標題: Titlebook: Information and Software Technologies; 28th International C Audrius Lopata,Daina Gudonien?,Rita Butkien? Conference proceedings 2022 The Ed [打印本頁] 作者: Baleful 時間: 2025-3-21 16:39
書目名稱Information and Software Technologies影響因子(影響力)
書目名稱Information and Software Technologies影響因子(影響力)學科排名
書目名稱Information and Software Technologies網絡公開度
書目名稱Information and Software Technologies網絡公開度學科排名
書目名稱Information and Software Technologies被引頻次
書目名稱Information and Software Technologies被引頻次學科排名
書目名稱Information and Software Technologies年度引用
書目名稱Information and Software Technologies年度引用學科排名
書目名稱Information and Software Technologies讀者反饋
書目名稱Information and Software Technologies讀者反饋學科排名
作者: 領先 時間: 2025-3-21 22:16
Dmytro O. Terletskyi,Sergey V. Yershovare moving into the profession, and many are looking for a g.DBA Survivor. is a book to help new database administrators understand more about the world of database administration. More and more people are moving into the DBA profession, and many are looking for a getting-started guide. Blogs are wr作者: 星球的光亮度 時間: 2025-3-22 02:00 作者: flaunt 時間: 2025-3-22 07:07 作者: Impugn 時間: 2025-3-22 11:23
Karolis Ryselisdliche ist seit Jahren im Einsatz und wurde positiv evaluier.Die Arbeitsgruppe ?Dialektisch Behaviorale Therapie für Adoleszente (DBT-A)“ am Universit?tsklinikum Freiburg besch?ftigt sich seit mehr als 5 Jahren mit der Implementierung und Weiterentwicklung der DBT-A im ambulanten und station?ren Set作者: 使入迷 時間: 2025-3-22 15:30
Mantas Lukauskas,Vaida Pilinkien?,Jurgita Bruneckien?,Alina Stund?ien?,Andrius Grybauskasdliche ist seit Jahren im Einsatz und wurde positiv evaluier.Die Arbeitsgruppe ?Dialektisch Behaviorale Therapie für Adoleszente (DBT-A)“ am Universit?tsklinikum Freiburg besch?ftigt sich seit mehr als 5 Jahren mit der Implementierung und Weiterentwicklung der DBT-A im ambulanten und station?ren Set作者: 含糊其辭 時間: 2025-3-22 18:48
mit der Implementierung und Weiterentwicklung der DBT-A im ambulanten und station?ren Setting im deutschsprachigen Raum..Die .Dialektisch-Behaviorale Therapie. (DBT) wurde von der amerikanischen Psychologieprofessorin und Klinikleiterin Marsha M. Linehan entwickelt. Die DBT basiert auf einem neurob作者: 不容置疑 時間: 2025-3-23 00:39
Justas Kardoka,Agne Paulauskaite-Taraseviciene,Darius Pupeikis mit der Implementierung und Weiterentwicklung der DBT-A im ambulanten und station?ren Setting im deutschsprachigen Raum..Die .Dialektisch-Behaviorale Therapie. (DBT) wurde von der amerikanischen Psychologieprofessorin und Klinikleiterin Marsha M. Linehan entwickelt. Die DBT basiert auf einem neurob作者: 富饒 時間: 2025-3-23 01:58 作者: Atmosphere 時間: 2025-3-23 06:39
Rimsha Zahid,Muhammad Waseem Anwar,Farooque Azam,Anam Amjad,Danish Mukhtar problem. Now tables are adequate, this is reduced to the choice of lines to measure, and the method of measurement chosen is an important decision. The s.p.d. method calls for the selection of lines of moderate or low intensity, and avoids the lines of high ‘sensitivity’ which are used for trace an作者: 狂亂 時間: 2025-3-23 10:20 作者: Infect 時間: 2025-3-23 15:44 作者: hermetic 時間: 2025-3-23 21:36
Deep Learning-Based Malware Detection Using PE Headersious code in software environments. It becomes difficult to identify viruses in the infected data sent in this way during analysis and detection phase of malware. For this reason, a significant amount of consideration has been devoted to research and development of methodologies and techniques that 作者: Leaven 時間: 2025-3-24 00:59
Survey of Cloud Traffic Anomaly Detection Algorithmsd resources in a negative way. Anomaly detection tools are essential for identifying and forecasting these network anomalies. In recent years machine learning methods are gaining popularity in implementations of anomaly detection tools. Given the variety of network anomaly types and the availability作者: 靦腆 時間: 2025-3-24 06:11 作者: 萬靈丹 時間: 2025-3-24 06:37
Decomposition of?Fuzzy Homogeneous Classes of?Objects a task, a knowledge-based system should be able to decompose complex or composite knowledge structures and extract new knowledge items, which were hidden or non-obvious before. Existed approaches to decomposition within object-oriented paradigm provide different variants of partitioning or fragment作者: 寄生蟲 時間: 2025-3-24 14:22
Deep Learning in?Audio Classificationt for us when we don’t want to get out of bed before sleep. In all of these audio-based applications and research, it is AI and ML that makes the computer or the smart phone understand us via our voice [.]. As an important part of artificial intelligence (AI), especially machine learning (ML), which作者: 洞察力 時間: 2025-3-24 15:31
Research of Cryptocurrencies Function of Instant Payments in the Tourism Sector: Risks, Options, andhas been done on various cryptocurrencies and technologies related to them, their transaction processing speed, alternatives on how to optimize it, and what impact it has on cryptocurrency payments adoption to the tourism sector. It was noticed that various places of services in the tourism sector c作者: 慷慨不好 時間: 2025-3-24 22:35
Random Forest Classifier for Correcting Point Cloud Segmentation Based on Metrics of Recursive 2-Mea networks are used, however, they require lots of annotated data to learn from. Annotating data for segmentation is a very tedious process since part of the image has to be marked as foreground. This involves much higher amount of manual work by a human than classification where only a correct label作者: 熱烈的歡迎 時間: 2025-3-25 02:38 作者: 合并 時間: 2025-3-25 06:08
Artificial Intelligence Solutions Towards to BIM6D: Sustainability and Energy Efficiencynergy and light efficiency, which in turn leads to a more sustainable building utilization. Predictions of a building‘s energy consumption can have added value in different aspects and for different building actors, be they engineers, architects or the building users themselves. The objective for th作者: MAOIS 時間: 2025-3-25 11:27 作者: chronology 時間: 2025-3-25 12:54
Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocolies. From safety-critical systems to security devices and industrial appliances, every appliance makes use of IoTs. Whereas security issues such as SQL injections, Denial of Service/Distributed Denial of Service (DOS/DDOS) attacks, the forged transmission of messages, or man in the middle (MITM) are作者: 分離 時間: 2025-3-25 18:23 作者: candle 時間: 2025-3-25 23:02
IoT Applications Powered by Piezoelectric Vibration Energy Harvesting Devicensing and computing has boosted the efficiency and thereby the power consumption of IoT devices have drastically dropped. With this change happening for the first time in history, it is actually feasible to tap into this appreciable energy available in our surroundings to power such electronic devic作者: Coronary-Spasm 時間: 2025-3-26 01:15
Holistic Approach for Representation of Interaction Scenarios in Semantically Integrated Conceptual pes between the static and dynamic aspects. Integrity of dimensions is crucial for successful reasoning and solving problems that occur in conceptual modelling. Typically, conceptual modelling methods project various aspects of information systems using different graphical representations. Therefore作者: fender 時間: 2025-3-26 04:27 作者: Introduction 時間: 2025-3-26 10:08 作者: FUSE 時間: 2025-3-26 16:38 作者: ANTH 時間: 2025-3-26 19:33 作者: 惰性氣體 時間: 2025-3-26 21:31
Information and Software Technologies978-3-031-16302-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Genetics 時間: 2025-3-27 02:28 作者: fetter 時間: 2025-3-27 08:32 作者: 冷淡一切 時間: 2025-3-27 10:24 作者: 虛假 時間: 2025-3-27 16:54
Real-Time Anomaly Detection for?Distributed Systems Logs Using Apache Kafka and?H2O.aial-time. Experiments with proprietary logs from an enterprise Kafka cluster reveal that pre-processing with an autoencoder prior to applying the isolation forest method can significantly improve the detection performance.作者: 討好女人 時間: 2025-3-27 19:07 作者: 連累 時間: 2025-3-28 00:21
The Only?Link You’ll Ever Need: How?Social Media Reference Landing Pages Speed Up?Profile Matchingis finding and merging different user profiles, primarily based on hints, similar user names, or links. In this paper, we show how Reference Landing Pages make it easier to create comprehensive Digital Twins, which we can use to compute and make tangible the risk of thoughtless sharing of information to users.作者: scoliosis 時間: 2025-3-28 04:26
Financial Process Mining Characteristics Development Fund according to the 2014–2020 Operational Programme for the European Union Funds’ Investments under measure No. 01.2.1-LVPA-T-848 “Smart FDI”. Project no.: 01.2.1-LVPA-T-848–02-0004; Period of project implementation: 2020–06-01–2022–05-31.作者: NADIR 時間: 2025-3-28 07:29
1865-0929 software engineering, information technology applications, smart e-learning technologies and applications, language technologies..978-3-031-16301-2978-3-031-16302-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 鉗子 時間: 2025-3-28 14:12 作者: 暴露他抗議 時間: 2025-3-28 16:24 作者: obsolete 時間: 2025-3-28 20:42
Conference proceedings 2022iscuss such topics as ?business intelligence for information and software systems, intelligent methods for data analysis and computer aided software engineering, information technology applications, smart e-learning technologies and applications, language technologies..作者: Contort 時間: 2025-3-29 01:36 作者: Infelicity 時間: 2025-3-29 03:38 作者: 全等 時間: 2025-3-29 10:36 作者: 描述 時間: 2025-3-29 13:13 作者: Microaneurysm 時間: 2025-3-29 16:42
Sergej Denisov,Frederik S. B?umerhese reactions are briefly discussed in Section 1.3 and in greater depth for certain of the elements separately. The rate of evaporation of the element being analysed depends on (i) whether it evaporates as an element or a compound, (ii) on the temperature difference between its boiling point and th作者: seroma 時間: 2025-3-29 20:49 作者: 完成 時間: 2025-3-30 02:07 作者: Glucose 時間: 2025-3-30 05:53
Survey of Cloud Traffic Anomaly Detection Algorithms application, discovery of unprecedented anomalies, dataset’s influence on anomaly prediction and problem of vanishing or exploding gradient) are discerned and discussed in detail, providing their implications on the evaluated methods. Subsequently, the criteria are used to review the features of th作者: ectropion 時間: 2025-3-30 08:44
Decomposition of?Fuzzy Homogeneous Classes of?Objectsy object-oriented dynamic networks. In addition, we proposed the algorithm for the decomposition of fuzzy homogeneous classes of objects, which implements the idea of universal decomposition exploiter of fuzzy classes of objects, and constructs semantically correct subclasses of a fuzzy homogeneous 作者: 使堅硬 時間: 2025-3-30 16:24 作者: 寬宏大量 時間: 2025-3-30 17:24
Random Forest Classifier for Correcting Point Cloud Segmentation Based on Metrics of Recursive 2-Meacut. The approach has been trained on two real life datasets that include humans in different positions. Observed results show that accuracy is improved in the most complex scenes at a performance penalty. However, this is a good trade-off in case the original algorithm is unusable due to very low a作者: 對手 時間: 2025-3-30 21:37
Automated System and Machine Learning Application in Economic Activity Monitoring and Nowcasting to the different economic structures and the different availability of data in different countries, these systems are not universal and can only be adapted to specific countries. The developed automated system uses working intelligence methods to predict the future values of indicators, perform clu作者: Bravura 時間: 2025-3-31 01:36
Artificial Intelligence Solutions Towards to BIM6D: Sustainability and Energy Efficiency Support vector regression (SVR) with .. However, Extra Trees seems to be the best in terms of MAPE (38.65%). Although prediction time is not the most critical parameter, it should be noted, that Extra Trees, SVR and auto-regressive models were found to be the most time-consuming (from 2 to 4?min) t作者: decode 時間: 2025-3-31 06:00
Enhancing End-to-End Communication Security in IoT Devices Through Application Layer Protocol making them more vulnerable to attack this research paper focuses on the communication security issues in IoT systems. We have proposed an End-to-End Encryption using AES in IoT (EAES-IoT). Validation of the proposed algorithm has been done in a case study of the Smart Voice Pathology Monitoring Sy作者: MEN 時間: 2025-3-31 12:40
IoT Applications Powered by Piezoelectric Vibration Energy Harvesting Devicehe designed energy harvester successfully generates an average power of . with a resonant frequency of 43?Hz, generating at least 15?V rms voltage and 495?μW power for acceleration 1?g. The commercial piezo sensors generate power of only .. This work reveals the challenges and limitations involved i作者: Hyperopia 時間: 2025-3-31 15:12
Holistic Approach for Representation of Interaction Scenarios in Semantically Integrated Conceptual for maintaining holistic representations of different aspects. Holistic modelling approach enables reasoning about system architecture across organizational and technical system boundaries. On a simple hotel reservation system scenario, it is demonstrated how different actions can be decomposed int作者: RUPT 時間: 2025-3-31 19:47
A Model-Driven Framework for Design and Analysis of Vehicle Suspension Systemsension systems with simplicity. Moreover, Object Constraint Language (OCL) is utilized to perform early system analysis in modeling phase. Furthermore, the target MATLAB-Simulink models are generated from source models, using model-to-text transformations, to perform advanced system analysis. The ap