派博傳思國際中心

標(biāo)題: Titlebook: Good Practices and New Perspectives in Information Systems and Technologies; WorldCIST 2024, Volu álvaro Rocha,Hojjat Adeli,Aneta Poniszews [打印本頁]

作者: Goiter    時間: 2025-3-21 16:19
書目名稱Good Practices and New Perspectives in Information Systems and Technologies影響因子(影響力)




書目名稱Good Practices and New Perspectives in Information Systems and Technologies影響因子(影響力)學(xué)科排名




書目名稱Good Practices and New Perspectives in Information Systems and Technologies網(wǎng)絡(luò)公開度




書目名稱Good Practices and New Perspectives in Information Systems and Technologies網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Good Practices and New Perspectives in Information Systems and Technologies被引頻次




書目名稱Good Practices and New Perspectives in Information Systems and Technologies被引頻次學(xué)科排名




書目名稱Good Practices and New Perspectives in Information Systems and Technologies年度引用




書目名稱Good Practices and New Perspectives in Information Systems and Technologies年度引用學(xué)科排名




書目名稱Good Practices and New Perspectives in Information Systems and Technologies讀者反饋




書目名稱Good Practices and New Perspectives in Information Systems and Technologies讀者反饋學(xué)科排名





作者: Anthem    時間: 2025-3-21 21:47

作者: antiquated    時間: 2025-3-22 03:24
Incidence Assessment of Diabetes by Delegation in the United Mexican States Applying the Multilayer of the prevalence and characteristics of early-onset type 2 diabetes..Given that 79% of Mexico’s population is under 40?years old [.], there is an imperative need for such studies to inform targeted preventive measures. This study aims to fill this gap by predicting the risk index for the general po
作者: 凝結(jié)劑    時間: 2025-3-22 05:25
Exploiting Physarum-Inspired Vacant Particle Transport Model to Redesign an Enterprise Networkrkloads at the backbone; here, the ‘move user’ operation derived from the basic vacant particle model forms the microscopic optimization and the restructuring of EN clusters through evolution forms the macroscopic optimization. A mathematical model with added constraints is developed to expedite the
作者: ornithology    時間: 2025-3-22 08:59

作者: 為敵    時間: 2025-3-22 12:52

作者: 為敵    時間: 2025-3-22 17:46

作者: 認(rèn)識    時間: 2025-3-23 00:54

作者: 背書    時間: 2025-3-23 04:14

作者: 卵石    時間: 2025-3-23 09:15
https://doi.org/10.1007/978-981-10-6808-9rkloads at the backbone; here, the ‘move user’ operation derived from the basic vacant particle model forms the microscopic optimization and the restructuring of EN clusters through evolution forms the macroscopic optimization. A mathematical model with added constraints is developed to expedite the
作者: Intact    時間: 2025-3-23 10:37

作者: 傷心    時間: 2025-3-23 15:25
Machine Vision Algorithms in Javasults show that the implemented system can accurately differentiate between sitting and falling movements, enabling rapid responses in emergency situations, thus contributing to improved elderly care and reducing the risk of complications associated with accidental falls.
作者: 燈泡    時間: 2025-3-23 19:51
2367-3370 ty; K) Health Informatics; L) Information Technologies in Education; M) Information Technologies in Radiocommunications; and N) Technologies for Biomedical Applications...The primary market of this book are po978-3-031-60214-6978-3-031-60215-3Series ISSN 2367-3370 Series E-ISSN 2367-3389
作者: LASH    時間: 2025-3-24 01:50
Good Practices and New Perspectives in Information Systems and TechnologiesWorldCIST 2024, Volu
作者: Deference    時間: 2025-3-24 03:46

作者: BROOK    時間: 2025-3-24 06:43

作者: 滋養(yǎng)    時間: 2025-3-24 13:23
https://doi.org/10.1007/978-1-4842-8287-8icipate failures and launch maintenance actions increasing quality and productivity. This paper explores the integration of real-time big data techniques in industry. Specifically, this work contributes with a framework for real-time predictive maintenance supported by big data technologies. The pro
作者: 雪上輕舟飛過    時間: 2025-3-24 18:29

作者: meditation    時間: 2025-3-24 20:12

作者: troponins    時間: 2025-3-24 23:36
Introduction to Machine Learning,rectile dysfunction, cardiovascular problems, high blood pressure, poor circulation, and a high probability of gangrene when there is a skin cut on an extremity where the most viable solution to risks is go septicemia or blood poisoning by pathogens generated by dead tissue is amputation of the limb
作者: 逗留    時間: 2025-3-25 06:28
Introduction to Machine Learning,nant health concern in the country, ranking as the leading cause of death in women and the second in men since 2000. It has also been identified as the primary culprit behind premature retirement, blindness, and kidney failure. Projections indicate that by 2025, nearly 11.7 million Mexicans could be
作者: Compatriot    時間: 2025-3-25 08:32
https://doi.org/10.1007/978-981-10-6808-9 boundary modification. The vacant-particle transport model apprehends the microscopic-macroscopic responding skills of Physarum to develop a transport mechanism with balanced exploration and exploitation. An existing enterprise network (EN) can be viewed as a set of clusters linking various users,
作者: 攝取    時間: 2025-3-25 15:22

作者: 低能兒    時間: 2025-3-25 18:27

作者: Affirm    時間: 2025-3-25 21:29

作者: 手銬    時間: 2025-3-26 01:49
Two-machine and three-machine problems,rogeneity of the data directly affects the investigative process in scenarios involving IoT applications. Through the analysis of a comprehensive and heterogeneous dataset collected from IoT devices, this study analyzes the use of machine learning algorithms to detect specific patterns to estimate t
作者: STERN    時間: 2025-3-26 07:21
Laser Instrumentation and Calibration,vascular function and (iii) orientation of medical intervention. The analysis of cardiac hemodynamics is based on determining the movement of blood between successive images. The used techniques fall into two categories: those estimating displacement vectors for each region of interest and those tha
作者: Antecedent    時間: 2025-3-26 10:16
New Concepts for Structural Components, automate the process of penetrating a target or collecting sensitive data while accelerating the pace of carrying out the attacks. This survey explores how AI is employed in cybersecurity attacks and what kind of targets are typical. We used scoping review methodology to sift through articles to fi
作者: 打折    時間: 2025-3-26 14:18
https://doi.org/10.1007/978-0-387-72774-5on the websites of Finnish social and healthcare districts and determine to what extent, if any, they leak their users’ personal data to third parties through the use of the collection and tracking of user data and actions with the web analytics tools. Our findings show that 82.6% of the studied web
作者: 南極    時間: 2025-3-26 18:56

作者: 上漲    時間: 2025-3-26 22:52
Machine Vision Algorithms in Javao become more vulnerable to household accidents, particularly falls. This scientific work focuses on the development of an intelligent monitoring and alert system using Arduino Nano 33 IoT and TinyML technology to differentiate between falls and ordinary bending among the elderly. The system aims to
作者: chisel    時間: 2025-3-27 03:17
An Overview on?the?Use of?Machine Learning Algorithms for?Identifying Anomalies in?Industrial Valvesomalies and failures is quite important nowadays, specially due to the increasing movement of industry 4.0 and Digital Twins technologies. In order to detect their anomalies or failures, data captured by sensors in these valves can be used for analysis and prediction tasks. More specifically, these
作者: 果仁    時間: 2025-3-27 06:27

作者: Trabeculoplasty    時間: 2025-3-27 10:32
Emotional Evaluation of?Open-Ended Responses with?Transformer Models Today’s powerful advances in transformer architecture, such as ChatGPT, make it possible to capture complex emotional patterns in language. The proposed transformer-based system identifies the emotional features of various texts. The research employs an innovative approach, using prompt engineering
作者: Foam-Cells    時間: 2025-3-27 15:59
Big Data Analytics in the Supply Chain: A Bibliometric Review of Scholarly Research from 2012 to 202iometric analysis of academic literature to improve our understanding of the evolution and current state of the field. The analysis covers 920 published journal and conference papers identified using the Web of Science database. A descriptive analysis of the corpus first allows us to identify the mo
作者: Catheter    時間: 2025-3-27 21:30

作者: 暗語    時間: 2025-3-27 22:40
Incidence Assessment of Diabetes by Delegation in the United Mexican States Applying the Multilayer nant health concern in the country, ranking as the leading cause of death in women and the second in men since 2000. It has also been identified as the primary culprit behind premature retirement, blindness, and kidney failure. Projections indicate that by 2025, nearly 11.7 million Mexicans could be
作者: 不發(fā)音    時間: 2025-3-28 04:30

作者: 小歌劇    時間: 2025-3-28 08:12
Simulation of Autonomous Driving Systems for the City of Macas Using Matlab Driving Scenario Design plied to the city of Macas, Morona Santiago Province, Ecuador. The objective of this research is to develop scenario simulations to obtain information about the object detection of an automatic driving system for cars at the intersections of Av. 29 de mayo and Gavino Rivadeneira in the city of Macas
作者: 裝飾    時間: 2025-3-28 12:59

作者: 觀點(diǎn)    時間: 2025-3-28 16:10

作者: dysphagia    時間: 2025-3-28 21:43
Machine Learning for?Forensic Occupancy Detection in?IoT Environmentsrogeneity of the data directly affects the investigative process in scenarios involving IoT applications. Through the analysis of a comprehensive and heterogeneous dataset collected from IoT devices, this study analyzes the use of machine learning algorithms to detect specific patterns to estimate t
作者: 過濾    時間: 2025-3-29 03:00

作者: 多嘴多舌    時間: 2025-3-29 06:40

作者: 戲法    時間: 2025-3-29 07:18
Third-Party Data Leaks in?the?Websites of?Finnish Social and?Healthcare Districtson the websites of Finnish social and healthcare districts and determine to what extent, if any, they leak their users’ personal data to third parties through the use of the collection and tracking of user data and actions with the web analytics tools. Our findings show that 82.6% of the studied web
作者: 落葉劑    時間: 2025-3-29 14:48

作者: Accomplish    時間: 2025-3-29 16:19

作者: Endometrium    時間: 2025-3-29 20:24
Conference proceedings 202426 and 28 of March 2024, at Lodz University of Technology, Lodz, Poland...WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies resear
作者: LINE    時間: 2025-3-30 02:06

作者: 冷峻    時間: 2025-3-30 08:01

作者: consolidate    時間: 2025-3-30 08:42

作者: LIMIT    時間: 2025-3-30 13:10

作者: fibroblast    時間: 2025-3-30 16:46
Machine Learning under Malware Attackhods and tools, highlighting the potential of transformer models in this domain. The method can be implemented in various areas, such as emotional research or mental health monitoring, creating a much richer and complete user profile.
作者: chronology    時間: 2025-3-30 21:57
Framework for?Real-Time Predictive Maintenance Supported by?Big Data Technologiesstem tailored for the request. By leveraging advanced data analysis methods, we reveal hidden patterns and insights valuable for researchers across various disciplines. The experiments were performed with the NASA turbofan jet engine dataset, which includes run-to-failure simulated data from turbo fan jet engines.
作者: COUCH    時間: 2025-3-31 03:41

作者: creatine-kinase    時間: 2025-3-31 06:03

作者: 打火石    時間: 2025-3-31 09:53
Xiaochun Wang,Xiali Wang,Don Mitchell Wilkesof ransomware. As a conclusion, we propose a construction model for enhancing cyber situation awareness using honeypots during various stages of a ransomware attack. Additionally, the analysed results are explained with identified future research topics.
作者: 斗志    時間: 2025-3-31 13:30
Two-machine and three-machine problems,l investigations based on data collected from IoT environments. The experimental evaluation not only showcases the potential enhancement of Digital Forensics through the utilization of IoT data but also serves to emphasize the effectiveness of machine learning-based approaches in these environments.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
乐安县| 丹东市| 郯城县| 九龙坡区| 甘谷县| 井研县| 卓资县| 万盛区| 邢台县| 桐城市| 苍山县| 资溪县| 宁德市| 汪清县| 沛县| 临漳县| 南陵县| 固阳县| 荥经县| 昭平县| 安陆市| 苏尼特右旗| 二手房| 简阳市| 宝清县| 北辰区| 祥云县| 淅川县| 郓城县| 黔南| 微山县| 定州市| 喜德县| 东乌| 莱州市| 剑河县| 唐海县| 河津市| 和硕县| 门源| 闸北区|