標題: Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3 Muthukrishnan Senthilkumar,Vijayalakshmi Ramasamy [打印本頁] 作者: arouse 時間: 2025-3-21 16:40
書目名稱Computational Intelligence, Cyber Security and Computational Models影響因子(影響力)
書目名稱Computational Intelligence, Cyber Security and Computational Models影響因子(影響力)學科排名
書目名稱Computational Intelligence, Cyber Security and Computational Models網(wǎng)絡(luò)公開度
書目名稱Computational Intelligence, Cyber Security and Computational Models網(wǎng)絡(luò)公開度學科排名
書目名稱Computational Intelligence, Cyber Security and Computational Models被引頻次
書目名稱Computational Intelligence, Cyber Security and Computational Models被引頻次學科排名
書目名稱Computational Intelligence, Cyber Security and Computational Models年度引用
書目名稱Computational Intelligence, Cyber Security and Computational Models年度引用學科排名
書目名稱Computational Intelligence, Cyber Security and Computational Models讀者反饋
書目名稱Computational Intelligence, Cyber Security and Computational Models讀者反饋學科排名
作者: 雪白 時間: 2025-3-21 20:21
https://doi.org/10.1007/978-3-8349-9845-3 objects between them by grid formation. Thirdly, the hand signaling of the student using convex hull is recognized and the alert is given to the invigilator. The system is built using C/C++ and OpenCV library that shows the better performance in the real-time video frames.作者: 使無效 時間: 2025-3-22 02:34 作者: EXULT 時間: 2025-3-22 05:07
https://doi.org/10.1007/978-3-8349-9845-3Data set. The results obtained from the experiment are based on the empirical evidence of the document clustering based on the spatial references present in them. It is concluded that the proposed work will provide users a new way in retrieving documents that have similar spatial references in them.作者: 管理員 時間: 2025-3-22 09:39
Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multiication of epilepsy risk levels from EEG signals. The analysis is done in terms of bench mark parameters such as Performance Index (PI), Quality Values (QV), Sensitivity, Specificity, Time Delay and Accuracy.作者: 騙子 時間: 2025-3-22 15:55
Suspicious Human Activity Detection in Classroom Examination objects between them by grid formation. Thirdly, the hand signaling of the student using convex hull is recognized and the alert is given to the invigilator. The system is built using C/C++ and OpenCV library that shows the better performance in the real-time video frames.作者: 騙子 時間: 2025-3-22 20:08
, State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Usinchnique is incorporated to deal with partitioned double summation terms and the conservatism of conditions for the state estimator synthesis is reduced efficiently. Finally, a numerical example is given to demonstrate the effectiveness of the proposed design method.作者: CANON 時間: 2025-3-22 21:34
A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial ReferencesData set. The results obtained from the experiment are based on the empirical evidence of the document clustering based on the spatial references present in them. It is concluded that the proposed work will provide users a new way in retrieving documents that have similar spatial references in them.作者: FUME 時間: 2025-3-23 04:03 作者: anniversary 時間: 2025-3-23 06:44
https://doi.org/10.1007/978-3-8349-9845-3to conventional GA. In addition, an autonomous self-healing system for FPGA based signal processing system is proposed using the presented pruning based GA for intrinsic evolution with the goal of reduced power consumption and faster recovery time.作者: Radiculopathy 時間: 2025-3-23 13:16
,Durchführung der empirischen Untersuchung, more potential way groups services eliminating a number of irrelevant services returned over a normal search and facilitates to rearrange the registry. Clustering depends on a threshold value namely vigilance parameter which is set between 0 and 1. Flocking of birds is the swarm behaviour considered.作者: 服從 時間: 2025-3-23 14:07 作者: agitate 時間: 2025-3-23 19:20 作者: visceral-fat 時間: 2025-3-23 23:18 作者: 嘲弄 時間: 2025-3-24 05:54 作者: 簡潔 時間: 2025-3-24 08:23 作者: ALTER 時間: 2025-3-24 11:34 作者: 大雨 時間: 2025-3-24 18:23 作者: tinnitus 時間: 2025-3-24 19:39
Strategische Onlinekommunikationumber of moves it takes for one cop to capture the robber in .. In the present note, we focus on the wall capture time of certain infinite grids. We give upper bounds on the wall capture time for Cartesian, strong, and triangular grids, while giving the exact value for hexagonal grids. We conclude with open problems.作者: 不可侵犯 時間: 2025-3-25 03:13
Manuela J?ggi,Alexander W. Hunzikertrategies improve the generalization capacity of the model. In this paper we proposed a mathematical framework for multi-task learning using kernel online learning approach. We applied the proposed algorithm on a synthetic dataset as well as real time data set and the results were found to be promising.作者: 變形詞 時間: 2025-3-25 04:49
Strategische Organisations-Entwicklungdding is done in blocks, multiple embedding is also possible. Experimental results also show that the performance of the scheme is good against various image processing operations and cropping attack.作者: Matrimony 時間: 2025-3-25 09:38
Aufbau der empirischen Untersuchung,atures from EEG Signal. Finally classification is done with Variable Precision Multigranulation Rough Set. An experimental result depicts higher accuracy according to variation of alpha and beta values in Variable Precision multigranulation rough set.作者: 使害羞 時間: 2025-3-25 15:42 作者: epinephrine 時間: 2025-3-25 18:43
Kernel Online Multi-task Learningtrategies improve the generalization capacity of the model. In this paper we proposed a mathematical framework for multi-task learning using kernel online learning approach. We applied the proposed algorithm on a synthetic dataset as well as real time data set and the results were found to be promising.作者: onlooker 時間: 2025-3-25 23:59
An Enhanced Image Watermarking Scheme Using Blocks with Homogeneous Feature Distributiondding is done in blocks, multiple embedding is also possible. Experimental results also show that the performance of the scheme is good against various image processing operations and cropping attack.作者: Breach 時間: 2025-3-26 00:21
Motor Imagery Classification Based on Variable Precision Multigranulation Rough Setatures from EEG Signal. Finally classification is done with Variable Precision Multigranulation Rough Set. An experimental result depicts higher accuracy according to variation of alpha and beta values in Variable Precision multigranulation rough set.作者: Chemotherapy 時間: 2025-3-26 08:06 作者: 財主 時間: 2025-3-26 10:04
Computational Intelligence, Cyber Security and Computational ModelsProceedings of ICC3 作者: 分解 時間: 2025-3-26 13:38 作者: 怒目而視 時間: 2025-3-26 19:54
Strategische Onlinekommunikationong practical motivation for the paradigm is derived from the rapidly expanding popularity of cloud computing (CC) services. It is noted that CC characteristically provides an environment in which multiple jobs can be received from multiple users at the same time. Thus, assuming each job to correspo作者: 費解 時間: 2025-3-26 20:57
https://doi.org/10.1007/978-3-322-97678-9are error among the feature vectors. The proposed work also compares the performance of RBFNN with AANN. By comparing the results of the two models, AANN performs well and produces better results than RBFNN using MFCC features in terms of accuracy.作者: 會議 時間: 2025-3-27 04:34
https://doi.org/10.1007/978-3-322-97678-9mber of compressive sensing measurements to reconstruct the image are used to analyze the quality of the decryption image. The numerical results demonstrate the system to be highly complex, robust and secure.作者: Mammal 時間: 2025-3-27 05:29 作者: 悠然 時間: 2025-3-27 12:18
Aufbau der empirischen Untersuchung,tioned into four sub-images to reduce the effects of noise and nonlinear distortions. Finally a total of four sets of seven invariant moment features are extracted from four partitioned sub-images of an ROI of the approximation coefficient as it will contain low frequency components. To measure the 作者: Chipmunk 時間: 2025-3-27 15:55 作者: 沉積物 時間: 2025-3-27 18:21
Analysis of Throat Microphone Using MFCC Features for Speaker Recognitionare error among the feature vectors. The proposed work also compares the performance of RBFNN with AANN. By comparing the results of the two models, AANN performs well and produces better results than RBFNN using MFCC features in terms of accuracy.作者: handle 時間: 2025-3-27 23:57 作者: Fatten 時間: 2025-3-28 04:33 作者: CRAMP 時間: 2025-3-28 09:23 作者: 詩集 時間: 2025-3-28 13:28
The Game of Wall Cops and Robbers game, the cops are free to move to any vertex and build a wall; once a vertex contains a wall, the robber may not move there. Otherwise, the robber moves from vertex-to-vertex along edges. The cops capture the robber if the robber is surrounded by walls. The . of a graph ., written . is the least n作者: 松緊帶 時間: 2025-3-28 15:48
Smartphone Applications, Malware and Data Theftalicious authors. Analysing applications in order to identify malicious ones is a current major concern in information security; an additional problem connected with smart-phone applications is that their many advertising libraries can lead to loss of personal information. In this paper, we relate t作者: 火海 時間: 2025-3-28 19:13 作者: flaunt 時間: 2025-3-28 23:04
Generating a Standardized Upper Ontology for Security of Information and Networksure systems. That in turn necessitates ontologizing security of information and networks to start with and then standardization. Having involved in the fields of semantic technology and information assurance, I have strived to facilitate establishing an interface between them and for this reason SIN作者: aviator 時間: 2025-3-29 06:16 作者: Ataxia 時間: 2025-3-29 07:32 作者: 顧客 時間: 2025-3-29 14:09
Kernel Online Multi-task Learningng problem as a single unit and does not incorporate information associated with the tasks that are closely related with it. Such anomalies have been rectified in the Multi-Task learning (MTL) paradigm, where the model learns a modeling problem, by making use of its associated tasks. Such modeling s作者: airborne 時間: 2025-3-29 17:51
Performance Evaluation of Sentiment Classification Using Query Strategies in a Pool Based Active Leaata applications), human annotators are required to label the data, which is very expensive and time consuming. This aspect is resolved by adopting the Active Learning approach to create labelled data from the available unlabelled data by actively choosing the most appropriate or most informative in作者: exceed 時間: 2025-3-29 20:43 作者: 600 時間: 2025-3-30 03:12 作者: Type-1-Diabetes 時間: 2025-3-30 04:20 作者: Analogy 時間: 2025-3-30 09:54 作者: 采納 時間: 2025-3-30 15:52 作者: PAD416 時間: 2025-3-30 18:58
A Novel Feature Extraction Algorithm from Fingerprint Image in Wavelet Domain quality features, the quality of the image is to be improved through denoising and enhancement. In this paper, a set of invariant moment features are extracted from the approximation coefficient in the wavelet domain. Initially the fingerprint image is denoised using Stationary Wavelet Transform (S作者: gene-therapy 時間: 2025-3-30 23:45 作者: Phonophobia 時間: 2025-3-31 02:12 作者: 債務(wù) 時間: 2025-3-31 05:46 作者: Genistein 時間: 2025-3-31 12:46
Muthukrishnan Senthilkumar,Vijayalakshmi Ramasamy,ideas in the field of computer science and mathematics.theory and applications, to provide design, analysis and modelling.of Computational Intelligence, Cyber Security, and Computational Models.Useful作者: 有惡臭 時間: 2025-3-31 17:10