標題: Titlebook: Global Trends in Information Systems and Software Applications; 4th International Co P. Venkata Krishna,M. Rajasekhara Babu,Ezendu Ariw Con [打印本頁] 作者: 作業(yè) 時間: 2025-3-21 20:08
書目名稱Global Trends in Information Systems and Software Applications影響因子(影響力)
書目名稱Global Trends in Information Systems and Software Applications影響因子(影響力)學科排名
書目名稱Global Trends in Information Systems and Software Applications網絡公開度
書目名稱Global Trends in Information Systems and Software Applications網絡公開度學科排名
書目名稱Global Trends in Information Systems and Software Applications被引頻次
書目名稱Global Trends in Information Systems and Software Applications被引頻次學科排名
書目名稱Global Trends in Information Systems and Software Applications年度引用
書目名稱Global Trends in Information Systems and Software Applications年度引用學科排名
書目名稱Global Trends in Information Systems and Software Applications讀者反饋
書目名稱Global Trends in Information Systems and Software Applications讀者反饋學科排名
作者: colony 時間: 2025-3-21 20:14 作者: negotiable 時間: 2025-3-22 03:00
https://doi.org/10.1007/978-3-642-87241-9e to the huge difference between number of columns and number of rows, which degrades both accuracy and efficiency performance of classification. In this paper we propose a two phase approach to the given datasets to address the present scenario. Dimension Reduction Method Supervised Locally Linear 作者: 修飾語 時間: 2025-3-22 04:58 作者: STAT 時間: 2025-3-22 12:01
Deutsches Krebsforschungszentrumss networks has encouraged the copyright fraud, unauthorized access and illegal usage. This brings new technical challenges to provide the end-to-end security to multimedia contents for establishing ownership rights, ensuring authorized access, preventing illegal replication etc. To address the abov作者: 騎師 時間: 2025-3-22 13:16 作者: 騎師 時間: 2025-3-22 20:52
Gustav Wagner,Andrea Mauerberger M.A.he software components have been distributed among the constituents of software architecture. In this paper partitional clustering of the use cases has been proposed. The components to be clustered have been extracted from the mdl file formed by default in Rational Rose. Rational Rose has been taken作者: Headstrong 時間: 2025-3-22 23:27 作者: 正面 時間: 2025-3-23 04:15
https://doi.org/10.1007/978-3-642-55801-6-PBB], the best block for embedding the watermark is identified, that is based on similarity between DCT coefficients of original image and the watermark image. The embedding method is based on [2] which use the deterministic one-to-one compound mappings of image pixel values. The compound mappings 作者: Arrhythmia 時間: 2025-3-23 08:38
https://doi.org/10.1007/978-3-642-93474-2d over the universe, taken one each taken at a time. In the view of granular computing, classical rough set theory is based upon single granulation. Extending this notion, a rough set model based on multi-granulations (MGRS) was introduced in [5]. In this approach, approximations of sets were define作者: Hypomania 時間: 2025-3-23 10:57
https://doi.org/10.1007/978-3-642-77128-6ble in the field of Automatic heart sound classifier (AHSC) is presented. The various features extracted in the experiments were studied in the presence and absence of noise and for various biomedical signals and the system reported to be robust. The developed model shall be used as front end for AH作者: Etching 時間: 2025-3-23 17:22
Krebsrisiken im Kopf-Hals-Bereichlest set of rules from the training data set with predetermined targets. Various techniques like Genetic Algorithm, Rough set, Swarm based approaches have been applied for Feature Selection (FS). Particle swarm Optimization was proved to be a competitive technique for FS. However it has certain limi作者: Diuretic 時間: 2025-3-23 21:33 作者: dendrites 時間: 2025-3-23 22:43
https://doi.org/10.1007/978-3-322-87012-4ecessary. Due to this images are lead to distortion like blocking, ringing and blurring. The channel noise also gets introduced if transmitted over communication channel. Due to the distortion, image quality assessment plays an important role. In majority applications, original image is not availabl作者: Ibd810 時間: 2025-3-24 05:21
Risikomanagement von Kreditderivaten,hallenging problems. Numerous methodologies for developing agent-based systems have been proposed in the literature. Though these methodologies are maturing rapidly, they emphasis only on analysis, design and implementation phase of development process. There is no complete and potential testing tec作者: 全面 時間: 2025-3-24 09:06
https://doi.org/10.1007/978-3-658-02400-0icle types etc. without vehicles classification. This paper reviews various neural network algorithms using single loop detector that can be used in real time traffic management system to classify vehicles. Since it is evident that neural network is a weak classifier, we propose a model which uses a作者: certitude 時間: 2025-3-24 13:23
https://doi.org/10.1007/978-3-8348-9144-0 to precede to future revelations. COADSI is a model, based on the observations of various satellites like IRS; INSAT captured image details were extracted and analyzed using the latest Soft computing techniques. These techniques play vital role in handling the satellite image derived data to furthe作者: 喚醒 時間: 2025-3-24 16:02
Die Kommunikation mit Kreditkunden,ity for executing gaming engines(Saas) and graphics rendering is available in the cloud servers instead of mobile devices, PC’s since mobile devices and PCs can not run the game beyond the random access Memory(RAM) available. The application in Cloud is developed using XAML so that it can be reused 作者: deficiency 時間: 2025-3-24 20:02
Financial Sequences and the Hidden Markov Model,he preceding sequence. With this in mind, financial sequences of a five-letter alphabet representing sharp fall, slight fall, no change, slight rise and sharp rise in the stock prices of five technology companies were derived from the daily closing price between January 2008 and May 2011 on the NASD作者: corpuscle 時間: 2025-3-25 03:10
A Dynamic Semantic Metadata Model in Cloud Computing,ess these distributed data with a reduced latency, this paper describes into the dynamic metadata model in cloud computing database. When designing a metadata, the storage location of metadata and the attributes inside the metadata is of importance for the efficient retrieval of data. We propose a n作者: 牽索 時間: 2025-3-25 03:54 作者: WAX 時間: 2025-3-25 10:38 作者: allude 時間: 2025-3-25 15:20
Multiple 3D Chaotic Systems Based Approach for Visual Multimedia Content Protection,ss networks has encouraged the copyright fraud, unauthorized access and illegal usage. This brings new technical challenges to provide the end-to-end security to multimedia contents for establishing ownership rights, ensuring authorized access, preventing illegal replication etc. To address the abov作者: Ordnance 時間: 2025-3-25 19:35
Kannada Word Sense Disambiguation Using Association Rules, appropriate sense for an ambiguous word in a sentence is a central problem in Machine Translation. Because, each sense of a word in a source language sentence may generate different target language sentences. Knowledge and corpus based methods are usually applied for disambiguation task. In the pre作者: convulsion 時間: 2025-3-25 23:56
K-Means Clustering of Use-Cases Using MDL,he software components have been distributed among the constituents of software architecture. In this paper partitional clustering of the use cases has been proposed. The components to be clustered have been extracted from the mdl file formed by default in Rational Rose. Rational Rose has been taken作者: 縮影 時間: 2025-3-26 02:50 作者: 樸素 時間: 2025-3-26 05:25
A Novice Approach for Lossless Visible Watermarking Approach by Pioneering the Best Block (LVW-PBB)-PBB], the best block for embedding the watermark is identified, that is based on similarity between DCT coefficients of original image and the watermark image. The embedding method is based on [2] which use the deterministic one-to-one compound mappings of image pixel values. The compound mappings 作者: Catheter 時間: 2025-3-26 09:29 作者: fodlder 時間: 2025-3-26 13:44 作者: 無節(jié)奏 時間: 2025-3-26 19:19 作者: 可互換 時間: 2025-3-26 23:21 作者: 厚顏 時間: 2025-3-27 04:45 作者: 用肘 時間: 2025-3-27 07:19
CAC Based Data Mining Workflow to Test and Re-engineer Software Agents,hallenging problems. Numerous methodologies for developing agent-based systems have been proposed in the literature. Though these methodologies are maturing rapidly, they emphasis only on analysis, design and implementation phase of development process. There is no complete and potential testing tec作者: 偉大 時間: 2025-3-27 09:34
An Ensembled Neural Network Classifier for Vehicle Classification Using ILD,icle types etc. without vehicles classification. This paper reviews various neural network algorithms using single loop detector that can be used in real time traffic management system to classify vehicles. Since it is evident that neural network is a weak classifier, we propose a model which uses a作者: 減去 時間: 2025-3-27 16:32 作者: 起草 時間: 2025-3-27 20:15
Cloud Gaming with P2P Network Using XAML and Windows Azure,ity for executing gaming engines(Saas) and graphics rendering is available in the cloud servers instead of mobile devices, PC’s since mobile devices and PCs can not run the game beyond the random access Memory(RAM) available. The application in Cloud is developed using XAML so that it can be reused 作者: 吃掉 時間: 2025-3-27 22:02
1865-0929 ed proceedings of the International Conference on Global Trends in Computing and Communication (CCIS 0269) and the International Conference on Global Trends in Information Systems and Software Applications (CCIS 0270), ObCom 2011, held in Vellore, India, in December 2011. The 173 full papers present作者: 情節(jié)劇 時間: 2025-3-28 04:35 作者: 楓樹 時間: 2025-3-28 08:58
https://doi.org/10.1007/978-3-8348-9144-0acted and analyzed using the latest Soft computing techniques. These techniques play vital role in handling the satellite image derived data to further study, classify analyze and simulate a new model to bring our assumptions and predictions to prove to be happen in further observations of climatic conditions.作者: graphy 時間: 2025-3-28 12:08 作者: 后退 時間: 2025-3-28 18:07
https://doi.org/10.1007/978-3-642-87241-9Embedding (SLLE) is applied in the first phase to reduce dimension of the datasets and in next phase classification through K-NN and SVM is done. Experiments are carried on different high dimensional datasets and then we compared of different dimension reduction and classification methods.作者: ROOF 時間: 2025-3-28 20:42
https://doi.org/10.1007/978-3-642-57369-9, we study some basic set theoretic operations on the types of rough sets formed by the topological characterization. In addition to that, we provide a real life example for the depth classification of the concept.作者: 引水渠 時間: 2025-3-29 01:42
Krebsrisiken im Kopf-Hals-Bereichtations like premature convergence which is resolved by Intelligent Dynamic Swarm (IDS) algorithm. IDS could produce the reduct set in a smaller time complexity but lacks the accuracy. In this paper we propose an improvised algorithm of IDS for feature selection.作者: 貞潔 時間: 2025-3-29 03:57 作者: BIBLE 時間: 2025-3-29 08:21 作者: APO 時間: 2025-3-29 13:57 作者: 職業(yè) 時間: 2025-3-29 17:36
Topological Characterization of Rough Set on Two Universal Sets and Knowledge Representation,, we study some basic set theoretic operations on the types of rough sets formed by the topological characterization. In addition to that, we provide a real life example for the depth classification of the concept.作者: 沒有希望 時間: 2025-3-29 23:17
Improved Intelligent Dynamic Swarm PSO Algorithm and Rough Set for Feature Selection,tations like premature convergence which is resolved by Intelligent Dynamic Swarm (IDS) algorithm. IDS could produce the reduct set in a smaller time complexity but lacks the accuracy. In this paper we propose an improvised algorithm of IDS for feature selection.作者: 過去分詞 時間: 2025-3-30 02:44
Estimating Database Size and Its Development Effort at Conceptual Design Stage, on the database volume. In this paper, a set of metrics have been proposed and validated for estimating database size using ER and Enhanced ER diagram artifacts. The effort of database development based on the proposed size metrics have been validated using COCOMO model.作者: critique 時間: 2025-3-30 07:37 作者: Indigence 時間: 2025-3-30 09:17 作者: 防止 時間: 2025-3-30 12:24 作者: HERE 時間: 2025-3-30 18:15
https://doi.org/10.1007/978-3-642-55801-6mizations have also been proposed. In case of various attacks such as JPEG compression, filtering, cropping, and additive Noise, the quality of cover image is acceptable even after the watermark extraction. Thus the proposed method is robust.作者: 金盤是高原 時間: 2025-3-30 23:54
Risikomanagement von Kreditderivaten,ystem. We also present here a Classification and Clustering (CAC) based data mining workflow to test and re-engineer an agent based system such that we achieve a customer satisfaction rating of 89% for?meeting quality expectations and an average project budget variation of just 3%. Both figures are ranging far higher than industry standards.作者: jungle 時間: 2025-3-31 04:43
Kannada Word Sense Disambiguation Using Association Rules, The example sentences needs to be disambiguated are stored in testing corpora. The proposed algorithm attempts to disambiguate all the content words such as nouns, verbs, adverbs, adjectives in an unrestricted text using association rules.作者: Peak-Bone-Mass 時間: 2025-3-31 08:49
K-Means Clustering of Use-Cases Using MDL,has been extracted from the MDL file on which k means clustering algorithm has been applied which results into non overlapping clusters. Euclidean distance measure has been used to measure the distance between the components. In order to represent the partitional clustering, graphs have been drawn.作者: 變形詞 時間: 2025-3-31 10:15 作者: 全部 時間: 2025-3-31 16:34 作者: patriarch 時間: 2025-3-31 18:16 作者: 減去 時間: 2025-4-1 00:04
,Climate Analysis Using Oceanic Data from Satellite Images – CAODSI,acted and analyzed using the latest Soft computing techniques. These techniques play vital role in handling the satellite image derived data to further study, classify analyze and simulate a new model to bring our assumptions and predictions to prove to be happen in further observations of climatic conditions.作者: 職業(yè)拳擊手 時間: 2025-4-1 05:23
https://doi.org/10.1007/978-3-642-82878-2lysis shows clear evidence of non-stationarity of the underlying time series. The hidden Markov model accounts for some but not all non-stationarity. It is argued that an analysis based on contextual probability is expected to outperform the hidden Markov model.作者: 碎石頭 時間: 2025-4-1 09:25
https://doi.org/10.1007/978-3-642-47699-0se-Document frequency Definition Semantic) score, derived from the set of documents marked as highly relevant to the domain by the Web users while browsing the Web, to decide upon the set of link to be included for future crawl that can lead to the pages most relevant to the domain.作者: Tracheotomy 時間: 2025-4-1 14:11
Financial Sequences and the Hidden Markov Model,lysis shows clear evidence of non-stationarity of the underlying time series. The hidden Markov model accounts for some but not all non-stationarity. It is argued that an analysis based on contextual probability is expected to outperform the hidden Markov model.作者: 等級的上升 時間: 2025-4-1 15:45
Term-Frequency Inverse-Document Frequency Definition Semantic (TIDS) Based Focused Web Crawler,se-Document frequency Definition Semantic) score, derived from the set of documents marked as highly relevant to the domain by the Web users while browsing the Web, to decide upon the set of link to be included for future crawl that can lead to the pages most relevant to the domain.作者: heirloom 時間: 2025-4-1 19:17
Conference proceedings 2012cation (CCIS 0269) and the International Conference on Global Trends in Information Systems and Software Applications (CCIS 0270), ObCom 2011, held in Vellore, India, in December 2011. The 173 full papers presented together with a keynote paper and invited papers were carefully reviewed and selected作者: BLAZE 時間: 2025-4-1 23:40