標題: Titlebook: Computer Science and Its Applications; 5th IFIP TC 5 Intern Abdelmalek Amine,Ladjel Bellatreche,Robert Wrembel Conference proceedings 2015 [打印本頁] 作者: 欺侮 時間: 2025-3-21 17:35
書目名稱Computer Science and Its Applications影響因子(影響力)
書目名稱Computer Science and Its Applications影響因子(影響力)學科排名
書目名稱Computer Science and Its Applications網(wǎng)絡(luò)公開度
書目名稱Computer Science and Its Applications網(wǎng)絡(luò)公開度學科排名
書目名稱Computer Science and Its Applications被引頻次
書目名稱Computer Science and Its Applications被引頻次學科排名
書目名稱Computer Science and Its Applications年度引用
書目名稱Computer Science and Its Applications年度引用學科排名
書目名稱Computer Science and Its Applications讀者反饋
書目名稱Computer Science and Its Applications讀者反饋學科排名
作者: BIAS 時間: 2025-3-21 22:38 作者: Insatiable 時間: 2025-3-22 03:06
A New Rotation-Invariant Approach for Texture Analysisven after rotation. Textured images from Brodatz album database were used in the evaluation. Experimental studies have illustrated that the proposed system obtain very encouraging results robust to rotation compared to classical method.作者: 言外之意 時間: 2025-3-22 08:29 作者: 懲罰 時間: 2025-3-22 10:54
Biomarker Discovery Based on Large-Scale Feature Selection and MapReduceen we have applied iterative MapReduce that implement parallel SNR ranking for each cluster. After, we have selected the top ranked feature from each cluster. The top scored features from each cluster are gathered and a new feature subset is generated. In the second stage, the new feature subset is 作者: 棲息地 時間: 2025-3-22 14:52
Michael E. Auer,Thrasyvoulos Tsiatsos In this paper, the efficiency of the principal mapping functions existing in the literature is investigated through the proposition of five binary variants of one of the most recent metaheuristic called the Bat Algorithm (BA). The proposed binary variants are evaluated on the APP, and have been tes作者: 棲息地 時間: 2025-3-22 19:35
https://doi.org/10.1007/b118799ists of five parameters such as corresponding domain coordinates for each range block. Brightness offset and an affine transformation. The proposed approach is tested on ORL and FEI face databases. Experimental results on this database demonstrated the effectiveness of the proposed approach for face作者: 解脫 時間: 2025-3-23 00:50 作者: 新字 時間: 2025-3-23 02:37
Exotic Signatures from Supersymmetry allows to reduce significantly data transfer times thanks to an efficient management of GPU memories and to the overlapping of data copies by kernels executions. Otherwise, the framework includes several GPU-based image and video primitive functions, such as silhouette extraction, corners detection作者: menopause 時間: 2025-3-23 07:02 作者: ectropion 時間: 2025-3-23 10:43
Remotely Sensed Data Clustering Using K-Harmonic Means Algorithm and Cluster Validity IndexB index, PBMF index, WB-index and a new index has been deduced namely, WXI. The Experimental results and comparison with both K-means (KM) and fuzzy C-means (FCM) algorithms confirm the effectiveness of the proposed methodology.作者: extract 時間: 2025-3-23 17:04 作者: 發(fā)展 時間: 2025-3-23 20:49
IHBA: An Improved Homogeneity-Based Algorithm for Data Classificationroach, we conducted a computational study on some benchmarks datasets obtained from UCI repository. Experimental results confirm the theoretical analysis and show the effectiveness of the proposed IHBA method.作者: Lobotomy 時間: 2025-3-24 02:15 作者: Volatile-Oils 時間: 2025-3-24 02:20
Dahe Qin,Yongjian Ding,Kejun JiangB index, PBMF index, WB-index and a new index has been deduced namely, WXI. The Experimental results and comparison with both K-means (KM) and fuzzy C-means (FCM) algorithms confirm the effectiveness of the proposed methodology.作者: CAPE 時間: 2025-3-24 06:40
1868-4238 ience and Its Applications, CIIA 2015, held in Saida, Algeria, in May 2015. The 56 revised papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in the following four research tracks: computational intelligence; security and network technology; informat作者: 躺下殘殺 時間: 2025-3-24 13:21 作者: 用不完 時間: 2025-3-24 17:37 作者: 荒唐 時間: 2025-3-24 21:36 作者: aerial 時間: 2025-3-24 23:24
Jaakko Virkkunen,Denise Shelley Newnhamosed method and the gradient magnitude similarity deviation (GMSD) method is the usage of color component for the detection of distortion..Experimental comparisons demonstrate the effectiveness of the proposed method.作者: 貪婪的人 時間: 2025-3-25 04:56
The Assessment of Entrepreneurial Education,ural Networks and the Na?ve Bayes approach. The main objective is to determine a validity rating of a given solution. A preliminary experimentation of our approach within a Community of Learners whose main objective is to collaboratively learn the Java language shows that Neural Networks represent the most suitable approach in this context.作者: Mammal 時間: 2025-3-25 07:35 作者: Microaneurysm 時間: 2025-3-25 12:46
https://doi.org/10.1007/978-981-16-6202-7e (subway, babble because, exhibition hall, restaurant, street, airport, train station). Experimental results demonstrate that our method provides substantial improvements in recognition accuracy for speech in the clean training case. We have completed study by comparing MFCC and RSTA-PLP After MVA post processing.作者: HPA533 時間: 2025-3-25 16:55 作者: pacific 時間: 2025-3-25 20:40 作者: 停止償付 時間: 2025-3-26 03:00
Social Validation of Solutions in the Context of Online Communitiesural Networks and the Na?ve Bayes approach. The main objective is to determine a validity rating of a given solution. A preliminary experimentation of our approach within a Community of Learners whose main objective is to collaboratively learn the Java language shows that Neural Networks represent the most suitable approach in this context.作者: 能得到 時間: 2025-3-26 05:12 作者: Deadpan 時間: 2025-3-26 11:26
Noise Robust Features Based on MVA Post-processinge (subway, babble because, exhibition hall, restaurant, street, airport, train station). Experimental results demonstrate that our method provides substantial improvements in recognition accuracy for speech in the clean training case. We have completed study by comparing MFCC and RSTA-PLP After MVA post processing.作者: beta-cells 時間: 2025-3-26 13:02
Conference proceedings 2015 in Saida, Algeria, in May 2015. The 56 revised papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in the following four research tracks: computational intelligence; security and network technology; information technology; and software engineering.作者: inconceivable 時間: 2025-3-26 18:11
Computer Science and Its Applications978-3-319-19578-0Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: ULCER 時間: 2025-3-26 23:29
Michael E. Auer,Thrasyvoulos Tsiatsospending on the nature of the parameters to optimise. In the class of combinatorial problems, we find a sub-category which is the binary optimisation problems. Due to the complex nature of optimisation problems, exhaustive search-based methods are no longer a good choice. So, metaheuristics are more 作者: dapper 時間: 2025-3-27 03:16
Fulvia Anca Constantin,Stela Dr?gulint challenge. We are interested by MAS where each participating agent has its own physical clock of varying frequency, while no global clock is available or desirable. Under such circumstances models must be adapted. In this paper we attempt a novel approach to model the MAS, with a respect of two ch作者: infantile 時間: 2025-3-27 05:50
https://doi.org/10.1007/b118799ures that differ from one person to another, and its importance in the security field. This paper proposes an algorithm for face recognition and classification using a system based on WPD, fractal codes and two-dimensional subspace for feature extraction, and Combined Learning Vector Quantization an作者: 走調(diào) 時間: 2025-3-27 12:49 作者: deface 時間: 2025-3-27 16:01
Exotic Signatures from Supersymmetrycognition and real time video processing methods. The performance of these algorithms have been severely hampered by their high intensive computation since the new video standards, especially those in high definitions require more resources and memory to achieve their computations. In this paper, we作者: 舊式步槍 時間: 2025-3-27 18:30
Jaakko Virkkunen,Denise Shelley Newnhamsure. Color images that are corrupted with different kinds of distortions are assessed by applying a color distorted algorithm on each color component separately. This approach use especially . color space in computation. Gradient operator was successfully introduced to compute gradient image from t作者: TERRA 時間: 2025-3-27 23:01 作者: 能量守恒 時間: 2025-3-28 05:34 作者: 外向者 時間: 2025-3-28 09:08 作者: 壓迫 時間: 2025-3-28 10:48 作者: kindred 時間: 2025-3-28 17:46
Connotation of Global Governance generalization of a given classification system. However, the SHB algorithm does not penalize the structure of a classification model. This is due to the way SHB’s objective function is defined. Also, SHB algorithm uses only genetic algorithm to tune its parameters. This may reduce SHB’s freedom de作者: 破譯 時間: 2025-3-28 21:42 作者: Gyrate 時間: 2025-3-28 23:02 作者: Narcissist 時間: 2025-3-29 03:44
https://doi.org/10.1007/978-3-319-19578-0artificial intelligence; bioinformatics; computational intelligence; computing methodologies; data minin作者: 自愛 時間: 2025-3-29 10:25 作者: notion 時間: 2025-3-29 14:32
Abdelmalek Amine,Ladjel Bellatreche,Robert WrembelIncludes supplementary material: 作者: Delirium 時間: 2025-3-29 17:54
IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/c/image/233800.jpg作者: Ophthalmoscope 時間: 2025-3-29 23:08 作者: bleach 時間: 2025-3-30 02:34 作者: coagulation 時間: 2025-3-30 04:51 作者: glisten 時間: 2025-3-30 12:08
A Novel Technique For Human Face Recognition Using Fractal Code and Bi-dimensional Subspaceures that differ from one person to another, and its importance in the security field. This paper proposes an algorithm for face recognition and classification using a system based on WPD, fractal codes and two-dimensional subspace for feature extraction, and Combined Learning Vector Quantization an作者: harmony 時間: 2025-3-30 12:39