標(biāo)題: Titlebook: International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020); Emerging Application Jemal H. Abawajy,Kim- [打印本頁] 作者: 休耕地 時(shí)間: 2025-3-21 18:07
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)影響因子(影響力)
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)影響因子(影響力)學(xué)科排名
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)網(wǎng)絡(luò)公開度
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)被引頻次
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)被引頻次學(xué)科排名
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)年度引用
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)年度引用學(xué)科排名
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)讀者反饋
書目名稱International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)讀者反饋學(xué)科排名
作者: 羅盤 時(shí)間: 2025-3-22 00:11
Conference proceedings 2021sight that describe advancement in the adoption of technique for resolving the broad range of challenges. Researchers, undergraduates, postgraduates, and industry experts will find the book as a valuable resource that bridges theory and practice. ..?.作者: 浮雕 時(shí)間: 2025-3-22 03:42
A Metaheuristic Based Virtual Machine Allocation Technique Using Whale Optimization Algorithm in Cl(IWOA) based VM allocation technique for efficient allocation of resources in Infrastructure as a service (IaaS) cloud computing. The experimental results confirm that the proposed algorithm outperforms with GA, NSGAIII, and PSO in terms of makespan and cost minimization.作者: 縱火 時(shí)間: 2025-3-22 08:35 作者: 高貴領(lǐng)導(dǎo) 時(shí)間: 2025-3-22 10:25 作者: GLIDE 時(shí)間: 2025-3-22 13:28
2367-3370 ference on Emerging Applications and Technologies for Indust.This book addresses the adoption of intelligent algorithms for resolving challenges in different aspects of the society such as sport, cyber-security, COVID-19 pandemic, advertising, driving, smart environment—sensors, blockchain, cloud co作者: 舊石器 時(shí)間: 2025-3-22 20:13 作者: Euphonious 時(shí)間: 2025-3-22 21:51
A Holistic Approach for Enhancing Critical Infrastructure Protection: Research Agenda, background of this study. Then, based on this theoretical foundation, we propose a holistic approach which takes into account both organisational and technical measures. In addition, we provide a synopsis of our research outcomes so far and our ongoing work towards enhancing critical infrastructure protection.作者: Exuberance 時(shí)間: 2025-3-23 04:40 作者: corpuscle 時(shí)間: 2025-3-23 08:17
Iztok Fister Jr.systems and in animals, is an essential step in the progress of new pharmaceuticals heading toward the ultimate goal of clinical trials and, eventually, approval.In Drug Safety Evaluation: Methods and Protocols, expert researchers detail a compendium of analytical technologies with a focus on clarit作者: 裹住 時(shí)間: 2025-3-23 10:54 作者: 形容詞詞尾 時(shí)間: 2025-3-23 15:55
Nadim Rana,Shafie Abd Latiff,Shafi’i Muhammad Abdulhamidoratory practice.Contains methods and techiques easily transNon-clinical drug safety evaluation, the assessment of the safety profile of therapeutic agents through the conduct of laboratory studies in in vitro systems and in animals, is an essential step in the progress of new pharmaceuticals headin作者: 傷心 時(shí)間: 2025-3-23 20:00 作者: Asperity 時(shí)間: 2025-3-24 01:31 作者: 廚師 時(shí)間: 2025-3-24 04:04 作者: Acupressure 時(shí)間: 2025-3-24 08:53
Rizqi Prima Hariadhy,Edi Sutoyo,Oktariani Nurul Pratiwisystems and in animals, is an essential step in the progress of new pharmaceuticals heading toward the ultimate goal of clinical trials and, eventually, approval.In Drug Safety Evaluation: Methods and Protocols, expert researchers detail a compendium of analytical technologies with a focus on clarit作者: invade 時(shí)間: 2025-3-24 12:10 作者: Aprope 時(shí)間: 2025-3-24 18:19
Collins N. Udanor,Agozie H. Eneh,Stella-Maris I. Orimoratory practice.Contains methods and techiques easily transNon-clinical drug safety evaluation, the assessment of the safety profile of therapeutic agents through the conduct of laboratory studies in in vitro systems and in animals, is an essential step in the progress of new pharmaceuticals headin作者: 噴油井 時(shí)間: 2025-3-24 19:36 作者: 憲法沒有 時(shí)間: 2025-3-25 00:01 作者: 使害羞 時(shí)間: 2025-3-25 03:23
Olorunjube James Falana,Adesina Simon Sodiya,Saidat Adebukola Onashoga,Anas Teju Oyewolesystems and in animals, is an essential step in the progress of new pharmaceuticals heading toward the ultimate goal of clinical trials and, eventually, approval.In Drug Safety Evaluation: Methods and Protocols, expert researchers detail a compendium of analytical technologies with a focus on clarit作者: contradict 時(shí)間: 2025-3-25 10:26 作者: Infuriate 時(shí)間: 2025-3-25 11:46
Ibrahim Abdullahi Shehu,Musa Mohammed,Sulaiman Haruna Sulaiman,Abubakar Abdulkarim,Ahmad Bala Alhassre separate drugs packaged together. FDCs have been available commercially for many years but only relatively recently have nonclinical development guidelines been released by a number of regulatory authorities and the World Health Organization; as yet there are no ICH guidelines specific to combina作者: Bronchial-Tubes 時(shí)間: 2025-3-25 19:54
Haruna Abdu,Mohd Halim Mohd Noor,Rosni Abdullahdogenous . gene of treated rats by using flow cytometry to measure changes in cell surface markers of peripheral blood cells. Here we present a methodology for demonstrating that phenotypically mutant rat T-cells identified by flow cytometry contain mutations in the . gene, an important step for val作者: 手工藝品 時(shí)間: 2025-3-25 21:47
Livinus Obiora Nweke,Stephen D. Wolthusenardiogram and drug-induced elongation of the same QT segment. Indeed, reduced function of this potassium channel involved in the repolarization of the cardiac action potential can produce a type of life-threatening cardiac ventricular arrhythmias called . (TdP). Therefore, hERG inhibitory activity o作者: 文件夾 時(shí)間: 2025-3-26 00:50 作者: 永久 時(shí)間: 2025-3-26 04:19
Udochukwu C. Enwerem,Gloria A. Chukwudebed into seven parts, chapters detail specific aspects related to the experimental design of preclinical studies conducted to support the safety of pediatric and combination drugs, necropsy and histopathology evaluation, mass spectrometry imaging, genetic toxicology protocols including the .Pig-a. mut作者: 噴油井 時(shí)間: 2025-3-26 09:00
Haruna Chiroma,Ali Muhammad Usman,Fatsuma Jauro,Lubna A. Gabralla,Kayode S. Adewole,Emmanuel Gbenga e or other reason be particularly liable to drug injury. The inextricable relationships between the toxic profiles of drugs, the natural history of the diseases for which they are given, and the adverse drug effects that may develop in the course of such diseases are of considerable interest. It is 作者: 火光在搖曳 時(shí)間: 2025-3-26 14:15
,The Relevance of Nature-Inspired Metaheuristic Algorithms in Smart Sport?Training,very year, the Smart Sport Training domain is becoming more and more crowded by different intelligent solutions that help, support and encourage people in maintaining their healthy lifestyle, as well as their sporting activities. On the other hand, nature-inspired algorithms are powerful methods for作者: 假設(shè) 時(shí)間: 2025-3-26 18:58 作者: 剝削 時(shí)間: 2025-3-26 23:10
A Metaheuristic Based Virtual Machine Allocation Technique Using Whale Optimization Algorithm in Cl of resources are allocated and deallocated on the datacenters in a fraction of the time using the virtual machine (VM). Thus, VM scheduling in cloud computing always remains a significant concern by cloud vendors to address the resource allocation problem. The critical concentration in this regard 作者: 鬼魂 時(shí)間: 2025-3-27 03:51
Data Sampling-Based Feature Selection Framework for Software Defect Prediction,ls in software defect prediction (SDP). As a viable solution, data sampling and feature selection (FS) has been used to address the class imbalance and high dimensionality problem respectively. Most of the existing studies in SDP addressed these data quality problem individually which often affects 作者: Fallibility 時(shí)間: 2025-3-27 08:36 作者: CRUMB 時(shí)間: 2025-3-27 11:51
Investigative Study of Unigram and Bigram Features for Short Message Spam Detection,ations. Studies have shown that spammers have used mobile short message service (SMS) and microblogging as a channel of communication for disseminating unsolicited spam messages containing novel words and abbreviation. Over the years, a growing number of research works have been conducted in the are作者: 不法行為 時(shí)間: 2025-3-27 15:52
Application of K-Nearest Neighbor Algorithm for Prediction of Television Advertisement Rating,n is the rating of the programs on the television. This parameter is also the consideration of advertisers in choosing a television station. For companies engaged in the advertising industry generally will provide offers to prospective customers using historical data related to ratings that have bee作者: Parameter 時(shí)間: 2025-3-27 20:39 作者: Systemic 時(shí)間: 2025-3-27 23:20
An Evaluation of the Frameworks for Predicting COVID-19 in Nigeria Using Time Series Data Analyticss. The pandemic has resulted in the loss of thousands of lives, the collapse of businesses, indefinite closure of schools, and other activities resulting to the need for a ‘new normal’. Virologists, epidemiologists, and all other scientists are working round the clock to bring a stop to this ravagin作者: Hirsutism 時(shí)間: 2025-3-28 05:51 作者: 適宜 時(shí)間: 2025-3-28 08:56
A Logistic Predictive Model for Determining the Prevalent Mode of Financial Cybercrime in Sub-Saharnd sensitive information from a target. Any crime perpetrated using a computer and/or the Internet is considered as cybercrime, of which cyber fraud is an aspect of. Cybercrime cost has been on the increase, estimated to cost the world over 6 trillion US Dollars by 2021. Its impact on all aspects of作者: aquatic 時(shí)間: 2025-3-28 13:37
PEDAM: Priority Execution Based Approach for Detecting Android Malware,determined to take advantage of over 2.5 billion monthly active users of Android devices. Despite Google’s various protection measures, android malware continues to grow in complexity and scope. In recent time, many research efforts have focused on detecting malware on the Android operating system u作者: FOIL 時(shí)間: 2025-3-28 16:27
Mathematical Verification of Hybrid Model for Prime Decision-Making in Driving,udy problem. The hybrid model is the integration of Automaticity Recognition Prime Decision (RPD) training model and Situation Awareness (SA) model. Verification is a mechanism used to certify that the hybrid model simulation results, assumptions and specifications are correct and to also confirms t作者: Thrombolysis 時(shí)間: 2025-3-28 20:58 作者: omnibus 時(shí)間: 2025-3-28 23:38 作者: patella 時(shí)間: 2025-3-29 04:34 作者: 牢騷 時(shí)間: 2025-3-29 10:21
Cursory View of IoT-Forensic Readiness Framework Based on ISO/IEC 27043 Recommendations,opportunities. However, the threat-related landscape and security ramifications that comes with this adoption has become a subject of focus. As a result, there is a need to significantly explore IoT readiness across organisations. The authors in this paper propose an IoT Forensic Readiness (IoT-FR) 作者: jettison 時(shí)間: 2025-3-29 12:40
Regulation and Standardization of Blockchain Technology for Improved Benefit Realization,rst Blockchain implementation met with varied resistance, recent non-financial applications of Blockchain technology will play critical roles in the upcoming fourth Industrial Revolution (Industry 4.0) due to its characteristic features of trust, immutability, transparency and decentralization. In t作者: Ebct207 時(shí)間: 2025-3-29 16:18 作者: 連鎖,連串 時(shí)間: 2025-3-29 21:23 作者: 離開可分裂 時(shí)間: 2025-3-30 00:55 作者: 非秘密 時(shí)間: 2025-3-30 07:09
Nadim Rana,Shafie Abd Latiff,Shafi’i Muhammad Abdulhamids, and tips on troubleshooting and avoiding known pitfalls.Comprehensive and authoritative, Drug Safety Evaluation: Methods and Protocols serves as an ideal guide to this field, helpful to pharmaceutical scient978-1-4939-5669-2978-1-60761-849-2Series ISSN 1064-3745 Series E-ISSN 1940-6029 作者: inventory 時(shí)間: 2025-3-30 08:35
Collins N. Udanor,Agozie H. Eneh,Stella-Maris I. Orims, and tips on troubleshooting and avoiding known pitfalls.Comprehensive and authoritative, Drug Safety Evaluation: Methods and Protocols serves as an ideal guide to this field, helpful to pharmaceutical scient978-1-4939-5669-2978-1-60761-849-2Series ISSN 1064-3745 Series E-ISSN 1940-6029 作者: 我怕被刺穿 時(shí)間: 2025-3-30 13:27 作者: 杠桿支點(diǎn) 時(shí)間: 2025-3-30 16:42
Analysis of Variable Learning Rate Back Propagation with Cuckoo Search Algorithm for Data Classific rate BP algorithms are compared with traditional algorithms. Particularly, diabetes and cancer benchmark classification problems datasets are used. From the analyses results it show that proposed algorithm shows high efficiency and enhanced performance of the BP algorithm.作者: COMMA 時(shí)間: 2025-3-31 00:09
Data Sampling-Based Feature Selection Framework for Software Defect Prediction,classifiers on defects dataset from NASA repository. The experimental results showed that the proposed framework outperformed other experimental methods. The high accuracy (83.84%) and AUC (0.90) values of the proposed framework indicates its ability to differentiate between the defective and non-de作者: Mutter 時(shí)間: 2025-3-31 02:26 作者: 小卷發(fā) 時(shí)間: 2025-3-31 06:25
Application of K-Nearest Neighbor Algorithm for Prediction of Television Advertisement Rating,ed for the classification of television advertising ratings. The results of this study can provide one of the options for advertising companies to provide offers related to the prediction of television ratings to advertisers as one of the considerations in choosing a television station.作者: excursion 時(shí)間: 2025-3-31 12:19 作者: arsenal 時(shí)間: 2025-3-31 15:17
An Evaluation of the Frameworks for Predicting COVID-19 in Nigeria Using Time Series Data Analyticsks to evaluate the appropriateness and effectiveness of relevant models e.g. SIR (Susceptible, Infective, Recovered) model in predicting the spread of nCov-19 using live time-series data while making Nigeria a case study. Results from the prediction suggest that, like many other countries, Nigeria h作者: 一起平行 時(shí)間: 2025-3-31 21:18
Multi-objective Wrapper-Based Feature Selection Using Binary Cuckoo Optimisation Algorithm: A Compae use of non-dominated sorting genetic algorithms, along with binary cuckoo optimisation algorithm, BCOA (BCOA-NSGA3). The results show that the proposed methods exhibit promising results and can successfully develops a set of non-dominated solutions with a reduced error rate and less computational 作者: 切碎 時(shí)間: 2025-3-31 22:25 作者: 突變 時(shí)間: 2025-4-1 03:33
PEDAM: Priority Execution Based Approach for Detecting Android Malware,oritizing the android application that will execute based on permissions and intents. Any suspected samples not captured in the first phase are further analysed in the second phase, which does behavioural analysis using Support Vector Machine classifier to analyse permissions, intent filters and Act作者: 思想 時(shí)間: 2025-4-1 06:31
Mathematical Verification of Hybrid Model for Prime Decision-Making in Driving,rid model. It also, determines the stability points that explains the presence or possibility of getting the equilibrium state of the system. This equilibrium occurs when for all states no changes occur. The presence of reasonable equilibrium is a sign of accuracy of the hybrid model. The results ac作者: 發(fā)展 時(shí)間: 2025-4-1 13:16 作者: 使隔離 時(shí)間: 2025-4-1 17:23
An Efficient Multi-sensor Positions Human Activity Recognition: Elderly Peoples in Rural Areas in Fwly collected datasets to different machine learning classifiers. Sliding window technique with 50% overlapping was used to segment the sensor data collected from the elderly subjects. Relevant features were extracted, and selected using the wrapper method. From the results obtained, it has shown th作者: 他一致 時(shí)間: 2025-4-1 21:11 作者: 表皮 時(shí)間: 2025-4-1 23:43
Deep Learning Solutions for Protein: Recent Development and Future Directions,pective for future research direction for developing deep learning solutions for protein structure prediction are discussed in details. Specifically, the survey identified that the exploration of nature inspired algorithms in deep learning for protein structure remain untapped. In addition, hybrid/e