派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computational Intelligence, Data Analytics and Applications; Selected papers from Fausto Pedro García Márquez,Akhtar Jamil,Alaa Ali Confer [打印本頁(yè)]

作者: 手鐲    時(shí)間: 2025-3-21 16:05
書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications影響因子(影響力)




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications被引頻次




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications被引頻次學(xué)科排名




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications年度引用




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications年度引用學(xué)科排名




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications讀者反饋




書(shū)目名稱(chēng)Computational Intelligence, Data Analytics and Applications讀者反饋學(xué)科排名





作者: Conspiracy    時(shí)間: 2025-3-21 22:48
Autonomous Mobile Robot Mapping and Exploration of an Indoor Environment,contact configuration and the subsequent motion required by the task. SLAM solves the challenge of robots exploring an unknown area. The robot’s goal is to collect information while exploring the environment to develop a map it, so it wants to use its map to determine its location. The current study
作者: SPURN    時(shí)間: 2025-3-22 03:28
,Medical Image Transmission Using a?Secure Cryptographic Approach for?IoMT Applications,eliminates data loss, encryption is the greatest solution for image secrecy. Traditional encryption methods, on the other hand, are difficult to apply to electronic health data due to data size limitations, redundancy, and scalability, especially when the data of a patient is delivered via different
作者: Cursory    時(shí)間: 2025-3-22 05:44

作者: paragon    時(shí)間: 2025-3-22 08:51
Assessment of Grey Wolf Optimizer and Its Variants on Benchmark Functions,e is no need for information during the first search, GWO has been adapted to different optimization problems, giving it superiority over other metaheuristic methods. At the same time, it is easy to use, simple, scalable, and adaptable, with its unique ability to provide the ideal balance throughout
作者: PRISE    時(shí)間: 2025-3-22 14:47

作者: PRISE    時(shí)間: 2025-3-22 21:06

作者: 本能    時(shí)間: 2025-3-22 22:01
HST-Detector: A Multimodal Deep Learning System for Twitter Spam Detection, good detection rate. To bypass the existing systems and reduce their recognition rate, attackers inject spam information into various portions of tweets and fuse them. Therefore, a powerful Heterogeneous Spam Tweets (HST) filtering system is necessary to fully protect users. To address the above ch
作者: 斗志    時(shí)間: 2025-3-23 02:11
Analysis of Deep Learning Sequence Models for Short Term Load Forecasting,vironmental aspects. In this study, two different deep learning (DL) model architectures based on Long Short Term Memory (LSTM) and Convolutional Neural Networks (CNN) were tested and compared on load datasets from Spain and Turkey. In addition, a novel Long Short Term Memory (LSTM) model with embed
作者: 開(kāi)始發(fā)作    時(shí)間: 2025-3-23 09:04
Security Issues for Banking Systems,ir clientele and constituents. Since the early 2000s, banks and other financial institutions have grown increasingly reliant on computers and the internet to manage day-to-day operations, client interactions, and market activity. Damage to a bank‘s reputation and bottom line can result from security
作者: 正式通知    時(shí)間: 2025-3-23 10:06

作者: 的染料    時(shí)間: 2025-3-23 14:18

作者: Carcinogenesis    時(shí)間: 2025-3-23 20:29

作者: 拍下盜公款    時(shí)間: 2025-3-24 02:14
,Secure Image Data Encryption Scheme for?5G Internet of?Things Applications,ork is being developed to deliver massive capacity, large bandwidth, and reduced latency. The creation and invention of new 5G-IoT approaches will undoubtedly result in massive new security and privacy issues. 5G-IoT technologies will need secure data transfer mechanisms as the foundation to solve t
作者: Accede    時(shí)間: 2025-3-24 02:24

作者: 間諜活動(dòng)    時(shí)間: 2025-3-24 08:54
Multiband Microstrip Elliptical Monopole Antenna Design with Mushroom-Like Loadings for DCS, 5G andG and Ku-band has been realized. The proposed monopole antenna consists of an elliptical patch element and mushroom-shaped metallic loadings placed on both sides of this patch. The elliptical patch element operates in the 3.3–3.8?GHz range for the mid-band 5G frequency band alone. In addition, the m
作者: 欺騙世家    時(shí)間: 2025-3-24 11:39
An IoT-Based Modular Avionics and Electrical System for Nanosatellite Systems,tion missions compatible with air-land-sea vehicle platforms, particularly nanosatellite platforms. The nanosatellite avionics, which has a real-time operating system that supports frequently used interfaces, processes and manages sensory and physical data based on a central processor. It executes a
作者: 束以馬具    時(shí)間: 2025-3-24 16:29

作者: 材料等    時(shí)間: 2025-3-24 20:23

作者: 亞當(dāng)心理陰影    時(shí)間: 2025-3-25 02:59

作者: 是比賽    時(shí)間: 2025-3-25 04:30
https://doi.org/10.1007/978-3-663-08995-7ce it relies on the outcome of the final map. This paper discusses, the comparison of SLAM Toolbox, G-mapping, Hector SLAM and Karto-SLAM methodologies through real-world testing in a dedicated environment, a discussion the output maps of SLAM algorithms, their advantages and disadvantages are prese
作者: 大量殺死    時(shí)間: 2025-3-25 08:33

作者: 催眠    時(shí)間: 2025-3-25 11:54

作者: 不如屎殼郎    時(shí)間: 2025-3-25 19:23
Strategische Planung im Beschwerdemanagemente selected accordingly. The limits of the geometric design were determined based on the system requirements. Within the scope of the kinematic model of the robotic arm, the general transformation matrix is also obtained based on all its joints and links.
作者: Cpr951    時(shí)間: 2025-3-25 21:44
Strategische Planung im Beschwerdemanagementatiometricity analysis, which is important in applications that require long-term data collection, but is generally overlooked, was also performed through collecting continuous acceleration data for twelve hours. Ratiometric error was numerically quantified and completely subtracted from the raw dat
作者: OWL    時(shí)間: 2025-3-26 03:24
Strategische Planung im Beschwerdemanagements used to decide if the tweet is malicious or legitime. This system is more efficient than the existing spam filtering systems trained on Image Spam Hunter (ISH), Dredze, and Honeypot datasets. The proposed system can achieve accuracies of 98% on heterogeneous tweet datasets.
作者: helper-T-cells    時(shí)間: 2025-3-26 07:34
https://doi.org/10.1007/978-3-8350-9394-2 and banks to put adequate security controls and information security governance frameworks (ISGF) to ensure data accessibility to all the authorized users, and prevent intruders to gain access to the banking information system. Security measures strengthen the safeguards against all types of threat
作者: 混雜人    時(shí)間: 2025-3-26 11:00
https://doi.org/10.1007/978-3-8350-9394-2ensure maximum safety for both the rider and the vehicle. The metrics proposed which indicate whether the smart bike is safe to ride are also presented. The proposed approach is implemented on a real-life smart autonomous bike prototype. Furthermore, this paper provides guidelines on how to use Mean
作者: ETCH    時(shí)間: 2025-3-26 16:39
https://doi.org/10.1007/978-3-8350-9394-2imated as significant ones. In general, this approach could be useful strategy for the classification performance improvement and, especially, effective for the small models (like MobileNetV2) for Edge Computing devices with limited computational resources to classify DR severities and in the more g
作者: 密碼    時(shí)間: 2025-3-26 17:59

作者: Bereavement    時(shí)間: 2025-3-26 21:02

作者: 有幫助    時(shí)間: 2025-3-27 04:13
https://doi.org/10.1007/978-3-658-42696-5aset is used to create the reinforcement learning environment to train and evaluate the proposed model. The experimental results show that our proposed reinforcement learning approach outperforms other related solutions in the literature, achieving an accuracy that exceeds 93%.
作者: Congestion    時(shí)間: 2025-3-27 05:56

作者: 擴(kuò)音器    時(shí)間: 2025-3-27 11:24
Priority-Based Pollution Management ITS,thm for road vehicles where priorities will be assigned both statically and dynamically following certain criteria. The results of our routing algorithm will be benchmarked against the most commonly used shortest-path routing algorithm, where we will be able to evaluate the impact of our algorithm o
作者: abduction    時(shí)間: 2025-3-27 15:18

作者: homocysteine    時(shí)間: 2025-3-27 18:31
,Medical Image Transmission Using a?Secure Cryptographic Approach for?IoMT Applications,lightweight encryption algorithm first separates the image into multiple clusters and then employs cluster-based permutations. Other procedures like diffusion and modulation could be used after that. The suggested technique is studied, analysed, and compared to generally encrypted ones in terms of i
作者: Lyme-disease    時(shí)間: 2025-3-28 00:16
Assessment of Grey Wolf Optimizer and Its Variants on Benchmark Functions,augmented GWO (AGWO) methods are examined, and the performances of these methods are discussed in CEC’20 functions and analyzed statistically. The results of the studies demonstrated that IGWO outperformed standard GWO and AGWO.
作者: 爆炸    時(shí)間: 2025-3-28 05:48

作者: 中子    時(shí)間: 2025-3-28 09:45
Reliability of MEMS Accelerometers Embedded in Smart Mobile Devices for Robotics Applications,atiometricity analysis, which is important in applications that require long-term data collection, but is generally overlooked, was also performed through collecting continuous acceleration data for twelve hours. Ratiometric error was numerically quantified and completely subtracted from the raw dat
作者: Fibrin    時(shí)間: 2025-3-28 12:45

作者: 使人入神    時(shí)間: 2025-3-28 14:40

作者: 陰郁    時(shí)間: 2025-3-28 19:01
Smart Autonomous Bike Hardware Safety Metrics,ensure maximum safety for both the rider and the vehicle. The metrics proposed which indicate whether the smart bike is safe to ride are also presented. The proposed approach is implemented on a real-life smart autonomous bike prototype. Furthermore, this paper provides guidelines on how to use Mean
作者: 女上癮    時(shí)間: 2025-3-29 01:52

作者: hermetic    時(shí)間: 2025-3-29 04:02
,Symptom Based Health Status Prediction via?Decision Tree, KNN, XGBoost, LDA, SVM, and?Random Forestsease and have a prediction about the diseases of people who do not have the condition to go to the hospital. In this way, it can ease the burden on health systems. The disease outcome corresponding to the 11 symptoms found in the data set used is previously experienced results. During the study, di
作者: 提煉    時(shí)間: 2025-3-29 10:23
An IoT-Based Modular Avionics and Electrical System for Nanosatellite Systems,rough processing the data obtained from the sensors, critical information such as instant detection and tracking of systems errors are transmitted to the cloud, and as a result, proper control can be provided regardless of location. This critical data obtained from the cloud is straightforwardly tra
作者: Asymptomatic    時(shí)間: 2025-3-29 12:04
,Reinforcement Learning for?Intrusion Detection,aset is used to create the reinforcement learning environment to train and evaluate the proposed model. The experimental results show that our proposed reinforcement learning approach outperforms other related solutions in the literature, achieving an accuracy that exceeds 93%.
作者: COLIC    時(shí)間: 2025-3-29 16:32
Comparison of Small-Sized Deep Neural Network Models for Hyperspectral Image Classification,ks with different characteristics and changing parameters were examined. In this way, the effect of other methods on the classification results was also discussed. Within the scope of the whole study, all methods were tested on Indian Pines, Salinas and Pavia University datasets, frequently preferre
作者: 欄桿    時(shí)間: 2025-3-29 21:24
Computational Intelligence, Data Analytics and ApplicationsSelected papers from
作者: Tincture    時(shí)間: 2025-3-30 00:34
https://doi.org/10.1007/978-3-031-27099-4Natural language processing; Medical image processing; machine learning; internet of things; exploratory
作者: 河流    時(shí)間: 2025-3-30 04:55

作者: instate    時(shí)間: 2025-3-30 10:17

作者: 美色花錢(qián)    時(shí)間: 2025-3-30 14:19

作者: Formidable    時(shí)間: 2025-3-30 20:04

作者: Omnipotent    時(shí)間: 2025-3-30 22:03

作者: Galactogogue    時(shí)間: 2025-3-31 01:35
https://doi.org/10.1007/978-3-663-08995-7eliminates data loss, encryption is the greatest solution for image secrecy. Traditional encryption methods, on the other hand, are difficult to apply to electronic health data due to data size limitations, redundancy, and scalability, especially when the data of a patient is delivered via different
作者: ferment    時(shí)間: 2025-3-31 08:38

作者: ineptitude    時(shí)間: 2025-3-31 09:22
Strategische Planung im Beschwerdemanagemente is no need for information during the first search, GWO has been adapted to different optimization problems, giving it superiority over other metaheuristic methods. At the same time, it is easy to use, simple, scalable, and adaptable, with its unique ability to provide the ideal balance throughout
作者: SOW    時(shí)間: 2025-3-31 15:04

作者: CAGE    時(shí)間: 2025-3-31 20:21

作者: Orchiectomy    時(shí)間: 2025-3-31 23:38

作者: Statins    時(shí)間: 2025-4-1 05:20
Strategische Planung im Beschwerdemanagementvironmental aspects. In this study, two different deep learning (DL) model architectures based on Long Short Term Memory (LSTM) and Convolutional Neural Networks (CNN) were tested and compared on load datasets from Spain and Turkey. In addition, a novel Long Short Term Memory (LSTM) model with embed




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
华宁县| 沾化县| 孝感市| 乐安县| 辽阳市| 莎车县| 长治县| 英吉沙县| 梁山县| 镇平县| 辰溪县| 齐河县| 望城县| 双流县| 洞口县| 阿尔山市| 玛纳斯县| 莱芜市| 恭城| 东阿县| 卢龙县| 梅州市| 柳林县| 来宾市| 涟水县| 威远县| 三河市| 繁峙县| 莲花县| 汶川县| 涿州市| 阿鲁科尔沁旗| 吉隆县| 永济市| 肇东市| 鱼台县| 中超| 抚宁县| 江达县| 桂阳县| 抚松县|