派博傳思國際中心

標題: Titlebook: Evolution in Computational Intelligence; Proceedings of the 9 Vikrant Bhateja,Jinshan Tang,Ranjita Das Conference proceedings 2022 The Edit [打印本頁]

作者: 挑染    時間: 2025-3-21 17:52
書目名稱Evolution in Computational Intelligence影響因子(影響力)




書目名稱Evolution in Computational Intelligence影響因子(影響力)學科排名




書目名稱Evolution in Computational Intelligence網(wǎng)絡公開度




書目名稱Evolution in Computational Intelligence網(wǎng)絡公開度學科排名




書目名稱Evolution in Computational Intelligence被引頻次




書目名稱Evolution in Computational Intelligence被引頻次學科排名




書目名稱Evolution in Computational Intelligence年度引用




書目名稱Evolution in Computational Intelligence年度引用學科排名




書目名稱Evolution in Computational Intelligence讀者反饋




書目名稱Evolution in Computational Intelligence讀者反饋學科排名





作者: inhumane    時間: 2025-3-22 00:13

作者: insurrection    時間: 2025-3-22 00:52
Introduction to Computational Techniques,ing mainly depends on the page rank. The immense pool of data related to the user’s queries and this data is stored in the various webpages and increases rapidly. Yet, all data is not relevant to the user. Whenever a user writes a query in the search engine, it should be able to give the relevant in
作者: 傾聽    時間: 2025-3-22 08:15
Principles of Environmental Modeling, users can be achieved by a live emotion analysis and verification to corroborate messages of both ends which ultimately nullifies the deceit made to complainers on the live chat. This emotion artificial intelligent verifier works on the concept of licensing or declining authenticity of message by c
作者: OTHER    時間: 2025-3-22 09:33

作者: 易受刺激    時間: 2025-3-22 16:19

作者: 易受刺激    時間: 2025-3-22 18:56
Vasu D. Appanna,Emmanuel Pankar,Robert Hamele tools calculate similarity between the documents using a sequence of the tokens/words present in the documents which are to be compared. A semantic relationship between the words for eg., word and its synonym are treated as different, while calculating the similarity between the documents. Few too
作者: photopsia    時間: 2025-3-22 23:35

作者: VEST    時間: 2025-3-23 03:28

作者: 使出神    時間: 2025-3-23 05:32
Nanotechnology for Water Remediation,ication, tampering and copyright infringement of data. Unlike conventional Arnold scrambling method, the proposed method is bounded with two-level security in which blocks are scrambled with one key and simultaneously each block is scrambled at pixel level with second key for the same image which in
作者: Lignans    時間: 2025-3-23 13:24
An Introduction to Nanomaterials,eneficial for students as well as teachers. Some of the semi-automated evaluation tools for SQL queries are reported in the literature though none of them provides Quantitative as well as Qualitative feedback. All the evaluation tools available for SQL queries provide a binary type of feedback, whic
作者: Alienated    時間: 2025-3-23 17:08

作者: foodstuff    時間: 2025-3-23 21:14

作者: ARC    時間: 2025-3-23 23:05

作者: 悄悄移動    時間: 2025-3-24 03:08

作者: 易達到    時間: 2025-3-24 10:34
https://doi.org/10.1057/978-1-137-47499-5tic nature and randomness of EAs ascertain a larger diversity of the search heuristic, and hence, promises tremendous potential in reaching a better solution. Genetic Algorithm (GA) is a prime example of an EA. In the present time, with the rapid increase of EAs in numbers, a need for algorithmic ev
作者: arsenal    時間: 2025-3-24 11:56

作者: 精致    時間: 2025-3-24 15:45

作者: 機械    時間: 2025-3-24 20:35
Kenneth S. Ramos,Abeer A. I. Hassanin at numerous levels. Here we presented a new scheme for RVCS with a perfect reconstruction of white pixels (PRWP) and an additional basis matrix (ABM) which boosts contrast. The method has been illustrated on the basis of investigational examinations. We made an evaluation between the conventional s
作者: PTCA635    時間: 2025-3-25 01:40

作者: airborne    時間: 2025-3-25 05:27

作者: 憎惡    時間: 2025-3-25 09:40

作者: Negligible    時間: 2025-3-25 11:48
Vikrant Bhateja,Jinshan Tang,Ranjita DasPresents research works in the field of intelligent computing.Explores both the theoretical and practical aspects of data-intensive computing.Serves as a reference for researchers and practitioners in
作者: atopic-rhinitis    時間: 2025-3-25 19:39

作者: 卜聞    時間: 2025-3-25 21:37
2190-3018 g.Serves as a reference for researchers and practitioners inThis book presents the proceedings of the 9th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2021), held at NIT Mizoram, Aizwal, Mizoram, India, during June 25 – 26, 2021. FICTA conference aim
作者: 泥沼    時間: 2025-3-26 03:35
Kenneth S. Ramos,Abeer A. I. Hassanin which boosts contrast. The method has been illustrated on the basis of investigational examinations. We made an evaluation between the conventional schemes and the proposed scheme through investigational analysis. The results revealed that our scheme improves the visual quality and ensures security and reliability.
作者: apiary    時間: 2025-3-26 05:33
Recursive Visual Cryptography Scheme with PRWP and Additional Basis Matrix, which boosts contrast. The method has been illustrated on the basis of investigational examinations. We made an evaluation between the conventional schemes and the proposed scheme through investigational analysis. The results revealed that our scheme improves the visual quality and ensures security and reliability.
作者: saphenous-vein    時間: 2025-3-26 09:15

作者: Expand    時間: 2025-3-26 14:39

作者: Dungeon    時間: 2025-3-26 17:46
https://doi.org/10.1007/978-94-011-0081-6amework for detecting bots using a machine learning method based on Kendall‘s tau-b (b) and a variety of data, including the number of followers, friends, listed counts, favorites count, and confirmed statuses counts, default profile, and default profile image.
作者: Ethics    時間: 2025-3-26 21:56
Introduction to Computational Techniques,arch structure of web or some algorithms that use Web-Content-Mining in order to search the content of documents, whereas some algorithm uses the combination of both algorithms. In this paper, the comparative study on different page-rank algorithms is discussed and found.
作者: gain631    時間: 2025-3-27 01:25

作者: jagged    時間: 2025-3-27 07:48
An Introduction to Oceanography,sing a deep learning classifier model at the subject level. The results obtained using a model trained with data augmentation show a significant increase of 6% in the performance of the classification model.
作者: MURKY    時間: 2025-3-27 11:12

作者: groggy    時間: 2025-3-27 14:48
,Deep Learning Algorithms for Object Detection—A Study, of these algorithms is acceptable in the real environment. This paper compares the SSD, YOLOv3 and YOLOv4 for detecting objects in the indoor environment and discusses the aspects of sparse and dense prediction for the various deep learning algorithms used for object detection.
作者: Adornment    時間: 2025-3-27 19:13

作者: FRAUD    時間: 2025-3-27 23:58
Conference proceedings 2022ld at NIT Mizoram, Aizwal, Mizoram, India, during June 25 – 26, 2021. FICTA conference aims to bring together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various eng
作者: Ferritin    時間: 2025-3-28 03:58
An Improved Approach for Automated Essay Scoring with LSTM and Word Embedding,ing. Both types of approaches are not fulfilling essay evaluation and not able to retrieve semantic information from essays. Here we are evaluating the essay with Word2Vec and Long Short-Term Memory (LSTM) with K-Fold cross-validation and we got an accuracy of 85.35.
作者: 生存環(huán)境    時間: 2025-3-28 09:58
Comparative Performance Analysis of Recent Evolutionary Algorithms,aluation has become prominent. In this paper, we have summarized the algorithmic framework of EAs and presented the computational performances of four recent EAs, tested upon a set of fifteen CEC-2015 benchmark functions.
作者: 換話題    時間: 2025-3-28 11:57

作者: overbearing    時間: 2025-3-28 16:17
Life Cycle Assessment of Nanoparticles,a rates. The experimental results show that due to low hop count and fewer nodes getting involved in OF-0, it performs better than MRHOF, as MRHOF requires more stable links to transmit the data. Thus, OF-0 is useful in the scenarios where there are fewer nodes, and the destination is closer.
作者: 宣稱    時間: 2025-3-28 19:16
Environmental Noise Control Regulations, to encrypt the session data. Moreover, it records every transaction of patient data in the Blockchain for better traceability. The performance of the proposed framework is evaluated in simulation to show its effectiveness.
作者: Encephalitis    時間: 2025-3-29 02:19

作者: Badger    時間: 2025-3-29 03:34
Analysis of the Standard Objective Functions of RPL,a rates. The experimental results show that due to low hop count and fewer nodes getting involved in OF-0, it performs better than MRHOF, as MRHOF requires more stable links to transmit the data. Thus, OF-0 is useful in the scenarios where there are fewer nodes, and the destination is closer.
作者: nonsensical    時間: 2025-3-29 09:12

作者: 咽下    時間: 2025-3-29 14:11

作者: 洞穴    時間: 2025-3-29 16:46

作者: 漸強    時間: 2025-3-29 21:27
Live Emotion Verifier for Chat Applications Using Emotional Intelligence, users can be achieved by a live emotion analysis and verification to corroborate messages of both ends which ultimately nullifies the deceit made to complainers on the live chat. This emotion artificial intelligent verifier works on the concept of licensing or declining authenticity of message by c
作者: 黃油沒有    時間: 2025-3-30 00:17

作者: 極大的痛苦    時間: 2025-3-30 04:46

作者: 不整齊    時間: 2025-3-30 09:23

作者: 領(lǐng)先    時間: 2025-3-30 12:33

作者: 掃興    時間: 2025-3-30 17:48
,Deep Learning Algorithms for Object Detection—A Study,ts and locating their instances in a given image. It is used in a wide range of applications, including self-driving cars, navigating visually impaired people in an indoor/outdoor environment, counting crowds, detecting vehicles, tracking objects, etc. Traditionally, the opencv’s feature extraction
作者: 梯田    時間: 2025-3-30 22:58
A Novel Multiblock Region-Based Arnold Transformation for Image Watermarking Combined with DWT-PSO ication, tampering and copyright infringement of data. Unlike conventional Arnold scrambling method, the proposed method is bounded with two-level security in which blocks are scrambled with one key and simultaneously each block is scrambled at pixel level with second key for the same image which in
作者: 不理會    時間: 2025-3-31 03:39

作者: 上坡    時間: 2025-3-31 08:41

作者: laceration    時間: 2025-3-31 12:23

作者: Intervention    時間: 2025-3-31 16:07

作者: 珍奇    時間: 2025-3-31 18:12

作者: 有發(fā)明天才    時間: 2025-4-1 01:35

作者: sinoatrial-node    時間: 2025-4-1 02:36
Medical Image Protection Using Blockchain for E-healthcare System,can reports are stored and shared among the stockholders of the system. However, the security of these sensitive records against unauthorized access and misuse is of major concern. In this context, a Blockchain-based record-sharing system could play an important role for secure transactions of medic




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
肥乡县| 乐平市| 安宁市| 新野县| 常山县| 卢氏县| 报价| 杂多县| 黎城县| 通海县| 杭锦旗| 平南县| 绥宁县| 慈利县| 梁平县| 凤山县| 东山县| 大安市| 伊通| 包头市| 道孚县| 南宫市| 嘉鱼县| 吉木萨尔县| 盱眙县| 合作市| 永泰县| 陕西省| 瑞金市| 衡东县| 马边| 郯城县| 雅安市| 卓尼县| 道孚县| 白玉县| 建瓯市| 金塔县| 若尔盖县| 贺兰县| 云南省|