作者: 該得 時(shí)間: 2025-3-21 21:12
Xindong Wuganizations have made a leap to adopt related knowledge frameworks in e-commerce computing with the combination of business intelligence to remain in front of patterns and future demands. This is manifested by a significant number of organizations of all sizes, in all enterprises, all around the glo作者: Keratectomy 時(shí)間: 2025-3-22 00:34
Bogdan Gabrysganizations have made a leap to adopt related knowledge frameworks in e-commerce computing with the combination of business intelligence to remain in front of patterns and future demands. This is manifested by a significant number of organizations of all sizes, in all enterprises, all around the glo作者: 彩色的蠟筆 時(shí)間: 2025-3-22 05:12 作者: Dna262 時(shí)間: 2025-3-22 12:27
Hujun Yinlassification with respect to reducing the computational cost and increasing the classification accuracy. In this study, we implement a new multimodal feature learning method and object identification framework using High Performance Computing Cluster (HPCC Systems.). The framework first learns repr作者: 彎彎曲曲 時(shí)間: 2025-3-22 13:40
Yanbin Liu,Chunguang Zhou,Kangping Wang,Dan Li,Dongwei Guoave been collecting massive amounts of domain-specific information, which can contain useful information about problems such as national intelligence, cyber security, fraud detection, marketing, and medical informatics. Companies such as Google and Microsoft are analyzing large volumes of data for b作者: ATOPY 時(shí)間: 2025-3-22 18:35
Sara Rodríguez,Javier Bajolassification with respect to reducing the computational cost and increasing the classification accuracy. In this study, we implement a new multimodal feature learning method and object identification framework using High Performance Computing Cluster (HPCC Systems.). The framework first learns repr作者: Germinate 時(shí)間: 2025-3-23 01:09 作者: 附錄 時(shí)間: 2025-3-23 03:36
Juan A. Fraile,Dante I. Tapia,Miguel A. Sánchezequire a knowledge management system which offers opportunities to work on one task with different organizations on the same time. Cooperative work in the field of setup preparation for production systems is one challenge for an efficiency and infallibly work preparation. One example is the validati作者: 受傷 時(shí)間: 2025-3-23 06:23 作者: 熱心 時(shí)間: 2025-3-23 09:54 作者: 熱烈的歡迎 時(shí)間: 2025-3-23 15:09
Maria Cruz Gaya,J. Ignacio Giraldezgovernmental information assets.Synthesizes scenarios of an This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war.?.Big Data Technologies for Monitoring of Computer Security?.presents possible solutions to th作者: Invertebrate 時(shí)間: 2025-3-23 18:53
Branislav Bo?ansky,Cyril Bromgovernmental information assets.Synthesizes scenarios of an This timely book offers rare insight into the field of cybersecurity in Russia -- a significant player with regard to cyber-attacks and cyber war.?.Big Data Technologies for Monitoring of Computer Security?.presents possible solutions to th作者: cringe 時(shí)間: 2025-3-23 23:56 作者: granite 時(shí)間: 2025-3-24 02:34 作者: glacial 時(shí)間: 2025-3-24 07:44
Fangming Zhu,Sheng-Uei Guandies, insights, and recommendations for practitioners.DescriThis book presents and discusses the main strategic and organizational challenges posed by Big Data and analytics in a manner relevant to both practitioners and scholars. The first part of the book analyzes strategic issues relating to the 作者: FUSE 時(shí)間: 2025-3-24 12:25
Verónica Venturini,Javier Carbó,José M. Molinaast few years, many organizations have begun their adventure with big data. While many are only experimenting with new technologies and innovations to improve their competitive advantage, few are truly thinking ahead for long-term success and even fewer will truly succeed in gaining such competitive作者: Substance-Abuse 時(shí)間: 2025-3-24 16:49 作者: Anthology 時(shí)間: 2025-3-24 20:02 作者: 陳舊 時(shí)間: 2025-3-25 01:08
Anca Gog,Camelia Chira,D. Dumitrescuast few years, many organizations have begun their adventure with big data. While many are only experimenting with new technologies and innovations to improve their competitive advantage, few are truly thinking ahead for long-term success and even fewer will truly succeed in gaining such competitive作者: 不朽中國 時(shí)間: 2025-3-25 04:52
Data Mining: Algorithms and Problems machine learning, statistics, database systems, and pattern recognition, for the analysis of large volumes of possibly complex, highly-distributed and poorly-organized data. The prosperity of the data mining field may attribute to two essential reasons. Firstly, a huge amount of data is collected a作者: Fibrillation 時(shí)間: 2025-3-25 07:56
Do Smart Adaptive Systems Exist? Hybrid Intelligent Systems Perspective of business and industry has facilitated easy capture and storage of immense amounts of data. Examples of such data collection include medical history data in health care, financial data in banking, point of sale data in retail, plant monitoring data based on instant availability of various sensor 作者: 領(lǐng)帶 時(shí)間: 2025-3-25 13:56
Design of Experiments in Computational Intelligence: On the Use of Statistical Inferencefocus on the use of statistical inference for analyzing the results obtained in a design of experiment within the field of computational intelligence. We present some studies involving a set of techniques in different topics which can be used for doing a rigorous comparison among the algorithms stud作者: FATAL 時(shí)間: 2025-3-25 17:47
Nonlinear Principal Manifolds – Adaptive Hybrid Learning Approachesed and mapped to a 2-D cortex in a near-optimal information preserving manner. Data projection and visualization, inspired by this mechanism, are playing an increasingly important role in many computational applications such as cluster analysis, classification, data mining, knowledge management and 作者: 鴿子 時(shí)間: 2025-3-25 22:14 作者: occult 時(shí)間: 2025-3-26 04:05
Multi-agent System for Management and Monitoring of Routes Surveillanceagents which integrate reasoning and planning mechanisms. It has the ability to obtain automatic and real-time information about the context to schedule the security guards activities. The combination of technologies enables users to interact with the system in a simple, natural and intuitive way.作者: debunk 時(shí)間: 2025-3-26 07:49 作者: 左右連貫 時(shí)間: 2025-3-26 09:07
Hybrid Multi-Agent Architecture (HoCa) Applied to the Control and Supervision of Patients in Their Hs. HoCa architecture incorporates a management system of alerts based on SMS and MMS technologies, and an automated identification, localization, and movement control system based on Java Card and RFID technologies. HoCa is independent from the programming language and operating system in that it is作者: harbinger 時(shí)間: 2025-3-26 16:26 作者: Manifest 時(shí)間: 2025-3-26 19:37 作者: Galactogogue 時(shí)間: 2025-3-26 23:51 作者: 規(guī)范就好 時(shí)間: 2025-3-27 03:00 作者: 精密 時(shí)間: 2025-3-27 07:26 作者: 分散 時(shí)間: 2025-3-27 10:16 作者: 占線 時(shí)間: 2025-3-27 17:13 作者: Cabg318 時(shí)間: 2025-3-27 20:14
Learning User Profile with Genetic Algorithm in AmI Applicationsem was used to evaluate our algorithm with the goal of obtaining the user private information to determine what the user requests, in order to offer appropriate services. Additionally, a list of prioritized tasks is generated accordingly, in order to assist the user in making decisions.作者: 先兆 時(shí)間: 2025-3-27 23:23 作者: 投射 時(shí)間: 2025-3-28 05:30
Automatic Neural Net Design by Means of a Symbiotic Co-evolutionary Algorithmrks (ANN) is the architecture of the net. In this paper Symbiotic_RBF is proposed, a method to do automatically the process to design models for classification using symbiosis. For it, there are two populations who evolve together by means of coevolution. One of the populations is the method EvRBF, 作者: 錢財(cái) 時(shí)間: 2025-3-28 07:35 作者: 施魔法 時(shí)間: 2025-3-28 14:20 作者: 接合 時(shí)間: 2025-3-28 17:48 作者: 清洗 時(shí)間: 2025-3-28 19:43
Hybrid Artificial Intelligence Systems978-3-540-87656-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 撤退 時(shí)間: 2025-3-29 02:38
Multi-agent System for Management and Monitoring of Routes Surveillanceagents which integrate reasoning and planning mechanisms. It has the ability to obtain automatic and real-time information about the context to schedule the security guards activities. The combination of technologies enables users to interact with the system in a simple, natural and intuitive way.作者: 表臉 時(shí)間: 2025-3-29 05:13 作者: reserve 時(shí)間: 2025-3-29 07:39
JADE/LEAP Agents in an Aml Domainle phenomenon where the user mobility and the communicating smart devices are immersed nowadays. In this paper, we propose a multi-agent system architecture and its implementation for the provisioning of context-aware services in an ambient intelligence domain: an airport.作者: grovel 時(shí)間: 2025-3-29 14:55
Learning User Profile with Genetic Algorithm in AmI Applicationsem was used to evaluate our algorithm with the goal of obtaining the user private information to determine what the user requests, in order to offer appropriate services. Additionally, a list of prioritized tasks is generated accordingly, in order to assist the user in making decisions.作者: set598 時(shí)間: 2025-3-29 18:15 作者: 共同時(shí)代 時(shí)間: 2025-3-29 21:51
0302-9743 ally expanding realm of symbolic and sub-symbolic techniques aimed at the construction of highly robust and reliable problem-solving techniques. Hybrid intelligent systems have become incre- ingly popular given their capabilities to handle a broad spectrum of real-world c- plex problems which come w作者: 抵制 時(shí)間: 2025-3-30 03:35 作者: amenity 時(shí)間: 2025-3-30 07:24 作者: 關(guān)節(jié)炎 時(shí)間: 2025-3-30 10:01 作者: watertight, 時(shí)間: 2025-3-30 13:22 作者: 植物學(xué) 時(shí)間: 2025-3-30 18:50 作者: 恫嚇 時(shí)間: 2025-3-30 23:03
Unsupervised Genetic Algorithm Deployed for Intrusion Detectionof clustering techniques. The model is verified on KDD99 benchmark dataset, generating a solution competitive with the solutions of the state-of-the-art which demonstrates high possibilities of the proposed method.作者: 苦澀 時(shí)間: 2025-3-31 02:47
Hybrid Multi-population Collaborative Asynchronous Searchintegrated in the CAME model. Numerical results indicate a good performance of the proposed evolutionary asynchronous search model. Particularly, proposed CAME technique obtains excellent results for difficult highly multimodal optimization problems indicating a huge potential for dynamic and multicriteria optimization.作者: 小隔間 時(shí)間: 2025-3-31 05:30 作者: 旅行路線 時(shí)間: 2025-3-31 12:37
Design Patterns for Combining Social and Individual Intelligences on Modular-Based Agentsnce that makes agents understand and manage with other agents in the community. The design pattern facilitates the implementation of modular-based agents inside the multi-agent architecture and its use helps developers when incorporating new agents in the architecture. The multi-agent architecture is used to control a Pioneer 2DX mobile robot.作者: 碎片 時(shí)間: 2025-3-31 16:20 作者: Adulterate 時(shí)間: 2025-3-31 17:53 作者: Hormones 時(shí)間: 2025-3-31 23:24
Temporal-Bounded CBR for the Management of Commitments in RT-Agentsof the case-based reasoning methodology to carry out this analysis. A framework featuring a Commitment Manager that takes commitment decisions on the basis of previous experiences is presented in the paper.作者: 印第安人 時(shí)間: 2025-4-1 05:42 作者: fabricate 時(shí)間: 2025-4-1 06:49
f handwriting documents has difficulty because each row in the document is uneven and very tight between the rows. Those matters cause them overlap. When the line segmented wrongly, the entire character on the line will be not segmented as well. This problem can be eliminate using connectivity test.作者: 流浪 時(shí)間: 2025-4-1 12:51
Xindong Wus sales attrition after having developed its mobile application version and deploying the system online. The results indicate the usefulness of the system in managing materials, delivering quality services to the customers and at the same time helps businesses to increase competitiveness and busines