標(biāo)題: Titlebook: Emerging Trends in Intelligent Systems & Network Security; Mohamed Ben Ahmed,Boudhir Anouar Abdelhakim,Didi R Conference proceedings 2023 [打印本頁] 作者: Wilder 時(shí)間: 2025-3-21 17:35
書目名稱Emerging Trends in Intelligent Systems & Network Security影響因子(影響力)
書目名稱Emerging Trends in Intelligent Systems & Network Security影響因子(影響力)學(xué)科排名
書目名稱Emerging Trends in Intelligent Systems & Network Security網(wǎng)絡(luò)公開度
書目名稱Emerging Trends in Intelligent Systems & Network Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Emerging Trends in Intelligent Systems & Network Security被引頻次
書目名稱Emerging Trends in Intelligent Systems & Network Security被引頻次學(xué)科排名
書目名稱Emerging Trends in Intelligent Systems & Network Security年度引用
書目名稱Emerging Trends in Intelligent Systems & Network Security年度引用學(xué)科排名
書目名稱Emerging Trends in Intelligent Systems & Network Security讀者反饋
書目名稱Emerging Trends in Intelligent Systems & Network Security讀者反饋學(xué)科排名
作者: Irrepressible 時(shí)間: 2025-3-21 22:33
A Dynamic Circular Hough Transform Based Iris Segmentation,ntation method based on an adaptive illumination correction and a modified circular Hough transform algorithm. Some morphological operations are used to create the illumination correction function, while the pupil localization process is used to detect the Hough circle radius range to obtain the iri作者: 才能 時(shí)間: 2025-3-22 03:35
,A Game Theoretic Framework for?Interpretable Student Performance Model,ations including predicting at-risk students and automating student enrollment. From these applications, it is clear that machine learning models have a major impact on students’ professional success, therefore, it is imperative that the student performance model is well understood and free of any b作者: GEON 時(shí)間: 2025-3-22 05:58
A New Telecom Churn Prediction Model Based on Multi-layer Stacking Architecture,jor service providers around the world. For this reason, significant investments are increasingly devoted to the development of new anti-churn strategies. Machine Learning is among the new approaches used today in this area. In the proposed work, we constructed a multilayer Stacking Network, compose作者: 褻瀆 時(shí)間: 2025-3-22 09:58 作者: craven 時(shí)間: 2025-3-22 15:13
A Proposed Big Data Architecture Using Data Lakes for Education Systems,ich makes knowledge extraction with traditional tools difficult for educational organizations. Indeed, the actual architecture of data warehouses do not possess the capability of storing and managing this huge amount of varied data. The same goes for analytical processes; which no longer satisfy bus作者: craven 時(shí)間: 2025-3-22 18:09
A SVM Approach for Assessing Traffic Congestion State by Similarity Measures,jams, with the aim of detecting and predicting anomalies, is a perfect illustration. The use of support vector machines (SVM) has alleviated the problems of classification, detection and prediction of anomalies in several areas [., .]. In this paper, we propose an approach to assessing traffic jam c作者: 初學(xué)者 時(shí)間: 2025-3-22 21:51 作者: Rustproof 時(shí)間: 2025-3-23 01:21 作者: 自傳 時(shí)間: 2025-3-23 08:32
Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System,ic and asymmetric encryption techniques were proposed for the image encryption process. To ensure the use of the most efficient techniques, thus, compare the results between two popular encryption algorithms. AES was chosen to represent the symmetric cipher and the RSA for asymmetric ciphers. High-r作者: blithe 時(shí)間: 2025-3-23 10:40
Aspect-Based Sentiment Analysis of Indonesian-Language Hotel Reviews Using Long Short-Term Memory w an analytical model that can comprehensively present the aspects and sentiments in user reviews is required. This study proposes the use of a long short-term memory (LSTM) model with an attention mechanism to perform aspect-based sentiment analysis. The architecture used also implements double full作者: 有惡臭 時(shí)間: 2025-3-23 14:44 作者: GEAR 時(shí)間: 2025-3-23 19:26
,Classification of?Credit Applicants Using SVM Variants Coupled with?Filter-Based Feature Selection,edit scoring models are extremely important for financial agencies to classify a new applicant, in order to decide whether to approve or reject its credit application. This paper presents a credit scoring model based on SVM variants (.-SVM, .-SVM) combined with two filter feature selection methods, 作者: 腐爛 時(shí)間: 2025-3-24 00:28 作者: 完成 時(shí)間: 2025-3-24 02:28 作者: 去世 時(shí)間: 2025-3-24 09:25
,Combining Static and?Contextual Features: The Case of?English Tweets,n and analysis of users’ feelings, opinions, emotions and reactions to different topics. Pre-trained Neural Language Models (LMs) have yielded outstanding scores on a variety of Natural Language Processing (NLP) related tasks across different languages. In this paper, we propose that the efficiency 作者: Generic-Drug 時(shí)間: 2025-3-24 12:01 作者: 止痛藥 時(shí)間: 2025-3-24 16:22
Cybersecurity Awareness Through Serious Games: A Systematic Literature Review,, and health. This increases the need for more understanding and knowledge of cybersecurity. The worldwide digital system, as well as people’s privacy, are under constant threat in relevant areas such as health, where patients’ data is among the most confidential information. The serious game domain作者: MIR 時(shí)間: 2025-3-24 21:23 作者: 入伍儀式 時(shí)間: 2025-3-24 23:37 作者: faddish 時(shí)間: 2025-3-25 05:29 作者: Priapism 時(shí)間: 2025-3-25 10:42 作者: 舉止粗野的人 時(shí)間: 2025-3-25 14:10 作者: inconceivable 時(shí)間: 2025-3-25 19:35
https://doi.org/10.1007/978-3-476-03370-3ies. Machine Learning is among the new approaches used today in this area. In the proposed work, we constructed a multilayer Stacking Network, composed of a set of 8 selected trained models, based on grid search cross-validation. The model we suggested scored the best result in terms of accuracy, 80.1%, higher than any of its base models.作者: 預(yù)示 時(shí)間: 2025-3-25 23:27 作者: 舊病復(fù)發(fā) 時(shí)間: 2025-3-26 03:25
,Classification of?Credit Applicants Using SVM Variants Coupled with?Filter-Based Feature Selection,to enhance the preprocessing task and models performances. In this study, a public credit dataset namely Australian has been used to test our experiments. Experimental results indicate that our methods are efficient in credit risk analysis. They make the assessment faster and increase the accuracy of the classification.作者: infelicitous 時(shí)間: 2025-3-26 04:27
Conference proceedings 2023 organized by the Research Center for Data and Information Sciences at the National Research and Innovation Agency (BRIN), Republic of Indonesia, and Moroccan Mediterranean Association of Sciences and Sustainable Development, Morocco, during March 30–31, 2022, hosted in online mode in Bandung, Indon作者: 類似思想 時(shí)間: 2025-3-26 11:21
Grundlagen der motorischen Verbrennungerms of coding quality and accuracy, processing speed and execution, coding complexity, coding efficiency, and homogeneousness. To sum up, symmetric encryption techniques protect the face recognition system faster and better than asymmetric encryption techniques.作者: 模仿 時(shí)間: 2025-3-26 15:28
Egon Diczfalusy,Christian Lauritzend diagnosis to patient-based diagnosis. This article will discuss big data technology, including its definition, characteristics, technology, relationship, and influence on the healthcare industry. The concept of machine learning technology, as well as its influence on healthcare, will be also explored.作者: 裹住 時(shí)間: 2025-3-26 20:06
Polymers and Resins as Food for Microbes as a ludic tool for educational purposes. The effectiveness of the proposed solution is measured through a real experiment with a sample of learners and with a comparative analysis of the obtained results.作者: anagen 時(shí)間: 2025-3-26 23:33
Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System,erms of coding quality and accuracy, processing speed and execution, coding complexity, coding efficiency, and homogeneousness. To sum up, symmetric encryption techniques protect the face recognition system faster and better than asymmetric encryption techniques.作者: tackle 時(shí)間: 2025-3-27 04:48 作者: champaign 時(shí)間: 2025-3-27 09:00 作者: pester 時(shí)間: 2025-3-27 10:53 作者: 擁護(hù)者 時(shí)間: 2025-3-27 16:50 作者: 后天習(xí)得 時(shí)間: 2025-3-27 20:54 作者: Between 時(shí)間: 2025-3-27 22:51
H.G.J. Voesten,O.R.M. Wikkeling,P. Klinkertwe aim at measuring the usability of a serious game in order to guide the teacher toward effective evaluation of their pedagogical and ludic potential for an adequate insertion in the teaching process.作者: 一條卷發(fā) 時(shí)間: 2025-3-28 02:59 作者: OREX 時(shí)間: 2025-3-28 08:40
Tell Me About Yourself: What Is Language?,social media (e.g., Twitter). We demonstrate that the combination of static word embeddings with contextual word representations is indeed effective for building an enhanced Sentiment Analysis system for English tweets.作者: 黑豹 時(shí)間: 2025-3-28 14:28
Language of Science, Language of Secrecyting Protocols in the market which are AODV and DSDV. The comparison is done using Omnet++?simulator based on 3 metrics which are end to end delay, packets delivery ratio, and throughput and finally the results will be based on varying the number of nodes and pause time.作者: 絆住 時(shí)間: 2025-3-28 18:02 作者: 不法行為 時(shí)間: 2025-3-28 20:55 作者: 反應(yīng) 時(shí)間: 2025-3-29 00:09 作者: 打算 時(shí)間: 2025-3-29 04:18 作者: 憲法沒有 時(shí)間: 2025-3-29 08:26 作者: figment 時(shí)間: 2025-3-29 15:24 作者: 借喻 時(shí)間: 2025-3-29 17:55 作者: 逗留 時(shí)間: 2025-3-29 19:58
Comparative Study on the Density and Velocity of AODV and DSDV Protocols Using OMNET++,ting Protocols in the market which are AODV and DSDV. The comparison is done using Omnet++?simulator based on 3 metrics which are end to end delay, packets delivery ratio, and throughput and finally the results will be based on varying the number of nodes and pause time.作者: Custodian 時(shí)間: 2025-3-30 02:26
Cybersecurity Awareness Through Serious Games: A Systematic Literature Review,a fun element throughout the procedure. The purpose of this study is to outline existing literature, and investigate the numerous serious games used as a tool to increase cybersecurity skills among employees in different domains.作者: 健壯 時(shí)間: 2025-3-30 08:06 作者: Feigned 時(shí)間: 2025-3-30 09:55 作者: TIA742 時(shí)間: 2025-3-30 15:41
https://doi.org/10.1057/978-1-349-96048-4t of smart public transportation, it has been evaluated that it is a system that provides information such as speed, route, location and arrival time for all vehicles used in public transportation in real time. It is an efficient, effective, innovative, dynamic, environmentalist, value-added and sus作者: MURKY 時(shí)間: 2025-3-30 20:31
A. Bankier,J. Brady,N. A. Myersusing a hidden units parameter of 128, dropout parameter of 0.3, and recurrent dropout parameter of 0.3. Results show that the attention mechanism can improve the performance of the LSTM model in performing aspect-based sentiment analysis.作者: 反饋 時(shí)間: 2025-3-31 00:39
Of Books, Barns, and BoardroomsTE and without SMOTE with Stratified K-Fold CV algorithm. The highest performance accuracy with SMOTE is obtained at 90.7% with the SVM model. Whereas without SMOTE, the highest performance accuracy uses the SVM with a value of 87.8%. Furthermore, with the addition of the Stratified K-Fold CV algori作者: Irksome 時(shí)間: 2025-3-31 02:54
Emerging Trends in Intelligent Systems & Network Security作者: LAY 時(shí)間: 2025-3-31 05:16 作者: ostrish 時(shí)間: 2025-3-31 11:52
A Proposed Big Data Architecture Using Data Lakes for Education Systems,e management of the different data sources to their final consumption. The proposal approach includes data lake as a means of modernizing decision-making processes, in particular data warehouses and OLAP methods. It will be used as a means for data consolidation for the integration of heterogeneous 作者: 委屈 時(shí)間: 2025-3-31 14:29 作者: 獨(dú)輪車 時(shí)間: 2025-3-31 18:11
Aspect-Based Sentiment Analysis of Indonesian-Language Hotel Reviews Using Long Short-Term Memory wusing a hidden units parameter of 128, dropout parameter of 0.3, and recurrent dropout parameter of 0.3. Results show that the attention mechanism can improve the performance of the LSTM model in performing aspect-based sentiment analysis.作者: Parameter 時(shí)間: 2025-3-31 21:41 作者: Biofeedback 時(shí)間: 2025-4-1 02:25
Conference proceedings 2023 leveraging advanced information systems, networking, and security for competitive advantage and cost savings in modern industrial sectors as well as public, business, and education sectors. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from acros作者: 小母馬 時(shí)間: 2025-4-1 08:46
2367-4512 ge and cost savings in modern industrial sectors as well as public, business, and education sectors. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from acros978-3-031-15190-3978-3-031-15191-0Series ISSN 2367-4512 Series E-ISSN 2367-4520 作者: radiograph 時(shí)間: 2025-4-1 12:34
978-3-031-15190-3The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: 條街道往前推 時(shí)間: 2025-4-1 17:46 作者: configuration 時(shí)間: 2025-4-1 21:07
Daniele Lorenzano,Daniel G. Ezraems. Therefore, a new bi-objective model is designed to minimize both the total transit time which induces lower costs for the transportation service providers and the total waiting time for the travellers. To solve the new problem, an evolutionary algorithm is proposed based on two perturbation ope作者: Dna262 時(shí)間: 2025-4-1 23:39