標(biāo)題: Titlebook: Research in Computer Science; 6th Conference, CRI Paulin Melatagia Yonta,Kamel Barkaoui,Omer-Blaise Conference proceedings 2024 The Edito [打印本頁] 作者: inroad 時間: 2025-3-21 18:59
書目名稱Research in Computer Science影響因子(影響力)
書目名稱Research in Computer Science影響因子(影響力)學(xué)科排名
書目名稱Research in Computer Science網(wǎng)絡(luò)公開度
書目名稱Research in Computer Science網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Research in Computer Science被引頻次
書目名稱Research in Computer Science被引頻次學(xué)科排名
書目名稱Research in Computer Science年度引用
書目名稱Research in Computer Science年度引用學(xué)科排名
書目名稱Research in Computer Science讀者反饋
書目名稱Research in Computer Science讀者反饋學(xué)科排名
作者: 受人支配 時間: 2025-3-21 20:15
Loic Youmbi,Ali Wacka,Norbert Tsopzese deters the natural enemies of the pest. The residual activity of the insecticide then expires and the pest population is able to increase more rapidly and to a higher abundance when natural enemies are absent or in low abundance. Replacement of a primary pest with a secondary pest occurs when an 作者: 奇怪 時間: 2025-3-22 03:48
Armel Jacques Nzekon Nzeko’o,Hamza Adamou,Thomas Messi Nguele,Bleriot Pagnaul Betndam Tchambaember 2005. Both editors agreed on the need to produce a volume focusing on recent advances and achievements which changed the practice of crop protection in the last decade. The opera rapidly evolved towards a long term editorial endeavour, yielding a mul- disciplinary series of five volumes. In vi作者: conspicuous 時間: 2025-3-22 08:08
Fabien Mouomene Moffo,Auguste Vigny Noumsi Woguia,Samuel Bowong Tsakou,Joseph Mvogo Ngonose deters the natural enemies of the pest. The residual activity of the insecticide then expires and the pest population is able to increase more rapidly and to a higher abundance when natural enemies are absent or in low abundance. Replacement of a primary pest with a secondary pest occurs when an 作者: Anticoagulants 時間: 2025-3-22 10:02
Kemche Ghomsi Adrien Arnaud,Mvogo Ngono Joseph,Bowong Tsakou Samuel,Noumsi Woguia Auguste Vignyave been widely and successfully used in plant pathology for many years, there is a general lack of standards for model development. In part, this is because most disease forecast models tend to be either complex or specialized. The first part of this guide is an overview of the biological considera作者: d-limonene 時間: 2025-3-22 13:53 作者: 諂媚于性 時間: 2025-3-22 20:57
,Time Aware Implicit Social Influence Estimation to?Enhance Recommender Systems Performances,s of estimating social influences, but using implicit trust informations (ratings that users give to items), which is much more available. Specifically, we have modified the basic recommender systems by incorporating the results of time aware social influence estimations based on implicit trust (thr作者: 不能逃避 時間: 2025-3-22 23:22
,Analysis of?COVID-19 Coughs: From the?Mildest to?the?Most Severe Form, a?Realistic Classification U which allowed the acquisition of data, reduce systematic and random errors in the quality of the audio. The architecture of the convolutional neural networks exploited, gives an overall Accuracy of 90.33%. This system could have a significant positive social impact by minimizing transmission of the作者: 勉勵 時間: 2025-3-23 01:25 作者: semiskilled 時間: 2025-3-23 07:57
,Robustness of?Image Classification on?Imbalanced Datasets Using Capsules Networks,AR10 dataset. This version has a class imbalance ratio of 0.1, meaning some classes have significantly fewer data points than others. This mimics the real-world scenario of imbalanced datasets. We then compared our model’s performance on this dataset with the findings of recent research in the field作者: 法律 時間: 2025-3-23 13:26 作者: 吃掉 時間: 2025-3-23 17:03
,A Hybrid Algorithm Based on?Tabu Search and?K-Means for?Solving the?Traveling Salesman Problem,ers have been reunited. The experiments, carried out on instances taken from the TSPLIB library [., .], show that the hybrid approach proposed in this way provides a significant improvement in terms of the length of the path travelled and the travel time, compared with methods based solely on K-mean作者: Mawkish 時間: 2025-3-23 21:57 作者: 充氣球 時間: 2025-3-23 23:27 作者: scrape 時間: 2025-3-24 02:27
of pesticides. This can cause an increase in fecundity (physiological hormoligosis) or oviposition behaviour (behavioural hormoligosis of the pest leading to a significant increase in its abundance. Selective insecticides and acaricides coupled with natural enemies and host plant resistance have be作者: 原始 時間: 2025-3-24 06:34 作者: TAG 時間: 2025-3-24 11:15 作者: V切開 時間: 2025-3-24 16:18
Fabien Mouomene Moffo,Auguste Vigny Noumsi Woguia,Samuel Bowong Tsakou,Joseph Mvogo Ngono of pesticides. This can cause an increase in fecundity (physiological hormoligosis) or oviposition behaviour (behavioural hormoligosis of the pest leading to a significant increase in its abundance. Selective insecticides and acaricides coupled with natural enemies and host plant resistance have be作者: FACET 時間: 2025-3-24 21:21
Kemche Ghomsi Adrien Arnaud,Mvogo Ngono Joseph,Bowong Tsakou Samuel,Noumsi Woguia Auguste Vignyers the best methods for collecting or obtaining the weather inputs used in infection models. The fifth section covers techniques for model validation both from a biological and commercial perspective. The final section briefly covers techniques for information delivery focusing on the internet.作者: 東西 時間: 2025-3-25 02:37 作者: Incorruptible 時間: 2025-3-25 05:15
Yannick Yomie Nzeuhang,Paulin Melatagia Yonta,Benjamin Lecouteux作者: 最高點 時間: 2025-3-25 07:43 作者: 諂媚于人 時間: 2025-3-25 12:51
Franck-steve Kamdem Kengne,Mathurin Soh,Pascaline Ndukum作者: 時間等 時間: 2025-3-25 17:37
Thomas Messi Nguele,Armel Jacques Nzekon Nzeko’o,Damase Donald Onana作者: Priapism 時間: 2025-3-25 23:35 作者: figurine 時間: 2025-3-26 01:55 作者: 錫箔紙 時間: 2025-3-26 05:06 作者: COMA 時間: 2025-3-26 09:27
Communications in Computer and Information Sciencehttp://image.papertrans.cn/r/image/827968.jpg作者: hemorrhage 時間: 2025-3-26 14:13
https://doi.org/10.1007/978-3-031-63110-8Networks Security; Natural Language Processing; Image Processing; Complex System Modelling; Software Eng作者: 變化 時間: 2025-3-26 19:45
978-3-031-63109-2The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: bibliophile 時間: 2025-3-26 21:12 作者: cardiac-arrest 時間: 2025-3-27 01:19
Conference proceedings 2024ember 12-13, 2023.?..The 16 full papers included in this book were carefully reviewed and selected from 72 submissions. The CRI 2023 proceedings focus on artificial intelligence, machine learning, natural language processing, computer vision, cryptography and distributed computing..作者: Anhydrous 時間: 2025-3-27 08:52
,Application of?the?Multilingual Acoustic Representation Model XLSR-53 for?the?Transcription of?Ewonn, . . . ) and Ewondo strongly impacts the performance of the transcription model. The highest performances obtained are around 70.8% on the WER and 28% on the CER. An analysis of these preliminary results is carried out and then interpreted; in order to ultimately propose effective ways of improvement.作者: 吞噬 時間: 2025-3-27 12:41 作者: 冬眠 時間: 2025-3-27 15:38
,Building and?Validating an?Ontology for?Public Procurement: The Case of?Cameroon,y that semantically describes the publication stage of the public procurement process. We use the . ontology to generate a knowledge graph for Cameroonian public procurement that will facilitate information retrieval and data analysis in Cameroonian public procurement.作者: 憎惡 時間: 2025-3-27 18:51 作者: obscurity 時間: 2025-3-27 23:22
,A New Hybrid Algorithm Based on?Ant Colony Optimization and?Recurrent Neural Networks with?Attentioights are then used to predict the next towns to visit for each city. Experimental results on instances TSP from the TSPLIB library demonstrate that this hybrid approach is better compared to the classic ACO.作者: 裝入膠囊 時間: 2025-3-28 04:46
,Two High Capacity Text Steganography Schemes Based on?Color Coding,nd to the receiver by mail. After experiments, the results obtained show that our models performs a better hiding process in terms of hiding capacity as compared to the scheme of Aruna Malik et al. on which our idea is based.作者: pulse-pressure 時間: 2025-3-28 07:21
,Integration of?the?Triple Block Data Security Model Based on?Distributed Crypto-Steganography in?a?rate the published security model in any type of distributed system such as Cloud, Grids or Clusters Computing. The integration of this solution is tested in a real cluster environment and data integrity tests showed the effectiveness of the deployment.作者: Working-Memory 時間: 2025-3-28 12:47
,Convolutional Neural Network Based Detection Approach of?Undesirable SMS (Short Message Service) innicate easily. Many commercial companies, entities or individuals also use SMS to send out advertisements, unwanted messages containing links or malicious content that may violate customer privacy. This raises the question of how to help users to avoid being trapped? Several works have been proposed作者: PRISE 時間: 2025-3-28 15:26
,Time Aware Implicit Social Influence Estimation to?Enhance Recommender Systems Performances,icant role in our daily lives. However, with the constantly growing addition of items on these platforms, it becomes challenging for users to select the products that interest them. Hence, the implementation of recommender systems to facilitate this selection process. To enhance these recommender sy作者: reptile 時間: 2025-3-28 21:38
,Analysis of?COVID-19 Coughs: From the?Mildest to?the?Most Severe Form, a?Realistic Classification Un over 600 million positive cases and over 6 million deaths worldwide. Therefore, an efficient, inexpensive, and ubiquitous diagnostic tool is essential to help fight lung disease and the COVID-19 crisis. Deep learning and machine learning algorithms can be used to analyze the cough sounds of infect作者: 打擊 時間: 2025-3-28 23:25
,SLCDeepETC: An On-Demand Analysis Ready Data Pipeline on?Sentinel-1 Single Look Complex for?Deep Legle Look Complex products from Sentinel-1 to predict some environmental phenomena using Deep Learning. By retaining all original sensor measurements, it has been proven that interferometry data on Single Look Complex products, when analyzed with Deep Learning, can better inform data restoration, coh作者: RUPT 時間: 2025-3-29 06:42 作者: Femine 時間: 2025-3-29 09:36 作者: 尖叫 時間: 2025-3-29 13:58 作者: 尖酸一點 時間: 2025-3-29 17:28
,Explaining Meta-learner’s Predictions: Case of?Corporate CO2 Emissions,fore necessary for companies to control and reduce their pollution levels, and this requires knowing the amount of CO. emissions that can be produced and identifying the factors responsible for it. Several works have been carried out with the aim of predicting the quantity of CO. emitted at the comp作者: 創(chuàng)作 時間: 2025-3-29 20:42 作者: ALIAS 時間: 2025-3-30 02:32
,A Hybrid Algorithm Based on?Tabu Search and?K-Means for?Solving the?Traveling Salesman Problem,earch (TS). In this hybrid approach, we first apply the K-means algorithm to group cities into several clusters. Then we use tabu search to explore the solution space to optimise the path within each cluster. This avoids getting stuck in local optima and allows us to explore new, potentially better 作者: 分發(fā) 時間: 2025-3-30 04:38
,Hybridization of?a?Recurrent Neural Network by?Quadratic Programming for?Combinatory Optimization: ss, but they are still incomplete because they don’t take into account the changing trend of electricity demand in buildings. In this paper, we propose a novel approach to minimizing joule loss using a hybridization of a recurrent neural network (RNN) and quadratic programming (QP). The RNN is used 作者: 杠桿支點 時間: 2025-3-30 09:01 作者: 機密 時間: 2025-3-30 13:31
,Recurrent Neural Network Parallelization for?Hate Messages Detection,ful effects of this scourge, scientists often integrate into social network platforms models provided by deep learning algorithms allowing to detect and react automatically to a message with a hateful nature. One of the particularities of these algorithms is that they are so efficient as the amount 作者: 勉勵 時間: 2025-3-30 17:50
,Two High Capacity Text Steganography Schemes Based on?Color Coding,phic scheme based on color coding. This includes two different methods: the first based on permutation, and the second based on numeration systems. Given a secret message and a cover text, the proposed schemes embed the secret message in the cover text by making it colored. The stego-text is then se