派博傳思國際中心

標(biāo)題: Titlebook: Emerging Technologies in Data Mining and Information Security; Proceedings of IEMIS Paramartha Dutta,Satyajit Chakrabarti,Celia Shahna Conf [打印本頁]

作者: 大腦    時(shí)間: 2025-3-21 17:13
書目名稱Emerging Technologies in Data Mining and Information Security影響因子(影響力)




書目名稱Emerging Technologies in Data Mining and Information Security影響因子(影響力)學(xué)科排名




書目名稱Emerging Technologies in Data Mining and Information Security網(wǎng)絡(luò)公開度




書目名稱Emerging Technologies in Data Mining and Information Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Emerging Technologies in Data Mining and Information Security被引頻次




書目名稱Emerging Technologies in Data Mining and Information Security被引頻次學(xué)科排名




書目名稱Emerging Technologies in Data Mining and Information Security年度引用




書目名稱Emerging Technologies in Data Mining and Information Security年度引用學(xué)科排名




書目名稱Emerging Technologies in Data Mining and Information Security讀者反饋




書目名稱Emerging Technologies in Data Mining and Information Security讀者反饋學(xué)科排名





作者: consolidate    時(shí)間: 2025-3-21 22:05
IOT Security: Recent Trends and Challengese usage of multiple technologies like Artificial Intelligence, Machine Learning, Data Mining methods, etc., there is a need to provide proper security to the IoT system also. Several layers used in the IoT architecture need to be protected. Hence, there is a need to make a robust system in order to
作者: Adenoma    時(shí)間: 2025-3-22 00:43
Assistive Technology for Pedagogical Support and Application of Data Analysis in Neurodevelopmental me efficiently. Computer-assisted pedagogical support may be finely tailored to serve children as well as educators across the disability spectrum in special education setup. In this paper, the authors aim to review the major existing research works carried out in this field of EDM at international
作者: FLAX    時(shí)間: 2025-3-22 04:33

作者: 蜿蜒而流    時(shí)間: 2025-3-22 08:57
Startup Profit Predictor Using Machine Learning Techniquesre done. The data was split for training and testing and the score of the model obtained on the test dataset was 0.9691. The startup profit predictor was successfully built using random forest regressor model and it can be used for making profit predictions with 96.91% accuracy.
作者: 合法    時(shí)間: 2025-3-22 14:10
Right to Be Forgotten in a Post-AI World: How Effective is This Right Where Machines Do not Forget?s details regarding the usage of the data. In this paper, the authors have analysed the right to be forgotten in the context of AI and explored legal provisions in the light of how far this right can be exercised with AIs.
作者: 合法    時(shí)間: 2025-3-22 19:49

作者: 中古    時(shí)間: 2025-3-23 00:32

作者: 使人入神    時(shí)間: 2025-3-23 02:00
Covid-19 Prediction Analysis Using Machine Learning Approachfrom initial symptoms and information like fever, cough, sore throat using machine learning algorithms. The study includes working with six predicting models, MLP, GBC, Decision tree, SVM, Logistic Regression and Random forest with highest accuracy of 92.94% achieved in logical regression. The resul
作者: 小卒    時(shí)間: 2025-3-23 09:32

作者: 譏笑    時(shí)間: 2025-3-23 13:27
Nonclassical Nonlinear Acoustical Imaging,e usage of multiple technologies like Artificial Intelligence, Machine Learning, Data Mining methods, etc., there is a need to provide proper security to the IoT system also. Several layers used in the IoT architecture need to be protected. Hence, there is a need to make a robust system in order to
作者: Dedication    時(shí)間: 2025-3-23 14:11

作者: absolve    時(shí)間: 2025-3-23 21:18
Nonlinear Analysis of Physiological Data quantitative parameters, i.e., .. The presented approach is thoroughly compared with the state of the art and advanced changed detection approaches and found that the proposed method is superior in numerous ways.
作者: 縮短    時(shí)間: 2025-3-24 01:37
Roll Model Control of Autonomous Vehiclere done. The data was split for training and testing and the score of the model obtained on the test dataset was 0.9691. The startup profit predictor was successfully built using random forest regressor model and it can be used for making profit predictions with 96.91% accuracy.
作者: 根除    時(shí)間: 2025-3-24 04:36

作者: Fibrillation    時(shí)間: 2025-3-24 06:41

作者: 雕鏤    時(shí)間: 2025-3-24 13:02
https://doi.org/10.1007/978-3-031-15207-8hanges its behaviour. Pests are also a major problem. Image Processing has evolved as an effective thing for the early analysis and detection of plant disease. Several algorithms have used to analyze the diseases at the early stage that results in minimum loss to the farmers and good quality of crop
作者: scrape    時(shí)間: 2025-3-24 17:20
https://doi.org/10.1007/978-3-662-04299-1from initial symptoms and information like fever, cough, sore throat using machine learning algorithms. The study includes working with six predicting models, MLP, GBC, Decision tree, SVM, Logistic Regression and Random forest with highest accuracy of 92.94% achieved in logical regression. The resul
作者: 小卷發(fā)    時(shí)間: 2025-3-24 21:20

作者: Immobilize    時(shí)間: 2025-3-25 00:39
Analysis of Tide Gauge Sea Level Time Seriesnd their related visible imperceptibility metrics that use a portion of the graphic. For output enhancement, the learned model is further utilized. To surpass the current innovative frameworks, the proposed model is shown.
作者: 搜集    時(shí)間: 2025-3-25 04:33

作者: Anticlimax    時(shí)間: 2025-3-25 11:04
https://doi.org/10.1007/978-981-15-1656-6em must have a noise-removal feature to perform in the best way possible. This paper gives a brief about the machine learning techniques that can be used in speech recognition. A better understanding of the models will help understand the systems, and it may help improve the technology even further for the benefit of society.
作者: 討人喜歡    時(shí)間: 2025-3-25 11:38
Texture Feature Based on ANN for Security Aspectsnd their related visible imperceptibility metrics that use a portion of the graphic. For output enhancement, the learned model is further utilized. To surpass the current innovative frameworks, the proposed model is shown.
作者: Leaven    時(shí)間: 2025-3-25 17:02

作者: 山間窄路    時(shí)間: 2025-3-25 22:31

作者: 失敗主義者    時(shí)間: 2025-3-26 01:45
Conference proceedings 2023igh-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security..
作者: enterprise    時(shí)間: 2025-3-26 05:13
Nonlinear Analysis and Continuum Mechanicsng upon user choice with similar data. For this recommendation system, two techniques are used which are collaborative filtering and content-based filtering. Considering the issues for some users while searching, they can play music with help of a voice assistant.
作者: 胎兒    時(shí)間: 2025-3-26 08:28

作者: 土坯    時(shí)間: 2025-3-26 12:59
https://doi.org/10.1007/978-1-4614-6877-6m them. To analyze these unstructured customer feedbacks at scale, machine learning is used. In this work we present a survey on various machine learning techniques that have been used in past eight years for analysis of tweets/comments related to airline industry.
作者: Endearing    時(shí)間: 2025-3-26 20:05

作者: 商談    時(shí)間: 2025-3-26 22:02
R. Nopour,M. M. Aghdam,A. Taghvaeipourideration the privacy risk and confidentiality loss observed if the data is shared. For secure sharing of data, a trust framework based on the user’s interest and interaction parameters is put forth. The proposed work can be extended to any data sharing multiuser platform.
作者: 埋伏    時(shí)間: 2025-3-27 02:49
Fernando Corinto,Mauro Forti,Leon O. Chua mood detection model utilising face recognition. We applied Tf-Idf on a variety of classifiers, with a particular focus on the random forest classifier. For detection of the face, Haar cascade method was employed. The FER dataset was utilised to train the model using the MobileNet model.
作者: triptans    時(shí)間: 2025-3-27 06:21

作者: 天賦    時(shí)間: 2025-3-27 10:31
Trust Based Resolving of Conflicts for Collaborative Data Sharing in Online Social Networksideration the privacy risk and confidentiality loss observed if the data is shared. For secure sharing of data, a trust framework based on the user’s interest and interaction parameters is put forth. The proposed work can be extended to any data sharing multiuser platform.
作者: 猛擊    時(shí)間: 2025-3-27 14:07
Facial Recognition to Detect Mood and Play Songs Using Machine Intelligence mood detection model utilising face recognition. We applied Tf-Idf on a variety of classifiers, with a particular focus on the random forest classifier. For detection of the face, Haar cascade method was employed. The FER dataset was utilised to train the model using the MobileNet model.
作者: badinage    時(shí)間: 2025-3-27 20:16

作者: Affirm    時(shí)間: 2025-3-28 01:01
Developing Smart ML-Based Recommendation Systemng upon user choice with similar data. For this recommendation system, two techniques are used which are collaborative filtering and content-based filtering. Considering the issues for some users while searching, they can play music with help of a voice assistant.
作者: impaction    時(shí)間: 2025-3-28 05:35
Age, Gender, and Gesture Classification Using Open-Source Computer Visionder while providing the most probable age range of the concerned face and also detecting the gesture of the hands using convolutional neural network architecture. The principal idea behind the system is to compare the image with the reference images stored as templates in the database and to determine the age and gender.
作者: gruelling    時(shí)間: 2025-3-28 06:46
Sentiment Analysis in Airlines Industry Using Machine Learning Techniquesm them. To analyze these unstructured customer feedbacks at scale, machine learning is used. In this work we present a survey on various machine learning techniques that have been used in past eight years for analysis of tweets/comments related to airline industry.
作者: 先驅(qū)    時(shí)間: 2025-3-28 10:57
Conference proceedings 20232022) held at Institute of Engineering & Management, Kolkata, India, during 23–25 February 2022.?The book is organized in three volumes?and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-i
作者: IVORY    時(shí)間: 2025-3-28 14:37
2367-3370 erves as a reference resource for researchers and practition.This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during 23–25 February
作者: 輪流    時(shí)間: 2025-3-28 21:08
IOT Security: Recent Trends and Challengesprovides technologies like Wireless Sensor Networks (WSNs) and Radio Frequency Identification (RFID) which are used in several applications like forest fires, home automation, military equipment, traffic signals, medical sciences, agriculture, etc. Large amount of information is being obtained by th
作者: 牽索    時(shí)間: 2025-3-28 23:49
Assistive Technology for Pedagogical Support and Application of Data Analysis in Neurodevelopmental al education of autism spectrum disorder (ASD) which is the third most common lifelong neurodevelopmental disorder. Once in special school, children with ASD need user-friendly instructions and teaching equipments. A social and cultural appropriate educational intervention application may ease the p
作者: 合同    時(shí)間: 2025-3-29 03:54
Developing Smart ML-Based Recommendation Systeme importance of music in your life will depend on your personal experience. This recommendation system is developed for those users who express their feeling and prefer listening as well as viewing music videos depending on their choice. The recommendation system will filter out the contents dependi
作者: 阻撓    時(shí)間: 2025-3-29 10:32

作者: 老人病學(xué)    時(shí)間: 2025-3-29 15:25
Trust Based Resolving of Conflicts for Collaborative Data Sharing in Online Social Networksreasing adoption of gadgets such as mobile phones and tablets have made social media available all times. This recent surge in online interaction has made it imperative to have ample protection against privacy breaches to ensure a fine grained and a personalized data publishing online. Privacy conce
作者: 合適    時(shí)間: 2025-3-29 18:30
Startup Profit Predictor Using Machine Learning Techniquesorld. Hence, they find it very essential to keep their venture in a profitable position from beginning itself so that they can achieve their goals sustainably. Intelligent systems which use machine learning can process huge amount of statistical data and can be used to predict profits based on the s
作者: 敵手    時(shí)間: 2025-3-29 20:25
Right to Be Forgotten in a Post-AI World: How Effective is This Right Where Machines Do not Forget?data deletion becomes complicated when an AI-based technology is involved as AI neither process the data nor do they ‘forget’ the way humans do. The laws on privacy have been enacted from the perspective of human memory, and therefore, their efficacy is in question when AI-based technologies process
作者: savage    時(shí)間: 2025-3-30 02:22

作者: convert    時(shí)間: 2025-3-30 05:57
Estimated Time of Arrival for Sustainable Transport Using Deep Neural Networkns showed concern for sustainable transport. This sustainability is for rural–urban linkage, pollution-free environment, health, etc. We understood the importance of estimating the time of arrival for the sustainable transportation and formulated a deep neural network model which increases our estim
作者: 無政府主義者    時(shí)間: 2025-3-30 10:41
Texture Feature Based on ANN for Security Aspectsthod to set up the supervised computational framework to evaluate the optimized hiding picture position with a minimum distortion. The ELM is trained on a part of the image and checked in regression methodology to pick the optimum message hiding spot. It has permitted the supreme outcomes of the exp
作者: compel    時(shí)間: 2025-3-30 14:52

作者: 織物    時(shí)間: 2025-3-30 16:51
Sentiment Analysis in Airlines Industry Using Machine Learning Techniques listings, etc. Majority of business do not know how to use this information to improve themselves. However, unstructured feedback on Facebook/Instagram/Twitter is where the volume lies. But the problem is these feedbacks are unstructured and there is no aggregated sentiment that we may conclude fro
作者: FIS    時(shí)間: 2025-3-30 21:43
Facial Recognition to Detect Mood and Play Songs Using Machine Intelligenceto entertainment Kim et al. [.]. It is used in a variety of fields, including security systems, digital video processing, and so on. When there are hundreds of songs, it is difficult for music listeners to manually create and segregate the playlist. The system’s overall concept is to determine the s
作者: 性行為放縱者    時(shí)間: 2025-3-31 04:44

作者: CORE    時(shí)間: 2025-3-31 06:11

作者: 具體    時(shí)間: 2025-3-31 12:57
Smart City Driven by AI and Data Mining: The Need of Urbanizationban transportation and traffic system, pragmatic approach to manage the solid waste, centralized management of information, better disaster management for the city, control over crime, an active emergency response system, renovating the heritage monuments and making the city beautiful, etc., for the
作者: LARK    時(shí)間: 2025-3-31 16:05

作者: pessimism    時(shí)間: 2025-3-31 21:31

作者: ADJ    時(shí)間: 2025-3-31 22:44

作者: 愚笨    時(shí)間: 2025-4-1 02:22
Introduction to Adiabatic Evolution,al education of autism spectrum disorder (ASD) which is the third most common lifelong neurodevelopmental disorder. Once in special school, children with ASD need user-friendly instructions and teaching equipments. A social and cultural appropriate educational intervention application may ease the p




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
汪清县| 建宁县| 蓬安县| 巨鹿县| 遵义市| 平乡县| 昌宁县| 西城区| 武安市| 长治市| 察隅县| 资兴市| 芜湖县| 扎鲁特旗| 泽库县| 内丘县| 茂名市| 盘山县| 尼玛县| 杭州市| 客服| 乡城县| 德惠市| 高安市| 安多县| 论坛| 休宁县| 茂名市| 澄江县| 平顺县| 曲沃县| 浮梁县| 色达县| 保康县| 二手房| 长治县| 高平市| 元谋县| 贵定县| 老河口市| 沙坪坝区|