標題: Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3, G. Sai Sundara Krishnan,R. Anitha,Manuel Gra?a Co [打印本頁] 作者: 貶損 時間: 2025-3-21 19:52
書目名稱Computational Intelligence, Cyber Security and Computational Models影響因子(影響力)
書目名稱Computational Intelligence, Cyber Security and Computational Models影響因子(影響力)學科排名
書目名稱Computational Intelligence, Cyber Security and Computational Models網(wǎng)絡公開度
書目名稱Computational Intelligence, Cyber Security and Computational Models網(wǎng)絡公開度學科排名
書目名稱Computational Intelligence, Cyber Security and Computational Models被引頻次
書目名稱Computational Intelligence, Cyber Security and Computational Models被引頻次學科排名
書目名稱Computational Intelligence, Cyber Security and Computational Models年度引用
書目名稱Computational Intelligence, Cyber Security and Computational Models年度引用學科排名
書目名稱Computational Intelligence, Cyber Security and Computational Models讀者反饋
書目名稱Computational Intelligence, Cyber Security and Computational Models讀者反饋學科排名
作者: Induction 時間: 2025-3-21 23:16
PR-Evaluation in Wissenschaft und Praxis,epends on the prevalence of the disease in the immediate neighborhood. One approach to handling such linked data is “collective learning.” In collective learning, one deals with a set of data points taken at a time. The dependencies between the data points are modeled as a graph, with the nodes repr作者: 裹住 時間: 2025-3-22 00:37 作者: CRASS 時間: 2025-3-22 08:19
,Modell für strategische PR-Evaluation,In the context of the famous Internet file size data of Crovella and some very recent data sets from a wireless mobility network, we examine the new class of LogPH distributions introduced by Ramaswami for modeling heavy-tailed random variables. The fits obtained are validated using separate trainin作者: LEVY 時間: 2025-3-22 10:43 作者: 濃縮 時間: 2025-3-22 13:48 作者: 濃縮 時間: 2025-3-22 18:01
,Modell für strategische PR-Evaluation,ive of this paper is to identify the optimal subset of genes from the leukemia dataset in order to classify the leukemia cancer. Different clustering approaches such as .-means (KM) clustering, fuzzy .-means (FCM) clustering, and modified .-means (MKM) clustering have been adopted in this research. 作者: xanthelasma 時間: 2025-3-23 01:15
,Instrument für strategische PR-Evaluation,tion of roadside units (RSU) that takes part in communication between vehicular nodes is a challenging task because of the high mobility or dynamic nature of these networks. The nodes in the VANET whether stationary or moving are limited in terms of storage capacity, reliability, and energy. The mai作者: 不溶解 時間: 2025-3-23 04:03 作者: expire 時間: 2025-3-23 08:52
https://doi.org/10.1007/978-3-322-99607-7on in the presence of simultaneous sources of drift, other than sensor drift, should also be investigated, since it is often the case in practical situations. ELM is a competitive machine learning technique, which has been applied in different domains for classification. In this paper, ELM with diff作者: 異教徒 時間: 2025-3-23 11:38 作者: 針葉類的樹 時間: 2025-3-23 17:54
,Methodik für strategische PR-Evaluation,n-availability of fault data which makes the application of supervised technique difficult. In such cases, unsupervised techniques are helpful. In this paper, a hyper-quadtree-based K-means algorithm has been applied for predicting the faults in the program module. This paper contains two parts. Fir作者: LUMEN 時間: 2025-3-23 19:31
PR-Evaluation in Wissenschaft und Praxis,ain attraction as an imaging modality lies in its non-invasive characteristic and ability to distinguish interfaces between soft tissues. Diagnostic ultrasound can be used to find out the cyst and tumors in the abdominal organs. Considering the importance of measurement of volume of the urinary blad作者: cataract 時間: 2025-3-24 02:01
https://doi.org/10.1007/978-3-322-97685-7ls from large amount of genes. Classification is also a major issue in data mining. The classification difficulties in medical area often classify medical dataset based on the outcomes of medical analysis or report of medical action by the medical practitioner. In this study, a prediction model is p作者: catagen 時間: 2025-3-24 06:03
https://doi.org/10.1007/978-3-322-97685-7sing mammogram is a difficult task because of complexity in the image. This brings the necessity of creating automatic tools to find whether a tumor is present or not. In this paper, rough set theory (RST) is integrated with back-propagation network (BPN) to classify digital mammogram images. Basica作者: Glucose 時間: 2025-3-24 10:15 作者: 尖牙 時間: 2025-3-24 11:00 作者: debble 時間: 2025-3-24 18:12
G. Sai Sundara Krishnan,R. Anitha,Manuel Gra?aProvides information on recent research trends in areas of computational intelligence, cyber security, and computational models.Includes theories and applications to provide design, analysis, and mode作者: 牛馬之尿 時間: 2025-3-24 21:49 作者: BAIL 時間: 2025-3-25 00:12
The Robber Strikes Backtex containing a single cop, then that cop is removed from the game. We study the minimum number of cops needed to capture a robber on a graph ., written cc(.). We give bounds on cc(.) in terms of the cop number of . in the classes of bipartite graphs and diameter two, ..,.-free graphs.作者: Fracture 時間: 2025-3-25 07:16 作者: 好忠告人 時間: 2025-3-25 11:02 作者: 臥虎藏龍 時間: 2025-3-25 15:12 作者: 平淡而無味 時間: 2025-3-25 16:49 作者: 蔓藤圖飾 時間: 2025-3-25 20:08
Measurement of Volume of Urinary Bladder by Implementing Localizing Region-Based Active Contour Segmmation about the abnormalities of the bladder and also the extent of abnormality. Experimental results show good performance of the proposed model in segmenting urinary bladder to measure its exact area and volume.作者: 指派 時間: 2025-3-26 00:38
Improved Bijective-Soft-Set-Based Classification for Gene Expression Data are breast cancer, lung cancer, and leukemia cancer. The proposed algorithm is also compared with fuzzy-soft-set-based classification algorithms, fuzzy KNN, and k-nearest neighbor approach. Comparative analysis of the proposed approach shows good accuracy over other methods.作者: separate 時間: 2025-3-26 06:55 作者: Accolade 時間: 2025-3-26 09:36
2194-5357 l academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.978-81-322-1679-7978-81-322-1680-3Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 尋找 時間: 2025-3-26 13:18 作者: 下級 時間: 2025-3-26 19:41
PR-Evaluation in Wissenschaft und Praxis,mation about the abnormalities of the bladder and also the extent of abnormality. Experimental results show good performance of the proposed model in segmenting urinary bladder to measure its exact area and volume.作者: interrupt 時間: 2025-3-27 00:22 作者: antiquated 時間: 2025-3-27 03:15 作者: 異端邪說下 時間: 2025-3-27 05:42 作者: 北極人 時間: 2025-3-27 10:26
Registration of Ultrasound Liver Images Using Mutual Information Techniquetropic diffusion (SRAD) filter and median filter called S-mean filter. This work focuses on the registration of ultrasound liver images, and comparison is done by means of optimization techniques using MI, to bring utmost accuracy in computation time, and is very well suited for clinical applications.作者: 遺傳學 時間: 2025-3-27 15:54
Conference proceedings 2014y areas. The book will be useful material for students, researchers, professionals, as well academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.作者: 原告 時間: 2025-3-27 18:22
,Methodik für strategische PR-Evaluation,mart software. Adaptation recognizes that access control must adjust as circumstances change. This talk will speculate on a future built around these three synergistic elements and on the research and technology challenges in making this vision a reality.作者: Nonflammable 時間: 2025-3-27 22:59
,Modell für strategische PR-Evaluation,oduces more accurate classification results. It is observed that the FCM (gene-wise clustering) with .-means (sample-wise clustering) produces better accuracy, and the resultant genes have been identified.作者: progestogen 時間: 2025-3-28 02:33 作者: prolate 時間: 2025-3-28 06:24
https://doi.org/10.1007/978-3-322-97685-7age using GLCM, GLDM, SRDM, NGLCM, and GLRM. Then, the features are normalized, discretized, and then reduced using RST. After that, the classification is performed using RNN. The experimental results show that the RNN performs better than BPN in terms of classification accuracy.作者: 治愈 時間: 2025-3-28 12:46
The Future of Access Control: Attributes, Automation, and Adaptationmart software. Adaptation recognizes that access control must adjust as circumstances change. This talk will speculate on a future built around these three synergistic elements and on the research and technology challenges in making this vision a reality.作者: Liberate 時間: 2025-3-28 15:54 作者: 漸變 時間: 2025-3-28 19:23 作者: 秘密會議 時間: 2025-3-28 23:57 作者: FILTH 時間: 2025-3-29 04:20
PR-Evaluation in Wissenschaft und Praxis, to such graph-based modeling. There have been a variety of collective learning and inferencing approaches that have been proposed in the literature. In this talk, I will give a brief introduction to collective learning and describe two applications.作者: 指數(shù) 時間: 2025-3-29 09:14
,Modell für strategische PR-Evaluation,Using Markov decision theory, the optimal switching policy can be determined for any of these criteria by the value-iteration algorithm. In the calculation of the expected one-step costs and the transition probabilities, an essential role is played by the discrete fast Fourier transform.作者: 拱墻 時間: 2025-3-29 14:57
,Instrument für strategische PR-Evaluation,ic or stable. In this paper, we discuss a clustering-based architecture designed with mobile agents and a combination of MH-LEACH and power-efficient gathering in sensor information systems (PEGASIS) protocols for building stability in VANET for seamless communication along with energy conservation of other RSU to improve quality of service.作者: 天氣 時間: 2025-3-29 15:38 作者: Cytokines 時間: 2025-3-29 21:46 作者: 同義聯(lián)想法 時間: 2025-3-30 02:50
Some Applications of Collective Learning to such graph-based modeling. There have been a variety of collective learning and inferencing approaches that have been proposed in the literature. In this talk, I will give a brief introduction to collective learning and describe two applications.作者: Disk199 時間: 2025-3-30 07:45
Optimal Control for an ,,,1,?+?1 Queue with Two Service ModesUsing Markov decision theory, the optimal switching policy can be determined for any of these criteria by the value-iteration algorithm. In the calculation of the expected one-step costs and the transition probabilities, an essential role is played by the discrete fast Fourier transform.作者: 嫌惡 時間: 2025-3-30 09:55 作者: 蝕刻 時間: 2025-3-30 14:57 作者: Confound 時間: 2025-3-30 16:57
Hippocampus Atrophy Detection Using Hybrid Semantic Categorizationatrophy detection of the proposed system is found to be more effective than the identification done by the traditional system of radiologist. Performance measures such as sensitivity, specificity, and accuracy are used to evaluate the system.作者: Indict 時間: 2025-3-30 20:50 作者: Coeval 時間: 2025-3-31 02:22 作者: outrage 時間: 2025-3-31 05:22 作者: 2否定 時間: 2025-3-31 10:32 作者: 名字的誤用 時間: 2025-3-31 14:20 作者: CRANK 時間: 2025-3-31 20:30 作者: OVERT 時間: 2025-4-1 01:11 作者: antiquated 時間: 2025-4-1 03:22
The Robber Strikes Backtex containing a single cop, then that cop is removed from the game. We study the minimum number of cops needed to capture a robber on a graph ., written cc(.). We give bounds on cc(.) in terms of the cop number of . in the classes of bipartite graphs and diameter two, ..,.-free graphs.