標題: Titlebook: Evolution in Computational Intelligence; Proceedings of the 9 Vikrant Bhateja,Jinshan Tang,Ranjita Das Conference proceedings 2022 The Edit [打印本頁] 作者: 挑染 時間: 2025-3-21 17:52
書目名稱Evolution in Computational Intelligence影響因子(影響力)
書目名稱Evolution in Computational Intelligence影響因子(影響力)學科排名
書目名稱Evolution in Computational Intelligence網(wǎng)絡公開度
書目名稱Evolution in Computational Intelligence網(wǎng)絡公開度學科排名
書目名稱Evolution in Computational Intelligence被引頻次
書目名稱Evolution in Computational Intelligence被引頻次學科排名
書目名稱Evolution in Computational Intelligence年度引用
書目名稱Evolution in Computational Intelligence年度引用學科排名
書目名稱Evolution in Computational Intelligence讀者反饋
書目名稱Evolution in Computational Intelligence讀者反饋學科排名
作者: inhumane 時間: 2025-3-22 00:13 作者: insurrection 時間: 2025-3-22 00:52
Introduction to Computational Techniques,ing mainly depends on the page rank. The immense pool of data related to the user’s queries and this data is stored in the various webpages and increases rapidly. Yet, all data is not relevant to the user. Whenever a user writes a query in the search engine, it should be able to give the relevant in作者: 傾聽 時間: 2025-3-22 08:15
Principles of Environmental Modeling, users can be achieved by a live emotion analysis and verification to corroborate messages of both ends which ultimately nullifies the deceit made to complainers on the live chat. This emotion artificial intelligent verifier works on the concept of licensing or declining authenticity of message by c作者: OTHER 時間: 2025-3-22 09:33 作者: 易受刺激 時間: 2025-3-22 16:19 作者: 易受刺激 時間: 2025-3-22 18:56
Vasu D. Appanna,Emmanuel Pankar,Robert Hamele tools calculate similarity between the documents using a sequence of the tokens/words present in the documents which are to be compared. A semantic relationship between the words for eg., word and its synonym are treated as different, while calculating the similarity between the documents. Few too作者: photopsia 時間: 2025-3-22 23:35 作者: VEST 時間: 2025-3-23 03:28 作者: 使出神 時間: 2025-3-23 05:32
Nanotechnology for Water Remediation,ication, tampering and copyright infringement of data. Unlike conventional Arnold scrambling method, the proposed method is bounded with two-level security in which blocks are scrambled with one key and simultaneously each block is scrambled at pixel level with second key for the same image which in作者: Lignans 時間: 2025-3-23 13:24
An Introduction to Nanomaterials,eneficial for students as well as teachers. Some of the semi-automated evaluation tools for SQL queries are reported in the literature though none of them provides Quantitative as well as Qualitative feedback. All the evaluation tools available for SQL queries provide a binary type of feedback, whic作者: Alienated 時間: 2025-3-23 17:08 作者: foodstuff 時間: 2025-3-23 21:14 作者: ARC 時間: 2025-3-23 23:05 作者: 悄悄移動 時間: 2025-3-24 03:08 作者: 易達到 時間: 2025-3-24 10:34
https://doi.org/10.1057/978-1-137-47499-5tic nature and randomness of EAs ascertain a larger diversity of the search heuristic, and hence, promises tremendous potential in reaching a better solution. Genetic Algorithm (GA) is a prime example of an EA. In the present time, with the rapid increase of EAs in numbers, a need for algorithmic ev作者: arsenal 時間: 2025-3-24 11:56 作者: 精致 時間: 2025-3-24 15:45 作者: 機械 時間: 2025-3-24 20:35
Kenneth S. Ramos,Abeer A. I. Hassanin at numerous levels. Here we presented a new scheme for RVCS with a perfect reconstruction of white pixels (PRWP) and an additional basis matrix (ABM) which boosts contrast. The method has been illustrated on the basis of investigational examinations. We made an evaluation between the conventional s作者: PTCA635 時間: 2025-3-25 01:40 作者: airborne 時間: 2025-3-25 05:27 作者: 憎惡 時間: 2025-3-25 09:40 作者: Negligible 時間: 2025-3-25 11:48
Vikrant Bhateja,Jinshan Tang,Ranjita DasPresents research works in the field of intelligent computing.Explores both the theoretical and practical aspects of data-intensive computing.Serves as a reference for researchers and practitioners in作者: atopic-rhinitis 時間: 2025-3-25 19:39 作者: 卜聞 時間: 2025-3-25 21:37
2190-3018 g.Serves as a reference for researchers and practitioners inThis book presents the proceedings of the 9th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2021), held at NIT Mizoram, Aizwal, Mizoram, India, during June 25 – 26, 2021. FICTA conference aim作者: 泥沼 時間: 2025-3-26 03:35
Kenneth S. Ramos,Abeer A. I. Hassanin which boosts contrast. The method has been illustrated on the basis of investigational examinations. We made an evaluation between the conventional schemes and the proposed scheme through investigational analysis. The results revealed that our scheme improves the visual quality and ensures security and reliability.作者: apiary 時間: 2025-3-26 05:33
Recursive Visual Cryptography Scheme with PRWP and Additional Basis Matrix, which boosts contrast. The method has been illustrated on the basis of investigational examinations. We made an evaluation between the conventional schemes and the proposed scheme through investigational analysis. The results revealed that our scheme improves the visual quality and ensures security and reliability.作者: saphenous-vein 時間: 2025-3-26 09:15 作者: Expand 時間: 2025-3-26 14:39 作者: Dungeon 時間: 2025-3-26 17:46
https://doi.org/10.1007/978-94-011-0081-6amework for detecting bots using a machine learning method based on Kendall‘s tau-b (b) and a variety of data, including the number of followers, friends, listed counts, favorites count, and confirmed statuses counts, default profile, and default profile image.作者: Ethics 時間: 2025-3-26 21:56
Introduction to Computational Techniques,arch structure of web or some algorithms that use Web-Content-Mining in order to search the content of documents, whereas some algorithm uses the combination of both algorithms. In this paper, the comparative study on different page-rank algorithms is discussed and found.作者: gain631 時間: 2025-3-27 01:25 作者: jagged 時間: 2025-3-27 07:48
An Introduction to Oceanography,sing a deep learning classifier model at the subject level. The results obtained using a model trained with data augmentation show a significant increase of 6% in the performance of the classification model.作者: MURKY 時間: 2025-3-27 11:12 作者: groggy 時間: 2025-3-27 14:48
,Deep Learning Algorithms for Object Detection—A Study, of these algorithms is acceptable in the real environment. This paper compares the SSD, YOLOv3 and YOLOv4 for detecting objects in the indoor environment and discusses the aspects of sparse and dense prediction for the various deep learning algorithms used for object detection.作者: Adornment 時間: 2025-3-27 19:13 作者: FRAUD 時間: 2025-3-27 23:58
Conference proceedings 2022ld at NIT Mizoram, Aizwal, Mizoram, India, during June 25 – 26, 2021. FICTA conference aims to bring together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various eng作者: Ferritin 時間: 2025-3-28 03:58
An Improved Approach for Automated Essay Scoring with LSTM and Word Embedding,ing. Both types of approaches are not fulfilling essay evaluation and not able to retrieve semantic information from essays. Here we are evaluating the essay with Word2Vec and Long Short-Term Memory (LSTM) with K-Fold cross-validation and we got an accuracy of 85.35.作者: 生存環(huán)境 時間: 2025-3-28 09:58
Comparative Performance Analysis of Recent Evolutionary Algorithms,aluation has become prominent. In this paper, we have summarized the algorithmic framework of EAs and presented the computational performances of four recent EAs, tested upon a set of fifteen CEC-2015 benchmark functions.作者: 換話題 時間: 2025-3-28 11:57 作者: overbearing 時間: 2025-3-28 16:17
Life Cycle Assessment of Nanoparticles,a rates. The experimental results show that due to low hop count and fewer nodes getting involved in OF-0, it performs better than MRHOF, as MRHOF requires more stable links to transmit the data. Thus, OF-0 is useful in the scenarios where there are fewer nodes, and the destination is closer.作者: 宣稱 時間: 2025-3-28 19:16
Environmental Noise Control Regulations, to encrypt the session data. Moreover, it records every transaction of patient data in the Blockchain for better traceability. The performance of the proposed framework is evaluated in simulation to show its effectiveness.作者: Encephalitis 時間: 2025-3-29 02:19 作者: Badger 時間: 2025-3-29 03:34
Analysis of the Standard Objective Functions of RPL,a rates. The experimental results show that due to low hop count and fewer nodes getting involved in OF-0, it performs better than MRHOF, as MRHOF requires more stable links to transmit the data. Thus, OF-0 is useful in the scenarios where there are fewer nodes, and the destination is closer.作者: nonsensical 時間: 2025-3-29 09:12 作者: 咽下 時間: 2025-3-29 14:11 作者: 洞穴 時間: 2025-3-29 16:46 作者: 漸強 時間: 2025-3-29 21:27
Live Emotion Verifier for Chat Applications Using Emotional Intelligence, users can be achieved by a live emotion analysis and verification to corroborate messages of both ends which ultimately nullifies the deceit made to complainers on the live chat. This emotion artificial intelligent verifier works on the concept of licensing or declining authenticity of message by c作者: 黃油沒有 時間: 2025-3-30 00:17 作者: 極大的痛苦 時間: 2025-3-30 04:46 作者: 不整齊 時間: 2025-3-30 09:23 作者: 領(lǐng)先 時間: 2025-3-30 12:33 作者: 掃興 時間: 2025-3-30 17:48
,Deep Learning Algorithms for Object Detection—A Study,ts and locating their instances in a given image. It is used in a wide range of applications, including self-driving cars, navigating visually impaired people in an indoor/outdoor environment, counting crowds, detecting vehicles, tracking objects, etc. Traditionally, the opencv’s feature extraction 作者: 梯田 時間: 2025-3-30 22:58
A Novel Multiblock Region-Based Arnold Transformation for Image Watermarking Combined with DWT-PSO ication, tampering and copyright infringement of data. Unlike conventional Arnold scrambling method, the proposed method is bounded with two-level security in which blocks are scrambled with one key and simultaneously each block is scrambled at pixel level with second key for the same image which in作者: 不理會 時間: 2025-3-31 03:39 作者: 上坡 時間: 2025-3-31 08:41 作者: laceration 時間: 2025-3-31 12:23 作者: Intervention 時間: 2025-3-31 16:07 作者: 珍奇 時間: 2025-3-31 18:12 作者: 有發(fā)明天才 時間: 2025-4-1 01:35 作者: sinoatrial-node 時間: 2025-4-1 02:36
Medical Image Protection Using Blockchain for E-healthcare System,can reports are stored and shared among the stockholders of the system. However, the security of these sensitive records against unauthorized access and misuse is of major concern. In this context, a Blockchain-based record-sharing system could play an important role for secure transactions of medic