標題: Titlebook: Digital Transformation Technology; Proceedings of ITAF Dalia A. Magdi,Yehia K. Helmy,Amit Joshi Conference proceedings 2022 The Editor(s) [打印本頁] 作者: Glycemic-Index 時間: 2025-3-21 18:43
書目名稱Digital Transformation Technology影響因子(影響力)
作者: AFFIX 時間: 2025-3-21 21:13
Tools for Semantic Web Servicesce like never before but also live and work in the space. This research paper introduces the foundations of gravity since the early observations of Kepler, Newtonian theory, and Einstein’s theory of gravity. It also covers Quantum gravity that was established as a branch of modern theoretical physic作者: 兇殘 時間: 2025-3-22 04:18
Ulrich Küster,Birgitta K?nig-Rieser the assumption of noise uncertainty in the frequency domain. Also, the performance of the entropy detector in the time domain with different sampling size is analyzed by the simulation which proved that the value of entropy is constant and invariant against ., so the entropy in the time domain ca作者: Enzyme 時間: 2025-3-22 06:14 作者: 蠟燭 時間: 2025-3-22 10:05 作者: 禮節(jié) 時間: 2025-3-22 14:28 作者: 禮節(jié) 時間: 2025-3-22 19:12 作者: 分解 時間: 2025-3-22 23:51 作者: Diluge 時間: 2025-3-23 01:24 作者: 濃縮 時間: 2025-3-23 07:58
Methods for Ontology Development: Students perspectives, Journal of Pedagogical Research - June 2020). Because of the pandemic, many possible solutions and alternatives were suggested to solve the dilemma of the education system amidst the global pandemic (Christian Paul Chua, Lawrence Dale Valencia, The Role of Artificial Intelli作者: aspect 時間: 2025-3-23 12:48 作者: Interstellar 時間: 2025-3-23 14:13 作者: 植物茂盛 時間: 2025-3-23 20:59 作者: Essential 時間: 2025-3-24 00:37
Detecting Semantic Social Engineering Attack in the Context of Information Securitycker’s MAC address. It is prototyped under real attack as it is implemented over two different scenarios, in both admin and user side then compared with other detection method. Experimental results show accuracy rate of 95.30% for the admin side in (DE authentication attack—disassociation attack—mix作者: 強有力 時間: 2025-3-24 04:46
IS Risks Governance for Cloud Computing Serviceh there are various risks in cloud computing services, there is no comprehensive framework to support risk assessment according to user’s needs. In this paper, we aim to provide a conceptual framework for governance in cloud computing services. This framework will focus on cloud client (CC) requirem作者: CANT 時間: 2025-3-24 08:46 作者: interior 時間: 2025-3-24 11:31 作者: 自由職業(yè)者 時間: 2025-3-24 14:53 作者: 過時 時間: 2025-3-24 22:32
Recognizing Clothing Patterns and?Colors for BVI People Using Different Techniqueses exceeded 200 methods. The proposed methods were performed using MATLAB and Weka under different preprocessing and compression methods, such as converting the dataset to grayscale, using raw red, green and blue (RGB) images, in addition to grayscale and RGB scalograms from continuous wavelets. Usi作者: TERRA 時間: 2025-3-25 00:42
COVID-19 Pandemic’s Impact on E-learning Platforms: A Survey: Students perspectives, Journal of Pedagogical Research - June 2020). Because of the pandemic, many possible solutions and alternatives were suggested to solve the dilemma of the education system amidst the global pandemic (Christian Paul Chua, Lawrence Dale Valencia, The Role of Artificial Intelli作者: aplomb 時間: 2025-3-25 06:37 作者: Trypsin 時間: 2025-3-25 09:08 作者: 自傳 時間: 2025-3-25 12:59 作者: 細絲 時間: 2025-3-25 18:55 作者: Chauvinistic 時間: 2025-3-25 21:46 作者: ironic 時間: 2025-3-26 01:59 作者: MODE 時間: 2025-3-26 08:04 作者: indifferent 時間: 2025-3-26 12:31 作者: Neolithic 時間: 2025-3-26 13:23
Marta Sabou,Olga Kovalenko,Petr Novákg insights. It is challenging to analyze such a huge amount of information that causes time-consuming. So, it is necessary to make an intelligent system that automatically analyzes a great amount of data. Sentiment analysis methods appear to analyze sentiments?and opinions of?people through what the作者: 人類 時間: 2025-3-26 16:47 作者: Entreaty 時間: 2025-3-27 00:18
Semantic Web Solutions in Engineeringber of rules. Researchers often use either LL(1) top-down technique or LR bottom-up technique to parse strings to decide whether all these strings or some of them are accepted by some defined language. Theoretically, many papers illustrated that the LR method is more suitable for LL(1). The current 作者: Adenocarcinoma 時間: 2025-3-27 02:45 作者: 新陳代謝 時間: 2025-3-27 08:38 作者: 一致性 時間: 2025-3-27 11:45
Ronny Siebes,Peter Haase,Frank van Harmelen system analyzes the input data in terms of variables taking continuous values in the interval [0, 1]. Fuzzy logic has the advantage of expressing the solution of a problem in the natural language, which enables the mechanization of tasks that have been already performed successfully by humans. The 作者: PHAG 時間: 2025-3-27 16:49
https://doi.org/10.1007/3-540-28347-1h are semantically consistence. Deep convolutional generative adversarial networks (GANs) are rapidly changing field that have shown great revolution in the generative models. GANs are the recent widely used networks in many different frameworks to conditionally and unconditionally generate realisti作者: 萬花筒 時間: 2025-3-27 20:58
Methods for Ontology Developmentome limitations by following a lockdown or applying a curfew according to the number of cases recorded in each country. Many industries and organizations start to come up with alternative ways to accomplish tasks after the sudden lockdown either by splitting teams into smaller groups or by working f作者: condone 時間: 2025-3-27 22:25
https://doi.org/10.1007/978-1-84628-710-7 Financial institutions throughout the world lose billions because of credit card fraud. Fraudsters have no fixed styles; they always change their behavior and try to learn new technologies that allow them to commit frauds through online transactions. Moreover, they assume that the regular behavior 作者: 佛刊 時間: 2025-3-28 03:52
Digital Transformation Technology978-981-16-2275-5Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: Stagger 時間: 2025-3-28 06:45 作者: LVAD360 時間: 2025-3-28 13:51 作者: 釘牢 時間: 2025-3-28 18:13 作者: Fluctuate 時間: 2025-3-28 21:58
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/d/image/279797.jpg作者: 詳細目錄 時間: 2025-3-28 23:03 作者: Budget 時間: 2025-3-29 06:01
Entropy Detection-Based Spectrum Sensing in Frequency Domain Under Noise Uncertainty for Cognitive Rse techniques have a bad performance at low . due to the noise uncertainty effect. To counteract noise uncertainty, an entropy-based spectrum sensing scheme is introduced in this letter, where the performance of the entropy detection technique is estimated at frequency domain with a probability spac作者: 防水 時間: 2025-3-29 10:08 作者: Fretful 時間: 2025-3-29 13:59
IS Risks Governance for Cloud Computing ServiceInfrastructure as a Service, Platform as a Service, and Software as a Service). There are many challenges and concerns in using cloud computing services that may cause many risks. These risks need addressing while using cloud computing. CSPs provide procedures in order to control risk areas while pr作者: Inoperable 時間: 2025-3-29 18:41 作者: Texture 時間: 2025-3-29 22:07 作者: NIL 時間: 2025-3-30 02:48 作者: 衰老 時間: 2025-3-30 04:18
A Study of Sentiment Analysis Approaches in Short Textg insights. It is challenging to analyze such a huge amount of information that causes time-consuming. So, it is necessary to make an intelligent system that automatically analyzes a great amount of data. Sentiment analysis methods appear to analyze sentiments?and opinions of?people through what the作者: maverick 時間: 2025-3-30 08:13
Teleportation; Next Leap to Outer Spaceparticular, human teleportation is going to be the greatest achievement of all human being knowledge combined for the twenty-first century. The simple scientific definition of teleportation is when an object or a person be transported through a machine or a device and ends up reappearing at a differ作者: 我不明白 時間: 2025-3-30 13:57 作者: headway 時間: 2025-3-30 18:24 作者: conscribe 時間: 2025-3-31 00:41
Recognizing Clothing Patterns and?Colors for BVI People Using Different Techniqueshem automatically. This is a highly researched area in image processing. This paper provides BVI with the ability to detect patterns and colors without depending on personal assistance, leading to increasing their confidence. The user first captures an image; then, our system detects colors and patt作者: inventory 時間: 2025-3-31 01:34