標(biāo)題: Titlebook: Networked Digital Technologies, Part I; Second International Filip Zavoral,Jakub Yaghob,Eyas El-Qawasmeh Conference proceedings 2010 Spring [打印本頁] 作者: antibody 時間: 2025-3-21 17:26
書目名稱Networked Digital Technologies, Part I影響因子(影響力)
書目名稱Networked Digital Technologies, Part I影響因子(影響力)學(xué)科排名
書目名稱Networked Digital Technologies, Part I網(wǎng)絡(luò)公開度
書目名稱Networked Digital Technologies, Part I網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Networked Digital Technologies, Part I被引頻次
書目名稱Networked Digital Technologies, Part I被引頻次學(xué)科排名
書目名稱Networked Digital Technologies, Part I年度引用
書目名稱Networked Digital Technologies, Part I年度引用學(xué)科排名
書目名稱Networked Digital Technologies, Part I讀者反饋
書目名稱Networked Digital Technologies, Part I讀者反饋學(xué)科排名
作者: Saline 時間: 2025-3-21 23:12
Conference proceedings 2010minimum of two reviewers. Finally, we believe that the proceedings document the best research in the studied areas. We express our thanks to the Charles University in Prague, Springer, the authors and the organizers of the conference.作者: 自由職業(yè)者 時間: 2025-3-22 03:50 作者: Coronation 時間: 2025-3-22 05:50
Fatih Ba??ift?i,Celal Karacaficantly decreased numbers of Thy-1.DEC compared with heterozygote controls from the age of four months. Rhino mice possess significantly increased numbers of Thy-1.DEC at all ages tested. Thus these studies define autosomal recessive mutations in mice that are accompanied by striking changes in the作者: 錯 時間: 2025-3-22 11:45 作者: 全部逛商店 時間: 2025-3-22 16:51
1865-0929 ocument the best research in the studied areas. We express our thanks to the Charles University in Prague, Springer, the authors and the organizers of the conference.978-3-642-14291-8978-3-642-14292-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 懸掛 時間: 2025-3-22 20:29
Wan Maseri Binti Wan Mohd,Abdullah Embong,Jasni Mohd Zain作者: concise 時間: 2025-3-23 01:00 作者: conifer 時間: 2025-3-23 03:01 作者: 無所不知 時間: 2025-3-23 07:04
Conference proceedings 2010 Second International Conference on ‘Networked Digital Technologies’ (NDT 2010). The NDT 2010 conference explored new advances in digital and Web technology applications. It brought together researchers from various areas of computer and information sciences who addressed both theoretical and applie作者: 過份艷麗 時間: 2025-3-23 10:55
An Efficient Indexing and Compressing Scheme for XML Query Processing Clustering Indexing Method). The experimental results show that NCIM can compress XML documents with high compression rate and low index construction time. It also supports complex queries efficiently.作者: BAN 時間: 2025-3-23 16:48
A Framework for In-House Prediction Marketsactors for determining the participant’s influence on the market over the long term. The goal of this design approach is to improve the accuracy and decision-support viability of in-house prediction markets.作者: 可用 時間: 2025-3-23 18:24 作者: Euthyroid 時間: 2025-3-24 01:01
Distributed Data-Mining in the LISp-Miner System Using Techila Gridy tasks to automate the whole KDD process. Need is therefore to speed-up maximally solving of every single task. This article describes newly implemented algorithm to divide the whole task into sub-tasks solved in parallel on grid nodes. There are presented the first results and further possible improvements.作者: palette 時間: 2025-3-24 03:43
Classifier Hypothesis Generation Using Visual Analysis Methods used to explore the document sets and to inspect the results of machine learning methods, allowing the user to assess the classifier performance and adapt the classifier by gradually refining the training set.作者: Estrogen 時間: 2025-3-24 08:04
Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data Managerfor the possible optimization of the query processing. We discuss the potential inadequacies of the current query model and put forward the use of punctuations along with sliding windows to improve the memory utilization and query processing.作者: 散步 時間: 2025-3-24 14:02
Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detectio mainly performed on or near the pixels of road region so as to facilitate and accelerate foreground detection. In addition, the regions outside road region most of the time do not need to be transmitted in visual communication. Experimental results represent the accuracy and usefulness of our proposed method.作者: 不吉祥的女人 時間: 2025-3-24 16:09 作者: Diluge 時間: 2025-3-24 22:39
1865-0929 les University in Prague, Czech Republic, we welcome you to the proceedings of the Second International Conference on ‘Networked Digital Technologies’ (NDT 2010). The NDT 2010 conference explored new advances in digital and Web technology applications. It brought together researchers from various ar作者: 擁擠前 時間: 2025-3-25 00:23
Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membeour numbers of input features that are extracted in the second step. In this paper, twenty-four numbers of input features are selected for generating the fuzzy rules to classify motor imagery. NEWFM is tested on the Graz BCI datasets that were used in the BCI Competitions of 2003. The accuracy of NEWFM is 83.51%.作者: 畢業(yè)典禮 時間: 2025-3-25 06:51 作者: 品牌 時間: 2025-3-25 08:44 作者: progestogen 時間: 2025-3-25 14:43
A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique enhanced through the dashboard concept where it provides significant patterns of knowledge on real-world and theoretical modeling which could be called wisdom. The framework consists of the dashboard model, system architecture and system prototype for higher education environment is presented in this paper.作者: 摸索 時間: 2025-3-25 18:35
Process Mining Approach to Promote Business Intelligence in Iranian Detectives’ Policecess mining techniques to enable Iranian Detectives‘ Police for discovering grounds of crime. This application is an approach that provides new view in police investigation. This paper explains process mining how can assist the monitoring enterprise systems.作者: 和平主義者 時間: 2025-3-25 20:03
Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membeions (NEWFM) and twenty-four numbers of input features that are extracted by wavelet-based features. This paper consists of three steps to classify motor imagery. In the first step, wavelet transform is performed to filter noises from signals. In the second step, twenty-four numbers of input feature作者: 粘 時間: 2025-3-26 02:28 作者: 課程 時間: 2025-3-26 05:47 作者: Instantaneous 時間: 2025-3-26 09:21
Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language. Proposed by mathematician Alan Turing, the question later becomes the pinnacle reference for researchers in artificial intelligence discipline. Turing later also introduces “The Imitation Game” that now known as “Turing Test” where the idea of the test is to examine whether machine can fool a judg作者: 革新 時間: 2025-3-26 12:40
Handwritten Digits Recognition Based on Swarm Optimization Methodsseful for a wide range of applications such as functional optimization. The proposed work places specific swarm based optimization methods that are the particle swarm optimizer and variations of the bees’ colony optimization in handwritten Arabic numerals recognition so that to improve the generaliz作者: Optimum 時間: 2025-3-26 18:01
A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Techniquehigher education institutions. Two aspects are emphasized, knowledge visualization and human-machine interaction. The knowledge visualization helps users to analyze the comprehensive characteristics of the students, lecturers and subjects after the clustering process and the interaction enable domai作者: 牲畜欄 時間: 2025-3-27 00:46 作者: 你不公正 時間: 2025-3-27 04:54 作者: Incompetent 時間: 2025-3-27 08:08
Compression of Layered Documentsrformance on these documents could be improved when we separate images from text and we apply different compression algorithms on these different types of data. In this paper we study layered image compression via a new software tool.作者: 阻止 時間: 2025-3-27 11:52
Classifier Hypothesis Generation Using Visual Analysis Methodson of adequate training examples is essential for classification performance, but it may prove to be a challenging task in large document repositories. We propose a classifier hypothesis generation method relying on automated analysis and information visualisation. In our approach visualisations are作者: 小官 時間: 2025-3-27 14:34 作者: patella 時間: 2025-3-27 20:20 作者: dissent 時間: 2025-3-27 23:19
Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detectioy learning on a training set of a scene over a period of time, we get the trajectory of moving object, then use SRG algorithm in which the trajectory is used as seed to extract road region. As a result, instead of detecting foreground objects in a conventional pixel by pixel manner, detection can be作者: 公豬 時間: 2025-3-28 04:38 作者: 無彈性 時間: 2025-3-28 08:26 作者: LUDE 時間: 2025-3-28 12:14 作者: RUPT 時間: 2025-3-28 14:55
The Effect of Attentiveness on Information Securitynformation security in both private and government organizations in Saudi Arabia. The aim of the initial experiment was to sense the existence of attentiveness in relation to information security; the results were encouraging enough to go for a larger scale experiment with additional human factors s作者: 遭受 時間: 2025-3-28 21:41 作者: 華而不實 時間: 2025-3-29 00:06 作者: genesis 時間: 2025-3-29 03:53
Sang-Hong Lee,Joon S. Lim,Dong-Kun Shinns was investigated in old mice. Langerhans cell (LC) and Thy-1. dendritic epidermal cell (Thy-1.DEC) density was found to decrease with age. This decrease correlated with an impairment in epidermal cell function as assessed . by the skin-lymphocyte reaction assay and by measuring the ability of epi作者: agonist 時間: 2025-3-29 08:41
978-3-642-14291-8Springer-Verlag Berlin Heidelberg 2010作者: 產(chǎn)生 時間: 2025-3-29 12:06
Networked Digital Technologies, Part I978-3-642-14292-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Aura231 時間: 2025-3-29 17:24
Filip Zavoral,Jakub Yaghob,Eyas El-QawasmehUp-to-date results.Fast track conference.Proceedings state-of-art report作者: 責(zé)怪 時間: 2025-3-29 23:38 作者: chronicle 時間: 2025-3-30 00:39
Some Results in Bipolar-Valued Fuzzy ,/,-AlgebrasIn this note, by using the concept of Bipolar-valued fuzzy set, the notion of bipolar-valued fuzzy ./.-algebra is introduced. Moreover, the notions of (strong) negative .-cut, (strong) positive .-cut are introduced and the relationship between these notions and crisp subalgebras are studied.作者: LOPE 時間: 2025-3-30 04:31 作者: 職業(yè)拳擊手 時間: 2025-3-30 08:46
Compression of Layered Documentsrformance on these documents could be improved when we separate images from text and we apply different compression algorithms on these different types of data. In this paper we study layered image compression via a new software tool.作者: extract 時間: 2025-3-30 12:35
Copyright Protection of Relational Database Systemsght protection of databases. In this paper, we propose an efficient database watermarking algorithm based on inserting a binary image watermark in Arabic character attributes. Experimental results demonstrate the robustness of the proposed algorithm against common database attacks.作者: 啤酒 時間: 2025-3-30 16:40 作者: amenity 時間: 2025-3-31 00:34 作者: 鑒賞家 時間: 2025-3-31 03:20
https://doi.org/10.1007/978-3-642-04506-6 possible dimension in which they can occur: the fold and flip bifurcations for scalar systems and the Neimark-Sacker bifurcation for planar systems. In Chapter 5 it will be shown how to apply these results to .-dimensional systems when . is larger than one or two, respectively.作者: aphasia 時間: 2025-3-31 08:08 作者: intricacy 時間: 2025-3-31 10:32
The Pitfalls of Proxy Mechanisms Outside of the Research Domainlook at various proxy related research, identify the pitfalls associated with proxy mechanisms outside of the research domain, discuss why the general proxy model does not work well in industry, and present a case study of a contemporary proxy.作者: 有幫助 時間: 2025-3-31 15:21 作者: 推延 時間: 2025-3-31 17:59 作者: 自由職業(yè)者 時間: 2025-3-31 22:00
Real-Time Flood Forecasting in the River Section with Ungaged Tributarieshe unknown parameters, and to let the adaptive algorithm operate around these values till the subsequent change in the type of hydrological situation sets in. The problem of the effective utilization of inaccurate and incomplete information on the behaviour of hydrological processes in ungaged inter作者: arrogant 時間: 2025-4-1 05:49
Ammar Abdul-Hamed Khader,Mainuddin Mainuddin,Mirza Tariq Begs and is ideally suited for undergraduate education.? Comprehensive multilingual bibliographies of carefully documented sources offer scholars many promising resources for f978-3-031-28565-3978-3-031-28563-9Series ISSN 2523-8760 Series E-ISSN 2523-8779 作者: assent 時間: 2025-4-1 08:17
Zusammenfassung,Abschlie?end werden einige zentrale Aspekte der vorstehenden Ausführungen in Thesenform zusammengestellt. Dabei werden die Tatbest?nde besonders hervorgehoben, durch die sich Dienstleistungen sowie deren Produktion von Sachgütern und deren Hervorbringung unterscheiden:作者: 窒息 時間: 2025-4-1 13:32 作者: 摻假 時間: 2025-4-1 16:12
nd student learning. Teacher knowledge cannot be separated from the subject matter being investigated, from how that subject matter can be represented for learners, from what we know about students’ thinking in specific domains, or from teacher beliefs (Fennema & Franke, 1992, S. 161).