派博傳思國(guó)際中心

標(biāo)題: Titlebook: Emerging Technologies in Data Mining and Information Security; Proceedings of IEMIS Aboul Ella Hassanien,Siddhartha Bhattacharyya,Soum Conf [打印本頁(yè)]

作者: 多愁善感    時(shí)間: 2025-3-21 19:55
書目名稱Emerging Technologies in Data Mining and Information Security影響因子(影響力)




書目名稱Emerging Technologies in Data Mining and Information Security影響因子(影響力)學(xué)科排名




書目名稱Emerging Technologies in Data Mining and Information Security網(wǎng)絡(luò)公開度




書目名稱Emerging Technologies in Data Mining and Information Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Emerging Technologies in Data Mining and Information Security被引頻次




書目名稱Emerging Technologies in Data Mining and Information Security被引頻次學(xué)科排名




書目名稱Emerging Technologies in Data Mining and Information Security年度引用




書目名稱Emerging Technologies in Data Mining and Information Security年度引用學(xué)科排名




書目名稱Emerging Technologies in Data Mining and Information Security讀者反饋




書目名稱Emerging Technologies in Data Mining and Information Security讀者反饋學(xué)科排名





作者: HIKE    時(shí)間: 2025-3-21 22:03
https://doi.org/10.1007/978-3-319-21443-6diction analysis. In this work, the process of prediction analysis is divided into two phases which are clustering and classification. .-mean clustering is applied to cluster head and output of clustering is given as input to SVM classifier for the classification. In order to increase the accuracy o
作者: 冥界三河    時(shí)間: 2025-3-22 03:59

作者: 移動(dòng)    時(shí)間: 2025-3-22 08:05

作者: 使入迷    時(shí)間: 2025-3-22 11:44

作者: 強(qiáng)行引入    時(shí)間: 2025-3-22 13:24
https://doi.org/10.1007/978-94-010-3057-1cer like its contemporaries becomes very lethal if it’s diagnosed at a late stage and probability of the patient surviving reduces to a large extent. Thus, it becomes imperative to diagnose such a problem at an earlier stage so that the patient can be cured from skin cancer. In this paper, we have c
作者: 強(qiáng)行引入    時(shí)間: 2025-3-22 18:06

作者: 貿(mào)易    時(shí)間: 2025-3-22 22:22
Wolfgang Kemmler PhD,Simon von Stengel PhDNA). 2D chaotic map has generated the several key sequences for encryption, and DNA rules are applied to perform fast block encryption of image. Nonlinearity of 2D chaotic map and complexity of DNA sequences are used to perform highly secure image encryption. The experimental outputs illustrate the
作者: cardiopulmonary    時(shí)間: 2025-3-23 02:31
The Advertising Decision of the Firm is the most comfortable one. Here, it comes with the necessity of voice recognition system. Recently, researchers are really focusing on developing voice recognition systems with the help of machine learning and deep learning algorithms. And for that, researchers need a large amount of audio data.
作者: 占線    時(shí)間: 2025-3-23 08:42

作者: 切割    時(shí)間: 2025-3-23 11:49

作者: Parallel    時(shí)間: 2025-3-23 17:47

作者: Grievance    時(shí)間: 2025-3-23 18:01
The Principle of Virtual Power,d fault current waveforms of one cycle post-fault duration. The fault transients are scaled with respect to the peak value under no-fault condition for respective phases. These three phase scaled current signals are fed to the wavelet classifier model to extract fault features in terms of wavelet en
作者: anagen    時(shí)間: 2025-3-24 01:47
?mer Behram ?zdemir,Recep Tayyip Gürlerual context. In this present work, we represent a new system which takes an input image of Bangla handwritten mathematical expression and automatically simplifies the problem and generates the answer as an output. Proposed pursuit can be workable in an embedded system as well as mobile application.
作者: 溫和女孩    時(shí)間: 2025-3-24 02:51

作者: 馬具    時(shí)間: 2025-3-24 09:37

作者: 充氣球    時(shí)間: 2025-3-24 13:46

作者: catagen    時(shí)間: 2025-3-24 18:20
Facial Ageing: The Foundational Changesrent Neural Network (RNN). Speech Recognition is the power of a process of an instrument or program that puts word and phrases into words and converts them into a machine-meaningful arrangement. ASR are already implemented in many other language but not in Bengali language properly. In this worlds a
作者: 橡子    時(shí)間: 2025-3-24 19:05

作者: BLAND    時(shí)間: 2025-3-25 01:07
Emerging Technologies in Data Mining and Information Security978-981-33-4367-2Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 使?jié)M足    時(shí)間: 2025-3-25 05:46

作者: chiropractor    時(shí)間: 2025-3-25 08:42
Aboul Ella Hassanien,Siddhartha Bhattacharyya,SoumPresents recent research in the field of data mining and information security.Discusses the outcomes of IEMIS 2020, held in Kolkata, India.Serves as a reference resource for researchers and practition
作者: KIN    時(shí)間: 2025-3-25 14:52

作者: IRK    時(shí)間: 2025-3-25 18:36

作者: AMITY    時(shí)間: 2025-3-25 21:14

作者: Diaphragm    時(shí)間: 2025-3-26 02:50

作者: 彩色的蠟筆    時(shí)間: 2025-3-26 05:23
An Efficient Classification Technique of Data Mining for Predicting Heart Diseased algorithm performance is tested in the heart disease dataset which is taken from UCI repository. There are 76 attributes present within a database. However, a subset of 14 among them is required within all the published experiments. The proposed work will increase the accuracy of the prediction analysis.
作者: CARK    時(shí)間: 2025-3-26 10:50
Latent Fingerprinting: A Reviewquisition, enhancement, reconstruction, and matching, along with various benchmark datasets available for research purposes. The paper also highlights various challenges and research gaps to augment the research in this direction that has become imperative in this digital era.
作者: ciliary-body    時(shí)間: 2025-3-26 14:34

作者: Odyssey    時(shí)間: 2025-3-26 19:17
Nonlinear 2D Chaotic Map and DNA (NL2DCM-DNA) Sequences-Based Fast and Secure Block Image Encryptionnearity of 2D chaotic map and complexity of DNA sequences are used to perform highly secure image encryption. The experimental outputs illustrate the higher efficiency of NL2DCM-DNA in terms of security, attack resilience, entropy, histogram, running time and diffusion against some previous image encryption algorithms.
作者: obeisance    時(shí)間: 2025-3-27 00:33

作者: TAG    時(shí)間: 2025-3-27 04:10
Conference proceedings 2021ality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of things (IoT) and information security.
作者: 領(lǐng)先    時(shí)間: 2025-3-27 08:24
Non-opioid analgesics in cancer pain relief,e-based and statistical. The existing works suggest that rule-based techniques work better for Bengali stemming. Similarly, POS tagging techniques are categorized as linguistic, statistical, and machine learning-based tagger. Machine learning-based taggers perform better than other approaches of POS tagging for Bengali.
作者: CRACK    時(shí)間: 2025-3-27 12:16
2194-5357 ommunication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of things (IoT) and information security.978-981-33-4366-5978-981-33-4367-2Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: hypnogram    時(shí)間: 2025-3-27 15:58
The Advertising Decision of the Firmorganized the speeches and making the scripts are the most important things. And all the description in this work has been described with experience of our own work with speech data. The dataset of this work has exactly 10,992 speech data of 1000 unique words of more than 50 speakers.
作者: Defense    時(shí)間: 2025-3-27 21:17
Stenting of Bifurcation Lesions,ves the accuracy of the credit card fraud detection rate further by designing an ensemble model by considering the random forest and generative adversarial networks. Extensive experiments show that the proposed technique outperforms the existing techniques.
作者: preeclampsia    時(shí)間: 2025-3-27 23:03
https://doi.org/10.1007/978-981-13-5749-7anged. The test data is compared to each fault class signature to predict fault class. Only (3/20) cycle post-fault signals are analyzed using the proposed classifier to produce 99.4286% prediction accuracy.
作者: ARCH    時(shí)間: 2025-3-28 05:11

作者: 傲慢物    時(shí)間: 2025-3-28 07:28

作者: Incommensurate    時(shí)間: 2025-3-28 11:27

作者: 玩笑    時(shí)間: 2025-3-28 18:31
A Language-Independent Speech Data Collection and Preprocessing Techniqueorganized the speeches and making the scripts are the most important things. And all the description in this work has been described with experience of our own work with speech data. The dataset of this work has exactly 10,992 speech data of 1000 unique words of more than 50 speakers.
作者: Glucocorticoids    時(shí)間: 2025-3-28 20:52
Ensemble Model to Predict Credit Card Fraud Detection Using Random Forest and Generative Adversarialves the accuracy of the credit card fraud detection rate further by designing an ensemble model by considering the random forest and generative adversarial networks. Extensive experiments show that the proposed technique outperforms the existing techniques.
作者: COW    時(shí)間: 2025-3-29 01:05

作者: Conclave    時(shí)間: 2025-3-29 05:01

作者: fatuity    時(shí)間: 2025-3-29 08:55
Bangla Handwritten Math Recognition and Simplification Using Convolutional Neural Network handwritten math simplification; it has been done really good job. In the fields of the state of the art, contributions in Bangla languages are still very low. Developing an automatic math equation solver has been a desire of the researchers who worked in the field of NLP for many years.
作者: cardiovascular    時(shí)間: 2025-3-29 12:34
Semantics Exploration for Automatic Bangla Speech Recognitiontic Speech Recognition in Bangla. Our proposed methodology there used MFCC ‘for feature extraction, RNN ’ for training dataset. This proposed model we trained a LSTM model to know the most possible phonemes. Our proposed model get 20% error rate in word detection on Bangla-Word from audio dataset.
作者: 敲竹杠    時(shí)間: 2025-3-29 19:31
2194-5357 erves as a reference resource for researchers and practitionThis book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020.
作者: Forsake    時(shí)間: 2025-3-29 23:42

作者: condemn    時(shí)間: 2025-3-30 02:52

作者: BLOT    時(shí)間: 2025-3-30 05:06
Conference proceedings 2021020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-prog
作者: staging    時(shí)間: 2025-3-30 10:43
A Study on Bengali Stemming and Parts-of-Speech Tagginge-based and statistical. The existing works suggest that rule-based techniques work better for Bengali stemming. Similarly, POS tagging techniques are categorized as linguistic, statistical, and machine learning-based tagger. Machine learning-based taggers perform better than other approaches of POS tagging for Bengali.
作者: Evocative    時(shí)間: 2025-3-30 16:23

作者: 擔(dān)憂    時(shí)間: 2025-3-30 16:35

作者: 有危險(xiǎn)    時(shí)間: 2025-3-30 23:07
https://doi.org/10.1007/978-94-010-3057-1c nevi, melanoma, benign keratosis-like lesions, basal cell carcinoma, actinic keratoses, vascular lesions and dermatofibroma. We have trained the model on the HAM10000 (‘Human Against Machine with 10000 training images’) dataset which has 10,015 dermoscopic images and is available through the ISIC
作者: 同音    時(shí)間: 2025-3-31 04:18
https://doi.org/10.1007/978-3-319-46286-8nts and access to healthcare facilities. Thus, our paper revolves on identifying a few potential biomarkers, both that include some pathological tests and those without it like that of physiological age of an individual, etc., that would be instrumental in predicting these deadly diseases well in ad
作者: Femish    時(shí)間: 2025-3-31 05:29

作者: 遺傳學(xué)    時(shí)間: 2025-3-31 11:18
Non-Suicidal Self-Injury in Eating Disorders devices and can have the whole house in one system’s control at any point of time. This huge task can produce a variety of challenges, but once they are solved, it can lead to a range of possibilities and thus be one of the most useful and advanced innovations of our tech-based generation and our f
作者: 劇毒    時(shí)間: 2025-3-31 14:49
Local Binary Pattern-Based Texture Analysis to Predict IDH Genotypes of?Glioma Cancer Using Supervisre features using simple, computationally efficient local binary pattern (LBP) method for isocitrate dehydrogenase (IDH)-based discrimination of glioma as IDH mutant and IDH wild type. Further, such texture-based discriminative analysis alone can definitely facilitate an immediate recommendation for
作者: Deadpan    時(shí)間: 2025-3-31 17:31

作者: 熱情的我    時(shí)間: 2025-3-31 23:29

作者: 懸掛    時(shí)間: 2025-4-1 05:54

作者: Mobile    時(shí)間: 2025-4-1 07:15

作者: 貞潔    時(shí)間: 2025-4-1 11:42

作者: harangue    時(shí)間: 2025-4-1 16:49

作者: 不愛防注射    時(shí)間: 2025-4-1 21:42
Local Binary Pattern-Based Texture Analysis to Predict IDH Genotypes of?Glioma Cancer Using Supervissis. Such analysis makes use of either hand-crafted radiographic features with radiomic-based methods or auto-extracted features using deep learning-based methods. Radiomic-based methods cover a wide spectrum of radiographic features including texture, shape, volume, intensity, histogram, etc. The o




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
锦州市| 泰来县| 务川| 延庆县| 阿拉尔市| 湘阴县| 普格县| 内江市| 林甸县| 义乌市| 汝南县| 莒南县| 石门县| 六枝特区| 塔城市| 黄平县| 长寿区| 绥阳县| 清丰县| 大余县| 昌吉市| 宜宾县| 长丰县| 勃利县| 民丰县| 泰顺县| 岳普湖县| 高密市| 聂荣县| 赤壁市| 太白县| 南康市| 峨眉山市| 石景山区| 逊克县| 祁门县| 通江县| 和政县| 新闻| 方山县| 昌图县|