派博傳思國際中心

標題: Titlebook: Computational Intelligence in Information Systems; Proceedings of the C Saiful Omar,Wida Susanty Haji Suhaili,Somnuk Phon- Conference proce [打印本頁]

作者: 民俗學    時間: 2025-3-21 16:29
書目名稱Computational Intelligence in Information Systems影響因子(影響力)




書目名稱Computational Intelligence in Information Systems影響因子(影響力)學科排名




書目名稱Computational Intelligence in Information Systems網(wǎng)絡(luò)公開度




書目名稱Computational Intelligence in Information Systems網(wǎng)絡(luò)公開度學科排名




書目名稱Computational Intelligence in Information Systems被引頻次




書目名稱Computational Intelligence in Information Systems被引頻次學科排名




書目名稱Computational Intelligence in Information Systems年度引用




書目名稱Computational Intelligence in Information Systems年度引用學科排名




書目名稱Computational Intelligence in Information Systems讀者反饋




書目名稱Computational Intelligence in Information Systems讀者反饋學科排名





作者: 搏斗    時間: 2025-3-21 22:38

作者: 商議    時間: 2025-3-22 02:32
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Networks take over the device of their victim and performs malicious activities on its system. Although many solutions have been developed to address the detection of Botnet in real time, these solutions are still prone to several problems that may critically affect the efficiency and capability of identif
作者: incredulity    時間: 2025-3-22 08:12

作者: sterilization    時間: 2025-3-22 12:48
An Efficient Robust Hyper-Heuristic Algorithm to Clustering Problemristic and hybrid of heuristic algorithms have been widely used to solve optimization problems because they have been provided efficient way to find an approximate solution but they are limited to use number of different heuristic algorithm and they are so problem-depend. Hyper-heuristic is a set of
作者: 形狀    時間: 2025-3-22 14:41
Test Case and Requirement Selection Using Rough Set Theory and Conditional Entropy test cases becomes a crucial task, where there is an increment of source codes and a rapid change of the requirements. Therefore, the selection of effective test cases becomes problematic, when the test cases are redundant and having common requirements. Thus, new challenges arose to reduce the unn
作者: 形狀    時間: 2025-3-22 17:24

作者: 癡呆    時間: 2025-3-22 21:20
A Performance Study of High-End Fog and Fog Cluster in iFogSimof the IoT-generated data. Existing studies have shown that fog computing is able to reduce the latency and provide other benefits in the IoT-fog-cloud environment. While fog is heterogeneous since can be any device with computing, networking and storage ability, its scalability must be ensured. Cur
作者: 接觸    時間: 2025-3-23 05:04
Load Balancing in Mobile Cloud Computing Using Bin Packing’s First Fit Decreasing Methodireless networks, which enables the mobile application developers can create platform independent mobile applications for the users. Cloud Computing is the base for Mobile Cloud Computing to distribute its tasks among various mobile applications. Due to the rapid growth of mobile and wireless device
作者: 寡頭政治    時間: 2025-3-23 06:10
Independent and Distributed Access to Encrypted Cloud Databases the world. Since data in the cloud is going to be placed online, it is important that these data in the clouds are well secured. The most important security challenge with data in the clouds is that the client was not aware of where the data is stored. Which may be preyed on by 3rd party clients or
作者: crescendo    時間: 2025-3-23 13:27

作者: STENT    時間: 2025-3-23 16:15

作者: 空洞    時間: 2025-3-23 18:09

作者: 集中營    時間: 2025-3-23 23:07
Towards Developing a Peatland Fire Prevention System for Brunei Darussalamcted the ecosystem that leads to the degradation of the peatland forest in Brunei. These degraded areas have become prone to fire with the right conditions. To date, there are no forest fire detection devices or monitoring system installed in Brunei. This paper presents a prototype which aims to pre
作者: Benign    時間: 2025-3-24 06:17

作者: zonules    時間: 2025-3-24 09:38
A Data Mining Approach for Inventory Forecasting: A Case Study of a Medical Storeorecasting mechanisms. Unforeseen shortage of perhaps lifesaving medication potentially translates to a loss of lives, while overstocking can affect both medical budgeting as well as healthcare provision. Evidence from literature indicates that forecasting techniques can be a robust approach to addr
作者: MUMP    時間: 2025-3-24 12:06
2194-5357 nal Intelligence in Information Systems Conference (CIIS 201.This book constitutes the Proceeding of the Computational?Intelligence in Information Systems conference?(CIIS 2018), held in Brunei,?November 16 - 18, 2018. The CIIS conference provides a platform for researchers?to exchange the latest id
作者: Ophthalmologist    時間: 2025-3-24 16:07
Conference proceedings 2019?Intelligence Techniques, Data Mining, Big Data, the Internet of?Things (IoTs),?Machine Learning, Predictive Analytics, Product and Design technology, Smart?Products,?Human Centered Design (HCD), Additive Manufacturing, Information?Security, Computer Networks and Cyber?Technologies..?.
作者: 描述    時間: 2025-3-24 19:05

作者: OUTRE    時間: 2025-3-25 03:10
Strategien für Zulieferunternehmenexperiment using the Java language, computation is done before a website is compromised and after a website is compromised and the results are compared. The results show that when a website is compromised, its PageRank can go do down to indicate that this website is compromised.
作者: Favorable    時間: 2025-3-25 07:12
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network13 dataset to train and evaluate the Botnet detection classifier. It is implemented and tested in various neural network designs with different hidden layers. Results demonstrate that the proposed technique is promising in terms of accuracy and efficiency of Botnet detection.
作者: 評論者    時間: 2025-3-25 07:43
A Framework to Detect Compromised Websites Using Link Structure Anomaliesexperiment using the Java language, computation is done before a website is compromised and after a website is compromised and the results are compared. The results show that when a website is compromised, its PageRank can go do down to indicate that this website is compromised.
作者: Magnificent    時間: 2025-3-25 11:48

作者: RODE    時間: 2025-3-25 15:58
M. Werner,G. W. Cole,S. H. Brookstandard Kalman filtering algorithm, data obtained from one low-cost sensor together with an AR of order 1 are used in the prediction stage, and data obtained from another sensor are used in the measurement update stage. Experimental results show that this technique can improve the measurement accuracy between approximately . and ..
作者: 隼鷹    時間: 2025-3-25 20:48
Independent and Distributed Access to Encrypted Cloud DatabasesWe propose Secure DBaaS architecture because this enables cloud tenants to acquire full advantage of DBaaS qualities, like accessibility, scalability and reliability, while not exposing unencrypted information to the cloud supplier.
作者: 果仁    時間: 2025-3-26 02:40
Improving Accuracy of Dissolved Oxygen Measurement in an Automatic Aerator-Control System for Shrimptandard Kalman filtering algorithm, data obtained from one low-cost sensor together with an AR of order 1 are used in the prediction stage, and data obtained from another sensor are used in the measurement update stage. Experimental results show that this technique can improve the measurement accuracy between approximately . and ..
作者: Gobble    時間: 2025-3-26 08:11

作者: 六邊形    時間: 2025-3-26 10:02
Higher Order Spectral Analysis of Vibration Signals and Convolutional Neural Network for the Fault Dnetwork (CNN) to complete the desired task. The results of the proposed algorithm show satisfactory performance under variable speed conditions. The results are compared with that of two other algorithms that advocate the efficacy of the proposed model under variable shaft speed.
作者: Expand    時間: 2025-3-26 14:34

作者: Parallel    時間: 2025-3-26 17:37

作者: scrape    時間: 2025-3-26 23:19
An Efficient Robust Hyper-Heuristic Algorithm to Clustering Problemevel heuristics simultaneously in the search strategies. In this study, an efficient robust hyperheuristic clustering algorithm is proposed to find the robust and optimum clustering results based on a set of easy-to-implement low-level heuristics. Several data sets are tested to appraise the perform
作者: perpetual    時間: 2025-3-27 05:05

作者: Handedness    時間: 2025-3-27 09:00

作者: 出價    時間: 2025-3-27 09:36

作者: 嘮叨    時間: 2025-3-27 14:32

作者: 使無效    時間: 2025-3-27 18:58
Big Data Analytics and IoT Gadgets for Tech Savvy Cities abridge Huge Information. It can be utilized for dumping movement information in Hadoop Circulated Record Framework. We utilize sensors structure including keen home sensors, vehicular systems administration, climate and water sensors, smart stopping sensors, observation objects, and so on. The tot
作者: Obsessed    時間: 2025-3-27 23:45

作者: ALT    時間: 2025-3-28 06:05
Smartwatch-Based Application for Enhanced Healthy Lifestyle in Indoor Environmentsss communication technologies and offers modularity, scalability, easy installation and smartwatch compatibility. The real-time monitoring data is stored in a cloud service named ThingSpeak and can be accessed by a smartwatch application denominated by iAQ Watchapp which allow easier access to the l
作者: recession    時間: 2025-3-28 08:14
A Data Mining Approach for Inventory Forecasting: A Case Study of a Medical Storehniques (Support Vector Machine Regression (SMOreg), Multilayer Perceptron (MLP) and Linear Regression (LR)) for four weeks ahead prediction. The proposed solution is based on secondary data and can be replicated or altered to suit different constraints of other medical stores. Therefore, this work
作者: machination    時間: 2025-3-28 11:03
2194-5357 arning, Predictive Analytics, Product and Design technology, Smart?Products,?Human Centered Design (HCD), Additive Manufacturing, Information?Security, Computer Networks and Cyber?Technologies..?.978-3-030-03301-9978-3-030-03302-6Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 朦朧    時間: 2025-3-28 17:02
https://doi.org/10.1007/978-3-531-92836-4network (CNN) to complete the desired task. The results of the proposed algorithm show satisfactory performance under variable speed conditions. The results are compared with that of two other algorithms that advocate the efficacy of the proposed model under variable shaft speed.
作者: Hyperlipidemia    時間: 2025-3-28 21:07

作者: 搖曳    時間: 2025-3-29 00:44

作者: 使厭惡    時間: 2025-3-29 06:28
Strategien externen Unternehmenswachstumsevel heuristics simultaneously in the search strategies. In this study, an efficient robust hyperheuristic clustering algorithm is proposed to find the robust and optimum clustering results based on a set of easy-to-implement low-level heuristics. Several data sets are tested to appraise the perform
作者: packet    時間: 2025-3-29 10:59

作者: 嘲笑    時間: 2025-3-29 14:25

作者: defibrillator    時間: 2025-3-29 16:25

作者: exceptional    時間: 2025-3-29 21:01
https://doi.org/10.1007/978-3-322-87010-0as Class Lecture on Demand (CLD) service that can be easily adopted in a campus. CLD defines the policies for admitting number of clients that request for video streaming service taking into account peak hour and off-peak hour background traffic load. This paper provides a detailed procedures, showi
作者: chuckle    時間: 2025-3-30 02:56

作者: Optometrist    時間: 2025-3-30 06:28

作者: 一個姐姐    時間: 2025-3-30 08:42

作者: nettle    時間: 2025-3-30 16:11
M. Werner,G. W. Cole,S. H. Brookshniques (Support Vector Machine Regression (SMOreg), Multilayer Perceptron (MLP) and Linear Regression (LR)) for four weeks ahead prediction. The proposed solution is based on secondary data and can be replicated or altered to suit different constraints of other medical stores. Therefore, this work
作者: APRON    時間: 2025-3-30 17:53

作者: THE    時間: 2025-3-30 21:56
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/c/image/232509.jpg
作者: Bombast    時間: 2025-3-31 03:22
https://doi.org/10.1007/978-3-030-03302-6Intelligent Systems; Computational Intelligence; Information Systems; CIIS 2018; Intelligent Computing
作者: microscopic    時間: 2025-3-31 05:46





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
烟台市| 青川县| 米泉市| 绥化市| 微山县| 吉木萨尔县| 宜宾市| 二手房| 金溪县| 方城县| 盖州市| 文水县| 二连浩特市| 太谷县| 清水县| 洪江市| 建宁县| 浦城县| 温宿县| 合肥市| 高台县| 常州市| 昌宁县| 平定县| 泰顺县| 胶州市| 麻栗坡县| 莱州市| 雅安市| 五大连池市| 大邑县| 嘉义市| 光山县| 南丹县| 苍南县| 田林县| 宁远县| 宽甸| 华阴市| 五峰| 武安市|