標(biāo)題: Titlebook: Computational Science and Its Applications -- ICCSA 2004; International Confer Antonio Laganá,Marina L. Gavrilova,Osvaldo Gervasi Conferenc [打印本頁] 作者: 突然 時間: 2025-3-21 17:03
書目名稱Computational Science and Its Applications -- ICCSA 2004影響因子(影響力)
書目名稱Computational Science and Its Applications -- ICCSA 2004影響因子(影響力)學(xué)科排名
書目名稱Computational Science and Its Applications -- ICCSA 2004網(wǎng)絡(luò)公開度
書目名稱Computational Science and Its Applications -- ICCSA 2004網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Science and Its Applications -- ICCSA 2004被引頻次
書目名稱Computational Science and Its Applications -- ICCSA 2004被引頻次學(xué)科排名
書目名稱Computational Science and Its Applications -- ICCSA 2004年度引用
書目名稱Computational Science and Its Applications -- ICCSA 2004年度引用學(xué)科排名
書目名稱Computational Science and Its Applications -- ICCSA 2004讀者反饋
書目名稱Computational Science and Its Applications -- ICCSA 2004讀者反饋學(xué)科排名
作者: 的是兄弟 時間: 2025-3-22 00:11
0302-9743 more appropriately refer to Computational Science and its applications: interoperable and ubiquitous. Numerous examples of ubiquitous and interoperable tools and applicationsaregivenintheprese978-3-540-22054-1978-3-540-24707-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Ambiguous 時間: 2025-3-22 03:37 作者: 外來 時間: 2025-3-22 04:38
Face Detection by Facial Features with Color Images and Face Recognition Using PCAfocusing on the effects of eigenface to represent human face under several environment conditions. Finally an error rate is compared when face recognition is processed with facial features through the PCA (principal component analysis).作者: cliche 時間: 2025-3-22 11:36
A Novel Approach for Contents-Based E-catalogue Image Retrieval Based on a Differential Color Edge Mhion and will provide a mechanism to determine the possibility of the edge existence. The color edge histogram based on the direction of the color edge model is subsequently applied to the contents-based e-catalogue image retrieval. For the evaluation, the results of image retrieval using the propos作者: DEVIL 時間: 2025-3-22 13:09
A Transcode and Prefetch Technique of Multimedia Presentations for Mobile Terminalsoding time. By this way, the early delay time, which includes transcoding time in mobile terminals, can be minimized. Moreover, after undergoing transcode, the presentation is to be prefetched in compliance with the memory size of the mobile terminal. This process makes it possible for the presentat作者: DEVIL 時間: 2025-3-22 19:35 作者: crockery 時間: 2025-3-22 23:43
Joseph Cesarano III,Ilhan A. Aksayhion and will provide a mechanism to determine the possibility of the edge existence. The color edge histogram based on the direction of the color edge model is subsequently applied to the contents-based e-catalogue image retrieval. For the evaluation, the results of image retrieval using the propos作者: Subjugate 時間: 2025-3-23 03:31 作者: 帳單 時間: 2025-3-23 09:19
Face Detection by Facial Features with Color Images and Face Recognition Using PCAtabase management. The face recognition by a CCD camera has the merit of being linked with other recognition systems such as an iris recognition to implement a multimodal recognition system. This paper is concerned with a new approach to face recognition that is automatically distinguished from movi作者: 后來 時間: 2025-3-23 09:54
A Shakable Snake for Estimation of Image Contours shakable snake based on a greedy snake. By using a method of shaking a snake, the proposed snake algorithm can attracts the snake to the image contours rapidly and accurately. We show that good results can be obtained by shaking a snake.作者: mortuary 時間: 2025-3-23 15:44
A New Recurrent Fuzzy Associative Memory for Recognizing Time-Series Patterns Contained AmbiguityFAM is basically extended from FAM(Fuzzy Associative memory) by adding a recurrent layer which can be used to deal with sequential input patterns and to characterize their temporal relations. RFAM provides a Hebbian-style learning method which establishes the degree of association between input and 作者: evaculate 時間: 2025-3-23 19:55 作者: Lucubrate 時間: 2025-3-24 01:11 作者: 高貴領(lǐng)導(dǎo) 時間: 2025-3-24 06:21 作者: 表示向下 時間: 2025-3-24 08:20 作者: freight 時間: 2025-3-24 12:11 作者: 600 時間: 2025-3-24 16:49 作者: FLEET 時間: 2025-3-24 19:50
A Study on Methodology for Enhancing Reliability of Datapathproves testability of datapath based on hierarchical testability analysis regardless of the datapath width. It always guarantees higher fault efficiency and little hardware overhead than previous methods. The experimental results show that the proposed method has superior abilities of test applicati作者: Hyperalgesia 時間: 2025-3-25 00:46 作者: Conflagration 時間: 2025-3-25 06:34 作者: incarcerate 時間: 2025-3-25 08:11 作者: 傳染 時間: 2025-3-25 12:59
Constructing Control Flow Graph for Java by Decoupling Exception Flow from Normal Flowontrol, exception induced control flow have to be incorporated in control flow graph. In the previous research to construct control flow graph, they compute exception flow and normal flow at the same time while computing control flow information. In this paper, we propose a method to construct contr作者: 愛了嗎 時間: 2025-3-25 17:44 作者: 吝嗇性 時間: 2025-3-25 22:51
A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of Documenrd matching method to get the information which users need. But Web documents retrieval systems serve too many documents because of term ambiguity. Also it often happens that words with several meanings occur in a document, but in a rather different context from that expected by the querying person.作者: 拍下盜公款 時間: 2025-3-26 03:44
A Supervised Korean Verb Sense Disambiguation Algorithm Based on Decision Lists of Syntactic Featurees including the basic lexical features in the target verb and surrounding words. Our word sense disambiguation algorithm selects the correct sense by utilizing the strongest evidence on the decision lists when the evidence is ranked at the higher level of the decision lists. If the strongest one is作者: Common-Migraine 時間: 2025-3-26 07:16 作者: Override 時間: 2025-3-26 10:57 作者: Magnificent 時間: 2025-3-26 13:45 作者: Largess 時間: 2025-3-26 20:42
Springer Series in Chemical Physicso we propose an algorithm which it produce the hierarchical structure using the degree of concepts and contents among documents. As result, we are able to select and to provide user-interested documents.作者: 信徒 時間: 2025-3-26 22:47 作者: cartilage 時間: 2025-3-27 01:08
A Document Classification Algorithm Using the Fuzzy Set Theory and Hierarchical Structure of Documeno we propose an algorithm which it produce the hierarchical structure using the degree of concepts and contents among documents. As result, we are able to select and to provide user-interested documents.作者: 使高興 時間: 2025-3-27 09:13
0302-9743 ligent automata aimed at alleviating the b- den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fund作者: nonplus 時間: 2025-3-27 11:39
Springer Series in Chemical Physicsruitful tests with the smaller size of the scheme. Furthermore, the relevant analyses needed for this proposal are largely achieved at compile-compile time, which secures actual efficiency at compilation time.作者: CHOKE 時間: 2025-3-27 14:22
https://doi.org/10.1007/978-3-540-49829-2cy and little hardware overhead than previous methods. The experimental results show that the proposed method has superior abilities of test application time and area overhead compared to the scan method.作者: 確定 時間: 2025-3-27 19:00 作者: dendrites 時間: 2025-3-27 23:53 作者: 殘廢的火焰 時間: 2025-3-28 03:57
A Study on Generating an Efficient Bottom-up Tree Rewrite Machine for JBurgruitful tests with the smaller size of the scheme. Furthermore, the relevant analyses needed for this proposal are largely achieved at compile-compile time, which secures actual efficiency at compilation time.作者: 來自于 時間: 2025-3-28 08:49 作者: GULF 時間: 2025-3-28 11:57 作者: dainty 時間: 2025-3-28 17:52
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacksd countermeasure employs a fault diffusion concept which is to spread the fault into the correct term during the recombination process by using CRT. This new countermeasure is also secure against differential power attack by using the message random blinding technique on RSA with CRT.作者: 違法事實 時間: 2025-3-28 21:33
Springer Series in Chemical Physicsurate association rules or business patterns, approach for better market plans can be prepared and implemented to improve marketing schemes. One best-related application of handling missing data is for detecting fraud or devious database entries.作者: 不成比例 時間: 2025-3-28 22:58
Springer Series in Chemical Physics two flows can be computed separately. We propose the analysis that estimates exception-induced control flow, and also propose exception flow graph that represents exception induced control flows. We show that a control flow graph can be constructed by merging an exception flow graph onto a normal flow graph.作者: Interferons 時間: 2025-3-29 04:55
Diffraction and Other X-Ray Methodsledge during evolution. Next, we propose that negation is a logical schema, which allows an agent to perceive a physical schema itself. Finally, we show that negation and emotion both using suppression and negation can be bases for generating emotions. Negation seems the first distinction for knowledge and might be near the locus of consciousness.作者: acolyte 時間: 2025-3-29 09:58
https://doi.org/10.1007/978-1-4615-9537-3th ten Korean ambiguous verbs show significant improvement of performance than the decision lists algorithm. In addition, results of experiments show that the syntactic features provide more significant evidences than unordered surrounding words for resolving sense ambiguity.作者: 書法 時間: 2025-3-29 12:23
The Association Rule Algorithm with Missing Data in Data Miningurate association rules or business patterns, approach for better market plans can be prepared and implemented to improve marketing schemes. One best-related application of handling missing data is for detecting fraud or devious database entries.作者: Clinch 時間: 2025-3-29 15:37 作者: 廚房里面 時間: 2025-3-29 19:47
On Negation-Based Conscious Agentledge during evolution. Next, we propose that negation is a logical schema, which allows an agent to perceive a physical schema itself. Finally, we show that negation and emotion both using suppression and negation can be bases for generating emotions. Negation seems the first distinction for knowledge and might be near the locus of consciousness.作者: Canyon 時間: 2025-3-30 03:03 作者: Delude 時間: 2025-3-30 06:46 作者: unstable-angina 時間: 2025-3-30 09:23 作者: 形上升才刺激 時間: 2025-3-30 12:25
Fingerprint Matching Based on Linking Information Structure of Minutiaengerprint. The matching algorithm was tested on 500 images from the semiconductor chip style scanner. Experimental result revealed the false acceptance rate is decreased and genuine acceptance rate is increased than existing method.作者: Lipohypertrophy 時間: 2025-3-30 18:26
A Research on the Stochastic Model for Spoken Language Understandingtanding rate. We evaluated the performance of the sentence speech understanding system by applying twenty questions game. As the experiment results, we got sentence speech understanding accuracy of 79.8%. In this case probability (.) of high level word is 0.9 and threshold probability (.) is 0.38.作者: 議程 時間: 2025-3-31 00:33
Network Security Management Using ARP Spoofingses in a distributed network environment to improve survivability of the network. We implement a program that cannot be interfered with by users who are not approved, by using ARP Spoofing, which we then experiment with and analyze.作者: CANT 時間: 2025-3-31 03:37
Conference proceedings 2004 den of working out suitable tools for solving complex problems. For this reason ComputationalScience,thoughoriginatingfromtheneedtosolvethemostch- lenging problems in science and engineering (computational science is the key player in the ?ght to gain fundamental advances in astronomy, biology, che作者: 野蠻 時間: 2025-3-31 06:33
https://doi.org/10.1007/978-1-4613-1905-4output. The error back-propagation algorithm is also adopted to train the weights of the recurrent layer of RFAM. To evaluate the performance of the proposed model, we applied it to a word boundary detection problem of speech signal.作者: 英寸 時間: 2025-3-31 13:01
B. B. Prajwal,P. N. Chandramouli to verify the proposed algorithm. A variety of experiments involving twenty users showed that the gesture recognition rate reached 99.6%. In addition, they showed that the algorithm was efficient as much portable devices as desktop computers.作者: Peculate 時間: 2025-3-31 16:52
Springer Series in Chemical Physicsngerprint. The matching algorithm was tested on 500 images from the semiconductor chip style scanner. Experimental result revealed the false acceptance rate is decreased and genuine acceptance rate is increased than existing method.作者: 無思維能力 時間: 2025-3-31 20:40 作者: intolerance 時間: 2025-3-31 22:52 作者: EWE 時間: 2025-4-1 02:22 作者: 親密 時間: 2025-4-1 09:14 作者: 希望 時間: 2025-4-1 11:35 作者: FUME 時間: 2025-4-1 14:30 作者: 線 時間: 2025-4-1 20:29