/232509.jpg作者: Bombast 時間: 2025-3-31 03:22
https://doi.org/10.1007/978-3-030-03302-6Intelligent Systems; Computational Intelligence; Information Systems; CIIS 2018; Intelligent Computing作者: microscopic 時間: 2025-3-31 05:46