標(biāo)題: Titlebook: Computational Intelligence in Machine Learning; Proceedings of the 2 Vinit Kumar Gunjan,Amit Kumar,Sri Niwas Singh Conference proceedings 2 [打印本頁] 作者: 使沮喪 時間: 2025-3-21 20:09
書目名稱Computational Intelligence in Machine Learning影響因子(影響力)
書目名稱Computational Intelligence in Machine Learning影響因子(影響力)學(xué)科排名
書目名稱Computational Intelligence in Machine Learning網(wǎng)絡(luò)公開度
書目名稱Computational Intelligence in Machine Learning網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Intelligence in Machine Learning被引頻次
書目名稱Computational Intelligence in Machine Learning被引頻次學(xué)科排名
書目名稱Computational Intelligence in Machine Learning年度引用
書目名稱Computational Intelligence in Machine Learning年度引用學(xué)科排名
書目名稱Computational Intelligence in Machine Learning讀者反饋
書目名稱Computational Intelligence in Machine Learning讀者反饋學(xué)科排名
作者: Fulminate 時間: 2025-3-21 22:01
,Cyber-Attacks and Anomaly Detection in Networking Based on Deep Learning—A Survey,as well. These security problems threaten user’s privacy and also increasing prominently because hackers launch attacks by injecting malicious software in to the network and disturbs normal flow of network activities. Traditional Artificial Intelligence specifically Machine Learning Algorithms is no作者: 責(zé)難 時間: 2025-3-22 02:53
AI-Enabled Analysis of Climate Change on Agriculture and Yield Prediction for Coastal Area,terms of yield production becomes very important. This project aims to analyze climate change by considering climatic parameters such as rainfall and temperature. Predict the yield using these climatic parameters for one main coastal district. In case the yield is less for a given location of a dist作者: 安定 時間: 2025-3-22 08:18
Deep Learning Methods for Predicting Severity for Diabetic Retinopathy on Retinal Fundus Images,ssels in the interior of the eye, causing diabetic retinopathy, an eye disorder. In working population, diabetic retinopathy is very common major root of sight loss or blindness. If this illness is not identified in its early stages, it may cause permanent eyesight loss. The rate of damage can be re作者: 儲備 時間: 2025-3-22 09:40
Hate Text Finder Using Logistic Regression,ir race, gender, ethnicity, nationality, religion, political affiliation, language, ability or appearance. Offensive, abusive and profane language on social networks is an issue that governments and tech firms are trying to resolve. Considering the number of Internet users in world and the conflict 作者: Comprise 時間: 2025-3-22 14:32 作者: Comprise 時間: 2025-3-22 18:12
Green Data Center Power Flow Management with Renewable Energy Sources and Interlinking Converter,s like data center infrastructure management (DCIM) contributing toward green clean energy and reducing greenhouse gases and CO. emission. While evaluating energy and sustainability for green data center, the power sources with their efficiency are to be properly selected with their future impacts. 作者: obstruct 時間: 2025-3-22 22:21
Design of Grid-Connected Battery Storage Wave Energy and PV Hybrid Renewable Power Generation,eration (EG) sources, a distribution feeder was designed for this purpose. In order to adequately examine the effects of ocean, SOFC FUEL CELL, and solar plants on system protection, several scenarios with high load and generation fluctuation were simulated. Unsymmetrical faults were also taken into作者: 植物茂盛 時間: 2025-3-23 02:53 作者: QUAIL 時間: 2025-3-23 08:44 作者: 詳細(xì)目錄 時間: 2025-3-23 12:29
Switching Loss Comparison of a Cascaded Diode-Clamped Inverter with Conventional Multilevel InverteWith respect to number of sources. More number of switches for this inverter is an exceptional snag. In contrary, diode-clamped inverter has high efficiency at fundamental frequency. Though the diode-clamped inverter has poor switching efficiency and expensive, it is the widely used inverter in many作者: angina-pectoris 時間: 2025-3-23 17:51
An Energy-Efficient Mechanism Using Blockchain Technology for Machine-Type Communication in LTE Netudy on handling the network lifetime of MTC devices owing to deficient energy efficient management. This paper intends to propose optimal cluster head selection (CHS). It is vital to select an optimal node for each cluster. We proposed a whale tri-level update (WTL) approach for selecting the CH. As作者: 殺蟲劑 時間: 2025-3-23 19:30 作者: lattice 時間: 2025-3-24 01:37 作者: Creditee 時間: 2025-3-24 05:14
Secure Software Development Life Cycle: An Approach to Reduce the Risks of Cyber Attacks in Cyber P representation which acts as a digital counterpart for Cyber Physical Systems or processes in real-time and addresses every instance of its total life cycle. Nevertheless, it also has huge prospects even in the conventional and well-developed industries like agriculture, construction, medicine and 作者: 取消 時間: 2025-3-24 08:12
,Social Networks and Time Taken for Adoption of Organic Food Product in Virudhunagar District—An Empunagar district, the researcher has taken the social network as one of the factor in assessing the spreadness of information through social media like Whatsapp, Instagram and likes. By this means, the rate of information passing was calculated and the equation is designed to assess the rate of infor作者: 撫育 時間: 2025-3-24 13:54
Usage of Generative Adversarial Network to Improve Text to Image Synthesis,ption has a wide range of applications, like computer-aided design. In this chapter, a new model called Knowledge Transfer Generative Adversarial Networks (KT GAN) is proposed for an exact synthesis of given image. To enhance the quality of generated image, an Alternate Attention Transfer Mechanism 作者: Granular 時間: 2025-3-24 16:34
Recurrent Neural Network-Based Solar Power Generation Forecasting Model in Comparison with ANN,t all renewable energy system is nature dependent which introduces non-linearity in the system. To forecast nonlinear data machine learning and computation techniques are used. In this work, a memory-based recurrent neural network is developed and compared with a traditional ML model, that is, Artif作者: CANDY 時間: 2025-3-24 20:22 作者: 瑣事 時間: 2025-3-25 02:02
Conference proceedings 2024ts cover latest research trends and developments in the areas of machine learning, smart cities, IoT, Artificial Intelligence, cyber physical systems, cybernetics, data science, neural network, cognition, among others. It also addresses the comprehensive nature of computational intelligence, AI, ML 作者: 利用 時間: 2025-3-25 04:29
1876-1100 , and IOT.Includes papers on cyber-physical systems, cyberne.This volumes comprises select proceedings of the International Conference on Computational Intelligence in Machine Learning (ICCIML 2022). The contents cover latest research trends and developments in the areas of machine learning, smart c作者: 熟練 時間: 2025-3-25 10:56
Muthyala Udaya,Chada Ramamuni Reddylar plants on system protection, several scenarios with high load and generation fluctuation were simulated. Unsymmetrical faults were also taken into consideration. Utilizing the MATLAB Simulink programme, all modeling and simulations were completed.作者: travail 時間: 2025-3-25 14:56
Design of Grid-Connected Battery Storage Wave Energy and PV Hybrid Renewable Power Generation,lar plants on system protection, several scenarios with high load and generation fluctuation were simulated. Unsymmetrical faults were also taken into consideration. Utilizing the MATLAB Simulink programme, all modeling and simulations were completed.作者: MANIA 時間: 2025-3-25 19:39
Identifizierung der Strategischen Gruppen the intracranial brain volume and corpus callosum from the ABIDE data set. T1-weighted MRI scans provide information on the intracranial brain volume and corpus callosum. ASD is detected using VGG-16 based on transfer learning.作者: aesthetician 時間: 2025-3-25 20:44 作者: implore 時間: 2025-3-26 00:26
A Deep Learning Method for Autism Spectrum Disorder, the intracranial brain volume and corpus callosum from the ABIDE data set. T1-weighted MRI scans provide information on the intracranial brain volume and corpus callosum. ASD is detected using VGG-16 based on transfer learning.作者: 縫紉 時間: 2025-3-26 05:31
A Grey Wolf Integrated with Jaya Optimization Based Route Selection in IoT Network,egrated with Jaya Optimization (GWJO) approach is used for selection of optimal node and based on link quality the best route selection is exhibited in this paper. Initial nodes are identified considering delay, distance and energy parameters. The proposed methodology is compared with various performance metrics over the conventional models.作者: Canopy 時間: 2025-3-26 09:24
Strategien von Banken im globalen Wettbewerb traffic detection framework. In this paper, different machine learning algorithms were studied in detecting the anomalies and cyber-attacks in network and to identify the problem in existing solutions.作者: STENT 時間: 2025-3-26 16:22 作者: 易達(dá)到 時間: 2025-3-26 19:14
https://doi.org/10.1007/978-3-658-19678-3ry measures are taken to avert mishaps. Furthermore, this model can be progressed by hoarding the positions of the obstructions and gathering the particulars in the cloud so that the transportation governing bodies can retrieve the data for restoration.作者: Adulate 時間: 2025-3-26 23:26 作者: 同義聯(lián)想法 時間: 2025-3-27 01:44
Strategien zur Bewahrung von WissenDigital Twin technology and explore the opportunities of twins protecting themselves. Additionally, we look at the implementation of Secure Software Development Life-Cycle (SSDLC) on Digital Twins and Cyber Physical Systems for mitigating the proposed risks from the very roots.作者: LEERY 時間: 2025-3-27 05:48 作者: 灌輸 時間: 2025-3-27 09:26
Management des Organisationsged?chtnissesature set. After feature selection, machine learning–based classifiers retain a classification accuracy of more than 94 percent despite operating on a significantly smaller feature dimension, reducing computing cost of learning classifiers.作者: ingenue 時間: 2025-3-27 16:08
,Cyber-Attacks and Anomaly Detection in Networking Based on Deep Learning—A Survey, traffic detection framework. In this paper, different machine learning algorithms were studied in detecting the anomalies and cyber-attacks in network and to identify the problem in existing solutions.作者: cleaver 時間: 2025-3-27 18:58
Hate Text Finder Using Logistic Regression,f disputes due to aspiration freedom abuse in social media. In this project, we developed a social blog to demonstrate this entire process and it shows good results. We are testing that whether the post contains offensive content or not at the time of posting itself.作者: Longitude 時間: 2025-3-27 21:56 作者: poliosis 時間: 2025-3-28 04:23
Power Quality Enhancement with PSO-Based Optimisation of PI-Based Controller for Active Power Filteit comes to nonlinear optimisation issues, PSO is one of the most popular solutions. The triggering pulses for the IGBT in the inverter are generated by a hysteresis current regulator, which is also a part of the system.作者: recede 時間: 2025-3-28 09:56
Secure Software Development Life Cycle: An Approach to Reduce the Risks of Cyber Attacks in Cyber PDigital Twin technology and explore the opportunities of twins protecting themselves. Additionally, we look at the implementation of Secure Software Development Life-Cycle (SSDLC) on Digital Twins and Cyber Physical Systems for mitigating the proposed risks from the very roots.作者: 變化無常 時間: 2025-3-28 13:17 作者: REIGN 時間: 2025-3-28 16:48 作者: 搖晃 時間: 2025-3-28 22:16
Conference proceedings 2024m a methodological/application perspective in understanding Artificial intelligence and machine learning approaches and their capabilities in solving diverse range of problems in industries and its real-world applications..作者: 骯臟 時間: 2025-3-29 01:47 作者: characteristic 時間: 2025-3-29 06:51
https://doi.org/10.1007/978-3-8350-9021-7 diode-clamped inverter (CDCI). This CDCI inverter is considered as hybrid inverter in this paper. This hybrid inverter’s switching losses and conduction losses are compared with conventional topologies.作者: myelography 時間: 2025-3-29 07:48 作者: apiary 時間: 2025-3-29 14:47 作者: 連鎖,連串 時間: 2025-3-29 18:58 作者: 量被毀壞 時間: 2025-3-29 21:41 作者: 表示向前 時間: 2025-3-30 02:22 作者: Calibrate 時間: 2025-3-30 04:30 作者: 纖細(xì) 時間: 2025-3-30 08:24
Wolfgang Fratzscher,Karl Stephane. Only an IoT connection can be used to send the message from SCADA with the message communication protocol (MCP). As a result, there is a push to make users more reachable, which lowers labor expenses by cutting back on-site visits for data collection, inspection, and correction. To make distribut作者: facilitate 時間: 2025-3-30 16:03 作者: 銀版照相 時間: 2025-3-30 19:51
https://doi.org/10.1007/978-3-8350-9021-7he text encoder for image-image. Improved text characteristics and photos of higher quality is possible with this method. The suggested KT GAN outperforms the traditional approach significantly and provides convincing results over a wide range of assessment measures after precise testing on two publ作者: acolyte 時間: 2025-3-30 23:39 作者: 吵鬧 時間: 2025-3-31 03:13
AI-Enabled Analysis of Climate Change on Agriculture and Yield Prediction for Coastal Area,odel needs to first predict the climatic conditions for that location entered by the user. The weather forecast is done using the LSTM algorithm using weather data crop can grow or not, and obtain the expected yield if the crop can grow in that region. The model is intended to suggest an alternate c作者: 種子 時間: 2025-3-31 07:26
Green Data Center Power Flow Management with Renewable Energy Sources and Interlinking Converter,e system (ESS) forming energy routers with a potential to transfer power bidirectional to AC/DC-loads. ILC performs on an outer loop droop control providing less power and switching losses also cost effective with reduce circulating currents. Integration of ILC can be at higher level of power system作者: 含糊其辭 時間: 2025-3-31 11:16
Monitoring and Control of Motor Drive Parameters Using Internet of Things Protocol for Industrial Ae. Only an IoT connection can be used to send the message from SCADA with the message communication protocol (MCP). As a result, there is a push to make users more reachable, which lowers labor expenses by cutting back on-site visits for data collection, inspection, and correction. To make distribut作者: 簡略 時間: 2025-3-31 13:58 作者: 無效 時間: 2025-3-31 21:09
Usage of Generative Adversarial Network to Improve Text to Image Synthesis,he text encoder for image-image. Improved text characteristics and photos of higher quality is possible with this method. The suggested KT GAN outperforms the traditional approach significantly and provides convincing results over a wide range of assessment measures after precise testing on two publ作者: FER 時間: 2025-3-31 22:24 作者: Mystic 時間: 2025-4-1 03:19 作者: Rankle 時間: 2025-4-1 09:44
Vinit Kumar Gunjan,Amit Kumar,Sri Niwas SinghComprises select peer-reviewed proceedings of the conference ICCIML 2022.Discusses all areas of machine learning, computational intelligence, and IOT.Includes papers on cyber-physical systems, cyberne作者: breadth 時間: 2025-4-1 12:47 作者: 空洞 時間: 2025-4-1 15:31
Computational Intelligence in Machine Learning978-981-99-7954-7Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 妨礙 時間: 2025-4-1 19:58
Identifizierung der Strategischen Gruppen Data Exchange (ABIDE) based on brain activity patterns. ASD is a neurological condition marked by repetitive behaviours and social difficulties. A deep learning-based approach using transfer learning for automatic detection of ASD is proposed in this study, which uses characteristics retrieved from作者: Bother 時間: 2025-4-2 02:13
Strategien von Banken im globalen Wettbewerbas well. These security problems threaten user’s privacy and also increasing prominently because hackers launch attacks by injecting malicious software in to the network and disturbs normal flow of network activities. Traditional Artificial Intelligence specifically Machine Learning Algorithms is no作者: 連累 時間: 2025-4-2 03:59