派博傳思國際中心

標(biāo)題: Titlebook: Research in Computer Science; 6th Conference, CRI Paulin Melatagia Yonta,Kamel Barkaoui,Omer-Blaise Conference proceedings 2024 The Edito [打印本頁]

作者: inroad    時間: 2025-3-21 18:59
書目名稱Research in Computer Science影響因子(影響力)




書目名稱Research in Computer Science影響因子(影響力)學(xué)科排名




書目名稱Research in Computer Science網(wǎng)絡(luò)公開度




書目名稱Research in Computer Science網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Research in Computer Science被引頻次




書目名稱Research in Computer Science被引頻次學(xué)科排名




書目名稱Research in Computer Science年度引用




書目名稱Research in Computer Science年度引用學(xué)科排名




書目名稱Research in Computer Science讀者反饋




書目名稱Research in Computer Science讀者反饋學(xué)科排名





作者: 受人支配    時間: 2025-3-21 20:15
Loic Youmbi,Ali Wacka,Norbert Tsopzese deters the natural enemies of the pest. The residual activity of the insecticide then expires and the pest population is able to increase more rapidly and to a higher abundance when natural enemies are absent or in low abundance. Replacement of a primary pest with a secondary pest occurs when an
作者: 奇怪    時間: 2025-3-22 03:48
Armel Jacques Nzekon Nzeko’o,Hamza Adamou,Thomas Messi Nguele,Bleriot Pagnaul Betndam Tchambaember 2005. Both editors agreed on the need to produce a volume focusing on recent advances and achievements which changed the practice of crop protection in the last decade. The opera rapidly evolved towards a long term editorial endeavour, yielding a mul- disciplinary series of five volumes. In vi
作者: conspicuous    時間: 2025-3-22 08:08
Fabien Mouomene Moffo,Auguste Vigny Noumsi Woguia,Samuel Bowong Tsakou,Joseph Mvogo Ngonose deters the natural enemies of the pest. The residual activity of the insecticide then expires and the pest population is able to increase more rapidly and to a higher abundance when natural enemies are absent or in low abundance. Replacement of a primary pest with a secondary pest occurs when an
作者: Anticoagulants    時間: 2025-3-22 10:02
Kemche Ghomsi Adrien Arnaud,Mvogo Ngono Joseph,Bowong Tsakou Samuel,Noumsi Woguia Auguste Vignyave been widely and successfully used in plant pathology for many years, there is a general lack of standards for model development. In part, this is because most disease forecast models tend to be either complex or specialized. The first part of this guide is an overview of the biological considera
作者: d-limonene    時間: 2025-3-22 13:53

作者: 諂媚于性    時間: 2025-3-22 20:57
,Time Aware Implicit Social Influence Estimation to?Enhance Recommender Systems Performances,s of estimating social influences, but using implicit trust informations (ratings that users give to items), which is much more available. Specifically, we have modified the basic recommender systems by incorporating the results of time aware social influence estimations based on implicit trust (thr
作者: 不能逃避    時間: 2025-3-22 23:22
,Analysis of?COVID-19 Coughs: From the?Mildest to?the?Most Severe Form, a?Realistic Classification U which allowed the acquisition of data, reduce systematic and random errors in the quality of the audio. The architecture of the convolutional neural networks exploited, gives an overall Accuracy of 90.33%. This system could have a significant positive social impact by minimizing transmission of the
作者: 勉勵    時間: 2025-3-23 01:25

作者: semiskilled    時間: 2025-3-23 07:57
,Robustness of?Image Classification on?Imbalanced Datasets Using Capsules Networks,AR10 dataset. This version has a class imbalance ratio of 0.1, meaning some classes have significantly fewer data points than others. This mimics the real-world scenario of imbalanced datasets. We then compared our model’s performance on this dataset with the findings of recent research in the field
作者: 法律    時間: 2025-3-23 13:26

作者: 吃掉    時間: 2025-3-23 17:03
,A Hybrid Algorithm Based on?Tabu Search and?K-Means for?Solving the?Traveling Salesman Problem,ers have been reunited. The experiments, carried out on instances taken from the TSPLIB library [., .], show that the hybrid approach proposed in this way provides a significant improvement in terms of the length of the path travelled and the travel time, compared with methods based solely on K-mean
作者: Mawkish    時間: 2025-3-23 21:57

作者: 充氣球    時間: 2025-3-23 23:27

作者: scrape    時間: 2025-3-24 02:27
of pesticides. This can cause an increase in fecundity (physiological hormoligosis) or oviposition behaviour (behavioural hormoligosis of the pest leading to a significant increase in its abundance. Selective insecticides and acaricides coupled with natural enemies and host plant resistance have be
作者: 原始    時間: 2025-3-24 06:34

作者: TAG    時間: 2025-3-24 11:15

作者: V切開    時間: 2025-3-24 16:18
Fabien Mouomene Moffo,Auguste Vigny Noumsi Woguia,Samuel Bowong Tsakou,Joseph Mvogo Ngono of pesticides. This can cause an increase in fecundity (physiological hormoligosis) or oviposition behaviour (behavioural hormoligosis of the pest leading to a significant increase in its abundance. Selective insecticides and acaricides coupled with natural enemies and host plant resistance have be
作者: FACET    時間: 2025-3-24 21:21
Kemche Ghomsi Adrien Arnaud,Mvogo Ngono Joseph,Bowong Tsakou Samuel,Noumsi Woguia Auguste Vignyers the best methods for collecting or obtaining the weather inputs used in infection models. The fifth section covers techniques for model validation both from a biological and commercial perspective. The final section briefly covers techniques for information delivery focusing on the internet.
作者: 東西    時間: 2025-3-25 02:37

作者: Incorruptible    時間: 2025-3-25 05:15
Yannick Yomie Nzeuhang,Paulin Melatagia Yonta,Benjamin Lecouteux
作者: 最高點    時間: 2025-3-25 07:43

作者: 諂媚于人    時間: 2025-3-25 12:51
Franck-steve Kamdem Kengne,Mathurin Soh,Pascaline Ndukum
作者: 時間等    時間: 2025-3-25 17:37
Thomas Messi Nguele,Armel Jacques Nzekon Nzeko’o,Damase Donald Onana
作者: Priapism    時間: 2025-3-25 23:35

作者: figurine    時間: 2025-3-26 01:55

作者: 錫箔紙    時間: 2025-3-26 05:06

作者: COMA    時間: 2025-3-26 09:27
Communications in Computer and Information Sciencehttp://image.papertrans.cn/r/image/827968.jpg
作者: hemorrhage    時間: 2025-3-26 14:13
https://doi.org/10.1007/978-3-031-63110-8Networks Security; Natural Language Processing; Image Processing; Complex System Modelling; Software Eng
作者: 變化    時間: 2025-3-26 19:45
978-3-031-63109-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl
作者: bibliophile    時間: 2025-3-26 21:12

作者: cardiac-arrest    時間: 2025-3-27 01:19
Conference proceedings 2024ember 12-13, 2023.?..The 16 full papers included in this book were carefully reviewed and selected from 72 submissions. The CRI 2023 proceedings focus on artificial intelligence, machine learning, natural language processing, computer vision, cryptography and distributed computing..
作者: Anhydrous    時間: 2025-3-27 08:52
,Application of?the?Multilingual Acoustic Representation Model XLSR-53 for?the?Transcription of?Ewonn, . . . ) and Ewondo strongly impacts the performance of the transcription model. The highest performances obtained are around 70.8% on the WER and 28% on the CER. An analysis of these preliminary results is carried out and then interpreted; in order to ultimately propose effective ways of improvement.
作者: 吞噬    時間: 2025-3-27 12:41

作者: 冬眠    時間: 2025-3-27 15:38
,Building and?Validating an?Ontology for?Public Procurement: The Case of?Cameroon,y that semantically describes the publication stage of the public procurement process. We use the . ontology to generate a knowledge graph for Cameroonian public procurement that will facilitate information retrieval and data analysis in Cameroonian public procurement.
作者: 憎惡    時間: 2025-3-27 18:51

作者: obscurity    時間: 2025-3-27 23:22
,A New Hybrid Algorithm Based on?Ant Colony Optimization and?Recurrent Neural Networks with?Attentioights are then used to predict the next towns to visit for each city. Experimental results on instances TSP from the TSPLIB library demonstrate that this hybrid approach is better compared to the classic ACO.
作者: 裝入膠囊    時間: 2025-3-28 04:46
,Two High Capacity Text Steganography Schemes Based on?Color Coding,nd to the receiver by mail. After experiments, the results obtained show that our models performs a better hiding process in terms of hiding capacity as compared to the scheme of Aruna Malik et al. on which our idea is based.
作者: pulse-pressure    時間: 2025-3-28 07:21
,Integration of?the?Triple Block Data Security Model Based on?Distributed Crypto-Steganography in?a?rate the published security model in any type of distributed system such as Cloud, Grids or Clusters Computing. The integration of this solution is tested in a real cluster environment and data integrity tests showed the effectiveness of the deployment.
作者: Working-Memory    時間: 2025-3-28 12:47
,Convolutional Neural Network Based Detection Approach of?Undesirable SMS (Short Message Service) innicate easily. Many commercial companies, entities or individuals also use SMS to send out advertisements, unwanted messages containing links or malicious content that may violate customer privacy. This raises the question of how to help users to avoid being trapped? Several works have been proposed
作者: PRISE    時間: 2025-3-28 15:26
,Time Aware Implicit Social Influence Estimation to?Enhance Recommender Systems Performances,icant role in our daily lives. However, with the constantly growing addition of items on these platforms, it becomes challenging for users to select the products that interest them. Hence, the implementation of recommender systems to facilitate this selection process. To enhance these recommender sy
作者: reptile    時間: 2025-3-28 21:38
,Analysis of?COVID-19 Coughs: From the?Mildest to?the?Most Severe Form, a?Realistic Classification Un over 600 million positive cases and over 6 million deaths worldwide. Therefore, an efficient, inexpensive, and ubiquitous diagnostic tool is essential to help fight lung disease and the COVID-19 crisis. Deep learning and machine learning algorithms can be used to analyze the cough sounds of infect
作者: 打擊    時間: 2025-3-28 23:25
,SLCDeepETC: An On-Demand Analysis Ready Data Pipeline on?Sentinel-1 Single Look Complex for?Deep Legle Look Complex products from Sentinel-1 to predict some environmental phenomena using Deep Learning. By retaining all original sensor measurements, it has been proven that interferometry data on Single Look Complex products, when analyzed with Deep Learning, can better inform data restoration, coh
作者: RUPT    時間: 2025-3-29 06:42

作者: Femine    時間: 2025-3-29 09:36

作者: 尖叫    時間: 2025-3-29 13:58

作者: 尖酸一點    時間: 2025-3-29 17:28
,Explaining Meta-learner’s Predictions: Case of?Corporate CO2 Emissions,fore necessary for companies to control and reduce their pollution levels, and this requires knowing the amount of CO. emissions that can be produced and identifying the factors responsible for it. Several works have been carried out with the aim of predicting the quantity of CO. emitted at the comp
作者: 創(chuàng)作    時間: 2025-3-29 20:42

作者: ALIAS    時間: 2025-3-30 02:32
,A Hybrid Algorithm Based on?Tabu Search and?K-Means for?Solving the?Traveling Salesman Problem,earch (TS). In this hybrid approach, we first apply the K-means algorithm to group cities into several clusters. Then we use tabu search to explore the solution space to optimise the path within each cluster. This avoids getting stuck in local optima and allows us to explore new, potentially better
作者: 分發(fā)    時間: 2025-3-30 04:38
,Hybridization of?a?Recurrent Neural Network by?Quadratic Programming for?Combinatory Optimization: ss, but they are still incomplete because they don’t take into account the changing trend of electricity demand in buildings. In this paper, we propose a novel approach to minimizing joule loss using a hybridization of a recurrent neural network (RNN) and quadratic programming (QP). The RNN is used
作者: 杠桿支點    時間: 2025-3-30 09:01

作者: 機密    時間: 2025-3-30 13:31
,Recurrent Neural Network Parallelization for?Hate Messages Detection,ful effects of this scourge, scientists often integrate into social network platforms models provided by deep learning algorithms allowing to detect and react automatically to a message with a hateful nature. One of the particularities of these algorithms is that they are so efficient as the amount
作者: 勉勵    時間: 2025-3-30 17:50
,Two High Capacity Text Steganography Schemes Based on?Color Coding,phic scheme based on color coding. This includes two different methods: the first based on permutation, and the second based on numeration systems. Given a secret message and a cover text, the proposed schemes embed the secret message in the cover text by making it colored. The stego-text is then se




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
丰城市| 乌兰察布市| 盐亭县| 二连浩特市| 铜梁县| 武平县| 静宁县| 日土县| 密山市| 靖安县| 新建县| 长宁县| 永仁县| 六枝特区| 阜南县| 石门县| 凌云县| 南皮县| 永泰县| 延津县| 贵溪市| 旅游| 克什克腾旗| 且末县| 林周县| 呼图壁县| 东方市| 泗洪县| 延边| 宿州市| 镇远县| 金寨县| 苍溪县| 汤原县| 日土县| 开原市| 潼南县| 乌苏市| 昔阳县| 宣城市| 德保县|