標(biāo)題: Titlebook: Computational Methods and Data Engineering; Proceedings of ICMDE Vijendra Singh,Vijayan K. Asari,R. B. Patel Conference proceedings 2021 Sp [打印本頁(yè)] 作者: CHAFF 時(shí)間: 2025-3-21 19:35
書目名稱Computational Methods and Data Engineering影響因子(影響力)
書目名稱Computational Methods and Data Engineering影響因子(影響力)學(xué)科排名
書目名稱Computational Methods and Data Engineering網(wǎng)絡(luò)公開(kāi)度
書目名稱Computational Methods and Data Engineering網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Computational Methods and Data Engineering被引頻次
書目名稱Computational Methods and Data Engineering被引頻次學(xué)科排名
書目名稱Computational Methods and Data Engineering年度引用
書目名稱Computational Methods and Data Engineering年度引用學(xué)科排名
書目名稱Computational Methods and Data Engineering讀者反饋
書目名稱Computational Methods and Data Engineering讀者反饋學(xué)科排名
作者: 1分開(kāi) 時(shí)間: 2025-3-21 20:41
Hybrid ANFIS-GA and ANFIS-PSO Based Models for Prediction of Type 2 Diabetes Mellitus,yle modifications. Diabetes increases the risk of developing various health as well as financial problems to cure these health complications. The health complications are stroke, myocardial infarction, and coronary artery disease. Nerve, muscle, kidney and retinal damage have distressing impact on t作者: 箴言 時(shí)間: 2025-3-22 00:32 作者: 綁架 時(shí)間: 2025-3-22 06:36 作者: Subdue 時(shí)間: 2025-3-22 12:11
Feature-Based Supervised Classifier to Detect Rumor in Social Media,isocial elements for spreading and distributing rumors that is unverified information. Malicious and intended misinformation spread on social media has a severe effect on societies, people and individuals, especially in case of real-life emergencies such as terror strikes, riots, earthquakes, floods作者: Orchiectomy 時(shí)間: 2025-3-22 14:45 作者: Orchiectomy 時(shí)間: 2025-3-22 19:08 作者: 機(jī)制 時(shí)間: 2025-3-22 22:01 作者: 流逝 時(shí)間: 2025-3-23 04:55 作者: 指令 時(shí)間: 2025-3-23 07:41
A Review on Cyber Security in Metering Infrastructure of Smart Grids, the Smart Grid networks. The traditional and general security solutions applicable to hardware devices, network elements and software applications are no longer able to provide comprehensive readymade alternatives to secure the systems. As the scalability of the system increases, component-wise sec作者: 秘密會(huì)議 時(shí)間: 2025-3-23 09:57 作者: mastoid-bone 時(shí)間: 2025-3-23 14:23 作者: 懸崖 時(shí)間: 2025-3-23 19:41
Tabu-Embedded Simulated Annealing Algorithm for Profile Minimization Problem,y that the sum of profiles of the vertices in . is minimized, where the profile of a vertex is the difference of its labeling with the labeling of its left most neighbor in the layout. It is an NP-complete problem and has applications in various areas such as numerical analysis, fingerprinting, and 作者: Commemorate 時(shí)間: 2025-3-23 23:02
Deep Learning-Based Asset Prognostics, to loss of market share to more productive firms. Due to Industry 4.0 and large-scale automation, many plants have been equipped with complex, automatic and computer-controlled machines. The conventional run-to-failure maintenance system, i.e., repairing machines after complete failure lead to unex作者: 多產(chǎn)魚 時(shí)間: 2025-3-24 04:56 作者: PALMY 時(shí)間: 2025-3-24 09:41
XGBoost: 2D-Object Recognition Using Shape Descriptors and Extreme Gradient Boosting Classifier, A fusion of several feature detector and descriptors (SIFT, SURF, ORB, and Shi Tomasi corner detector algorithm) is taken into consideration to achieve the better object recognition results. Various classifiers are experimented with these feature descriptors separately and various combinations of t作者: IDEAS 時(shí)間: 2025-3-24 11:30
Comparison of Principle Component Analysis and Stacked Autoencoder on NSL-KDD Dataset,era, large space and high processing are available. The main concern is to reduce the time to solve any problem. In computer networks, malicious activities are increasing rapidly due to the exponential growth of the number of users on the Internet. Many classification models have been developed that作者: 猛烈責(zé)罵 時(shí)間: 2025-3-24 16:08
Maintainability Configuration for Component-Based Systems Using Fuzzy Approach,d by the scientist and researchers, to reduce the cost of maintenance, for improving the excellence and life period of a component-based system. Various quality models have been discussed briefly to show importance of maintainability. This research will facilitate the software designer to assemble m作者: 愛(ài)花花兒憤怒 時(shí)間: 2025-3-24 20:03
Development of Petri Net-Based Design Model for Energy Efficiency in Wireless Sensor Networks, limitations for these types of networks. Energy conservation is a very prominent way to improve energy efficiency specially in communication. It is evident from the research in recent past that major part of energy is consumed in inter-node data transmission. This chapter is dedicated to design and作者: cinder 時(shí)間: 2025-3-25 02:52 作者: Conquest 時(shí)間: 2025-3-25 03:38 作者: Anticonvulsants 時(shí)間: 2025-3-25 08:19
Sonstige Baufl?chen und Freifl?cheneads to a challenge to provide the fruitful information to end users. To overcome this problem, recommendation system plays a decisive role in providing pragmatic information to end users at appropriate time. This paper proposes a topic modeling based recommendation system to provide contents relate作者: 自由職業(yè)者 時(shí)間: 2025-3-25 15:39 作者: Lobotomy 時(shí)間: 2025-3-25 18:23 作者: anchor 時(shí)間: 2025-3-25 23:29
https://doi.org/10.1007/978-3-642-99607-8nication tool for deaf and mute society, irrespective of geographical differences. Automatic sign language recognition system works broadly in three phases namely image pre-processing, feature extraction and classification of gestures. The output of the feature extraction phase is crucial for variou作者: CHANT 時(shí)間: 2025-3-26 00:46 作者: compel 時(shí)間: 2025-3-26 04:42 作者: 善變 時(shí)間: 2025-3-26 11:29
Handbibliothek für Bauingenieurevehicles led to traffic congestion all around the world. Traffic congestion causes air pollution, increases fuel consumption, and costs many hours to the road users. The establishment of new highways and expanding the existing ones is an expensive solution and sometimes may not be possible everywher作者: MIR 時(shí)間: 2025-3-26 16:21 作者: Rct393 時(shí)間: 2025-3-26 17:01
Otto Blum,G. Schimpff,W. Schmidt Phishing is a crime that can be committed over the internet by the attacker to fetches the personal credentials of a user by asking their details like login/credit or debit card credentials, etc. for financial gains. Since 1996 phishing is a well-known threat and internet crime. Research community 作者: foreign 時(shí)間: 2025-3-26 21:39
Otto Blum,G. Schimpff,W. Schmidt the Smart Grid networks. The traditional and general security solutions applicable to hardware devices, network elements and software applications are no longer able to provide comprehensive readymade alternatives to secure the systems. As the scalability of the system increases, component-wise sec作者: 溫順 時(shí)間: 2025-3-27 02:14 作者: exorbitant 時(shí)間: 2025-3-27 05:36
Otto Blum,G. Schimpff,W. Schmidtadjacent vertices of . in tree is minimized. It is an NP-hard problem with applications in communication networks. In this paper, a general variable neighborhood search (GVNS) algorithm is developed for MSSTP in which initial solution is generated using four well-known heuristics and a problem-speci作者: 把…比做 時(shí)間: 2025-3-27 12:07 作者: 防水 時(shí)間: 2025-3-27 17:06 作者: 精致 時(shí)間: 2025-3-27 20:48 作者: gratify 時(shí)間: 2025-3-27 22:50
https://doi.org/10.1007/978-3-322-80176-0 A fusion of several feature detector and descriptors (SIFT, SURF, ORB, and Shi Tomasi corner detector algorithm) is taken into consideration to achieve the better object recognition results. Various classifiers are experimented with these feature descriptors separately and various combinations of t作者: faucet 時(shí)間: 2025-3-28 04:02 作者: Hypopnea 時(shí)間: 2025-3-28 10:05
,Bev?lkerungsstruktur und Siedlungswesen,d by the scientist and researchers, to reduce the cost of maintenance, for improving the excellence and life period of a component-based system. Various quality models have been discussed briefly to show importance of maintainability. This research will facilitate the software designer to assemble m作者: 吊胃口 時(shí)間: 2025-3-28 12:51
,Bev?lkerungsstruktur und Siedlungswesen, limitations for these types of networks. Energy conservation is a very prominent way to improve energy efficiency specially in communication. It is evident from the research in recent past that major part of energy is consumed in inter-node data transmission. This chapter is dedicated to design and作者: dapper 時(shí)間: 2025-3-28 17:33 作者: Mundane 時(shí)間: 2025-3-28 20:26
978-981-15-6875-6Springer Nature Singapore Pte Ltd. 2021作者: venous-leak 時(shí)間: 2025-3-29 01:11 作者: 責(zé)怪 時(shí)間: 2025-3-29 05:54 作者: NUL 時(shí)間: 2025-3-29 11:06
An Overview of Use of Artificial Neural Network in Sustainable Transport System,for prediction algorithms. The objective of this study is to discuss the ANN technique and its use in transportation engineering. The paper also gives an overview of the advantages and disadvantages of ANN. Regular maintenance within the urban road infrastructure is a complex problem from both techn作者: 錯(cuò)事 時(shí)間: 2025-3-29 14:53
On Roman Domination of Graphs Using a Genetic Algorithm,ped, and a feasibility function has been employed to maintain the feasibility of solutions obtained from the crossover operator. Experiments have been conducted on different types of graphs with known optimal results and on 120 instances of Harwell–Boeing graphs for which bounds are known. The algor作者: Evolve 時(shí)間: 2025-3-29 18:27 作者: upstart 時(shí)間: 2025-3-29 21:44
XGBoost: 2D-Object Recognition Using Shape Descriptors and Extreme Gradient Boosting Classifier,ree, random forest, and XGBClassifier, is made in terms of performance evaluation measures. The chapter demonstrates that XGBClassifier outperforms rather than other classifiers as it achieves high accuracy (88.36%), precision (88.24%), recall (88.36%), F1-score (87.94%), and area under curve (94.07作者: Capitulate 時(shí)間: 2025-3-30 02:17
Comparison of Principle Component Analysis and Stacked Autoencoder on NSL-KDD Dataset,techniques are tested on different machine learning classifiers like tree-based, SVM, KNN and ensemble learning. Most of the intrusion detection technique tested on benchmark NSL-KDD dataset. But the standard NSL-KDD dataset is not balanced, i.e., for some classes, this dataset has an insufficient n作者: periodontitis 時(shí)間: 2025-3-30 05:08 作者: GEST 時(shí)間: 2025-3-30 10:36
Grundbegriffe und rechtliche Grundlagenof this work is to implement a hybrid model for prediction by integrating the advantages of artificial neural net (ANN) and fuzzy logic. Genetic algorithm (GA) and particle swarm optimization (PSO) have been applied to optimize parameters of developed predicting model. The proposed scheme used a fuz作者: Macronutrients 時(shí)間: 2025-3-30 13:04 作者: ANTH 時(shí)間: 2025-3-30 19:51 作者: 共同生活 時(shí)間: 2025-3-30 20:46
Martin Korda (Lehrbeauftragter)mes special significance. This paper represents a deep learning approach based on long short-term memory (LSTM) neural networks for efficient asset prognostics to save machines from critical failures. The effectiveness of the proposed methodology is demonstrated using the NASA-CMAPSS dataset, a benc作者: LASH 時(shí)間: 2025-3-31 01:32 作者: 預(yù)測(cè) 時(shí)間: 2025-3-31 07:41
Martin Korda (Lehrbeauftragter)techniques are tested on different machine learning classifiers like tree-based, SVM, KNN and ensemble learning. Most of the intrusion detection technique tested on benchmark NSL-KDD dataset. But the standard NSL-KDD dataset is not balanced, i.e., for some classes, this dataset has an insufficient n作者: Progesterone 時(shí)間: 2025-3-31 09:12 作者: 吸引力 時(shí)間: 2025-3-31 14:25 作者: 休息 時(shí)間: 2025-3-31 21:26
https://doi.org/10.1007/978-3-642-99607-8s classifiers. This paper presents a comprehensive review of feature extraction techniques used in vision-based sign language recognition system. A taxonomy of currently used techniques for feature extraction has been presented. The paper concludes by presenting future direction in feature extraction technique for Indian sign language (ISL).作者: 表主動(dòng) 時(shí)間: 2025-4-1 01:38
Otto Blum,G. Schimpff,W. Schmidturity solutions are essential for end-to-end security. Considering this current scenario, in this paper, the key management techniques, particularly the lightweight Key Management Systems (KMS) methodologies that have been proposed in the past are reviewed in the context of Advanced Metering Infrastructure (AMI) of the Smart Grid Systems.作者: onlooker 時(shí)間: 2025-4-1 02:27
Otto Blum,G. Schimpff,W. Schmidtfic construction heuristic. Six neighborhood strategies are designed to explore the search space. The experiments are conducted on various classes of graphs for which optimal results are known. Computational results show that the proposed algorithm is better than the artificial bee colony (ABC) algorithm which is adapted by us for MSSTP.作者: 抵押貸款 時(shí)間: 2025-4-1 09:23 作者: Goblet-Cells 時(shí)間: 2025-4-1 12:47
,Die allgemeine L?sung der Aufgabe,udited numerous distinct algorithms available for image inpainting and clarified their methodology. This paper includes various works in the branch of image inpainting and will help beginners who want to work and develop the image inpainting techniques.作者: CRUMB 時(shí)間: 2025-4-1 14:41 作者: AROMA 時(shí)間: 2025-4-1 22:12 作者: maculated 時(shí)間: 2025-4-1 22:53