派博傳思國(guó)際中心

標(biāo)題: Titlebook: Networks and Systems in Cybernetics; Proceedings of 12th Radek Silhavy,Petr Silhavy Conference proceedings 2023 The Editor(s) (if applicab [打印本頁(yè)]

作者: 小費(fèi)    時(shí)間: 2025-3-21 19:22
書目名稱Networks and Systems in Cybernetics影響因子(影響力)




書目名稱Networks and Systems in Cybernetics影響因子(影響力)學(xué)科排名




書目名稱Networks and Systems in Cybernetics網(wǎng)絡(luò)公開度




書目名稱Networks and Systems in Cybernetics網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Networks and Systems in Cybernetics被引頻次




書目名稱Networks and Systems in Cybernetics被引頻次學(xué)科排名




書目名稱Networks and Systems in Cybernetics年度引用




書目名稱Networks and Systems in Cybernetics年度引用學(xué)科排名




書目名稱Networks and Systems in Cybernetics讀者反饋




書目名稱Networks and Systems in Cybernetics讀者反饋學(xué)科排名





作者: 去世    時(shí)間: 2025-3-21 20:35

作者: 六個(gè)才偏離    時(shí)間: 2025-3-22 01:25

作者: 怪物    時(shí)間: 2025-3-22 06:37
Radek Silhavy,Petr SilhavyPresents recent research on intelligent algorithms in software engineering.Offers proceedings of the 12th Computer Science Online Conference 2023, Volume 2.Is the second of three proceedings volumes
作者: 種族被根除    時(shí)間: 2025-3-22 10:12

作者: agnostic    時(shí)間: 2025-3-22 14:49

作者: Expurgate    時(shí)間: 2025-3-22 17:20
Conference proceedings 2023ents in informatics and cybernetics within network and system contexts. This field is at the forefront of developing cutting-edge technologies that can tackle complex challenges and improve various aspects of our lives. The latest research in this field is featured in this book, which provides a com
作者: Functional    時(shí)間: 2025-3-22 23:05
Using Design Science Research to Iteratively Enhance Information Security Research Artefacts,and/or disseminated. Design Science Research (DSR) is a research paradigm that allows for the development and iterative enhancement of practical applicative information security artefacts that can help organizations improve their security position.
作者: 散開    時(shí)間: 2025-3-23 02:01
Data Forecasting Models and Decision-Making Methods in the Management System of a Flooded Object ordels, and determine the characteristics of the flood impact. The complex of mathematical models includes cause-and-effect matrices and graphs, as well as differential equations of system dynamics. These equations form a control model for solving the main problem. The optimal solution is selected from the set of considered action plans.
作者: 表皮    時(shí)間: 2025-3-23 06:01

作者: 卷發(fā)    時(shí)間: 2025-3-23 09:44
An Empirical Analysis of the Switching and Continued Use of Mobile Computing Applications: A Structes were supported as significant with Cronbach’s alpha and confirmatory factor analysis. Model significance and strength were assessed using SEM to estimate the model’s coefficients [.]. The variance of the dependent variable, “continue use,” was 38%, and switching behavior was 32% as a contribution to this study.
作者: Pedagogy    時(shí)間: 2025-3-23 17:12
The Conceptual Design of a Data Collection System for Predictive Maintenance,urrence or a?collapse of the given device. The advantage of this kind of solution making is the instant interaction with the induced failure in the production process and a?prospective machine shutdown.
作者: Abduct    時(shí)間: 2025-3-23 20:59

作者: Bravura    時(shí)間: 2025-3-24 01:25

作者: 彈藥    時(shí)間: 2025-3-24 06:24

作者: 我沒(méi)有強(qiáng)迫    時(shí)間: 2025-3-24 06:38

作者: 鉆孔    時(shí)間: 2025-3-24 12:25

作者: 他去就結(jié)束    時(shí)間: 2025-3-24 15:55
Integrated Privacy Preservation with Novel Encoding and Encryption for Securing Video in Internet-od from multiple location is stored in cloud server where they are indexed and subjected to sequences of security processing. The study outcome shows that proposed system to offer a potentially enhanced performance in comparison to existing scheme of video security.
作者: 黑豹    時(shí)間: 2025-3-24 22:25

作者: 商業(yè)上    時(shí)間: 2025-3-25 00:35
,Analysis of Facial Expressions of an Individual’s Face in the System for Monitoring the Working Capfaces in images. This paper proposes a method and algorithm for selecting an image fragment suitable for analysis and detecting on it some specific facial features of the operator’s face in order to further analyze the operator’s state and performance. The results of the practical application of the proposed approach are presented.
作者: Infelicity    時(shí)間: 2025-3-25 04:08
Improving Test Quality in E-Learning Systems,them. This article presents a number of indicators that allow assessing the ability of test questions to grade students by their levels of knowledge. Test questions not meeting the threshold requirements are proposed to be excluded from the test, thus improving the quality of the test. #CSOC1120.
作者: 簡(jiǎn)略    時(shí)間: 2025-3-25 09:14
Gamification of the Graph Theory Course. Finding the Shortest Path by a Greedy Algorithm,es the game of finding the shortest path in the graph developed by the authors. It can be used for gamification of courses related to discrete mathematics and information technology. A computer program has been developed to implement the proposed game, which makes it possible to use it in e-learning. #CSOC1120.
作者: 外星人    時(shí)間: 2025-3-25 12:57

作者: BUMP    時(shí)間: 2025-3-25 17:55

作者: 藝術(shù)    時(shí)間: 2025-3-25 20:57
Raditya Macy Widyatamaka Nasution,Mahyuddin K. M. Nasution
作者: 搖曳的微光    時(shí)間: 2025-3-26 02:59

作者: 支柱    時(shí)間: 2025-3-26 07:33
Awosejo Oluwaseun Johnson,Agnieta Pretorius,Tendani Lavhengwa
作者: 激怒某人    時(shí)間: 2025-3-26 10:43

作者: Junction    時(shí)間: 2025-3-26 16:24

作者: 不給啤    時(shí)間: 2025-3-26 20:19
Models and Algorithms for Process Management of Enterprises Equipment Repair in the Oil and Gas Ind for solving the complex tasks of operational management of an industrial enterprise for repairing equipment of the oil and gas sector in complex production situations based on the use of proximity functions between information objects is proposed and justified.
作者: troponins    時(shí)間: 2025-3-26 21:57
The Effect of Internet Threat on Small Businesses in South Africa,businesses (SMEs) operating in South Africa and developed a quantitative approach. The results revealed that the use of the internet adequately supports small businesses and significantly supports the electronic sustainable growth of SMEs, which is correlated with completing tasks quickly, accomplis
作者: Outwit    時(shí)間: 2025-3-27 01:48

作者: Catheter    時(shí)間: 2025-3-27 08:57

作者: 凹槽    時(shí)間: 2025-3-27 12:44
K. V. Selivanov,A. D. Zaharovases mimic a human-centric approach to solving problems, where a team of people is formed to solve a problem and given a free hand to find the solution under a best-effort assumption. We believe that this approach is suitable for a Smart City environment and describe in this chapter a prototype of su
作者: MEET    時(shí)間: 2025-3-27 16:39
Eze Nicholas,Okanazu Oliver,Ifeoma Onodugo,Madu Maureen,Ifeoma Nwakoby,Ifediora Chuka,Eze Emmanuel,Oio-Technical Systems, into the value-driven context of a Smart City. The architecture we propose puts value generation at the top of the pyramid and fuels the generation of novel values and enhancement of traditional ones. This effectively transforms the role and broadens the involvement and opportu
作者: 代替    時(shí)間: 2025-3-27 18:02
Alexander Soloviev,Anna Bogacheva,Vladimir Tishchenkovel Complex Coordinated Activities in the context of future Smart Cities. In this chapter we continue our line of research towards utility-based provisioning of Smart City infrastructures and introduce a novel provisioning middleware for the IoT Cloud.
作者: Transfusion    時(shí)間: 2025-3-27 22:44
Maxim Khisamutdinov,Iakov Korovin,Donat Ivanovow citizens in various collective activities in both virtual and physical domains. In this final chapter we explore the benefits of horizontal integration of the described technologies and present a research road map identifying the next important steps in the development of Cyber-Human Smart Cities
作者: 雄辯    時(shí)間: 2025-3-28 03:39

作者: 眼界    時(shí)間: 2025-3-28 09:56

作者: inhumane    時(shí)間: 2025-3-28 13:49
A. A. Dnekeshev,V. A. Kushnikov,A. D. Selyutin,V. A. Ivashchenko,A. S. Bogomolov,E. V. Berdnova,J. V for finding solutions for the proposed optimization problem. Experiments show that the integer programming formulation failed to obtain feasible solution in the given timelimit, while the GRASP methodology was able obtained solution in at most, 20?s. After analysis, one may verify that this approac
作者: 新義    時(shí)間: 2025-3-28 14:57
Gauri Sameer Rapate,N. C. Naveene open data available allowed the computation of indicators, such as journey times estimation or bus stop distribution to evaluate the universality in access to public transport. However, it has been noted that the lack of available data prevents the calculation of other age-friendly indicators. The
作者: 船員    時(shí)間: 2025-3-28 19:11

作者: Exploit    時(shí)間: 2025-3-29 00:40

作者: indenture    時(shí)間: 2025-3-29 03:27
Roman Tsarev,Shahzool Hazimin Azizam,Aleksei Sablinskii,Elena Potekhina,Irina Gogoleva,Irina Nikolaety between the results obtained using the two methods. This means, that the Bluetooth-based system can detect the same variations in the traffic flow that the regular loop detector, but having two main advantages: the tracking possibilities and a much lower cost.
作者: 高腳酒杯    時(shí)間: 2025-3-29 08:10

作者: 倒轉(zhuǎn)    時(shí)間: 2025-3-29 13:32
Analysis of Changes in the Pricing of Renewable Energy Sources,umber of scientific papers and articles on this topic have been studied and a rapid decrease in the cost of renewable energy production and, as a consequence, the electricity generated by them has been revealed. The main criteria by which the price of renewable energy generation is formed are outlin
作者: Detain    時(shí)間: 2025-3-29 19:24
Management of a Replacement Policy of Learning-Based Software System Based on a Mathematical Model,ware product due to software expansion and ageing has still not been well established. The primary objective of this study was therefore to develop a mathematical model for software developers advanced as potential breakthroughs in determining a replacement of ageing educational software products. T
作者: 性行為放縱者    時(shí)間: 2025-3-29 20:14

作者: CONE    時(shí)間: 2025-3-30 02:21
,Analysis of Facial Expressions of an Individual’s Face in the System for Monitoring the Working Cap cameras installed at the workplace can be used. Modern algorithms allow you to select faces in images and determine the coordinates of key points of faces in images. This paper proposes a method and algorithm for selecting an image fragment suitable for analysis and detecting on it some specific fa
作者: 長(zhǎng)處    時(shí)間: 2025-3-30 04:26
Using Design Science Research to Iteratively Enhance Information Security Research Artefacts,crease since last analyzed three years earlier. Cyber vulnerability is one of the most critical risk areas. Inaction to review, understand and react to cyber threat is simply too great for any organisation to ignore. Companies need to be confident that information security is managed effectively so
作者: Spinous-Process    時(shí)間: 2025-3-30 10:52

作者: 高度    時(shí)間: 2025-3-30 15:43

作者: Intercept    時(shí)間: 2025-3-30 17:05

作者: Musket    時(shí)間: 2025-3-31 00:42

作者: 許可    時(shí)間: 2025-3-31 01:37

作者: Aerate    時(shí)間: 2025-3-31 08:31

作者: 河潭    時(shí)間: 2025-3-31 11:30

作者: STALL    時(shí)間: 2025-3-31 15:12

作者: 四目在模仿    時(shí)間: 2025-3-31 19:25

作者: modifier    時(shí)間: 2025-3-31 22:25
The Conceptual Design of a Data Collection System for Predictive Maintenance, automatic production line – Festo AFB Factory. Via the designed data collection architecture, which consists of several layers, it is possible to obtain complex data from the physical device. The designed system considers the momentary state of the device, it has the ability of a?prediction of a?fu
作者: 陪審團(tuán)    時(shí)間: 2025-4-1 04:16

作者: 豎琴    時(shí)間: 2025-4-1 07:36

作者: obsession    時(shí)間: 2025-4-1 12:33

作者: 表臉    時(shí)間: 2025-4-1 16:55
Integrated Privacy Preservation with Novel Encoding and Encryption for Securing Video in Internet-oleading to intelligence-incorporated video surveillance system. Review of existing literatures shows the presence of some of the concrete evolving security methodologies; however, they are never assessed on bigger scale of deployment scenario like that in Internet-of-Things (IoT). Therefore, the pro
作者: MELD    時(shí)間: 2025-4-1 18:35

作者: Crayon    時(shí)間: 2025-4-1 23:30

作者: 使長(zhǎng)胖    時(shí)間: 2025-4-2 03:26
Eze Nicholas,Okanazu Oliver,Ifeoma Onodugo,Madu Maureen,Ifeoma Nwakoby,Ifediora Chuka,Eze Emmanuel,O utilization and facilitating communication between different city services. While the citizens are undeniably winners in this process as the beneficiaries of a more optimized and cheaper infrastructure they are not taking an active role in the development and daily management of the city. In this c




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
新巴尔虎右旗| 芦山县| 黑龙江省| 博野县| 安吉县| 辽阳市| 吴旗县| 太湖县| 广昌县| 永宁县| 湄潭县| 松江区| 满洲里市| 灌阳县| 肇州县| 始兴县| 牙克石市| 全南县| 太保市| 华容县| 临漳县| 新巴尔虎左旗| 宕昌县| 天长市| 黑龙江省| 华池县| 林西县| 白银市| 沧州市| 乐亭县| 蒲城县| 吕梁市| 寿阳县| 昌乐县| 垦利县| 汝阳县| 万宁市| 葫芦岛市| 班戈县| 芷江| 武平县|