找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3, G. Sai Sundara Krishnan,R. Anitha,Manuel Gra?a Co

[復(fù)制鏈接]
查看: 51416|回復(fù): 60
樓主
發(fā)表于 2025-3-21 19:52:12 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Computational Intelligence, Cyber Security and Computational Models
副標(biāo)題Proceedings of ICC3,
編輯G. Sai Sundara Krishnan,R. Anitha,Manuel Gra?a
視頻videohttp://file.papertrans.cn/233/232549/232549.mp4
概述Provides information on recent research trends in areas of computational intelligence, cyber security, and computational models.Includes theories and applications to provide design, analysis, and mode
叢書名稱Advances in Intelligent Systems and Computing
圖書封面Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3, G. Sai Sundara Krishnan,R. Anitha,Manuel Gra?a Co
描述This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications to provide design, analysis, and modeling of the key areas. The book will be useful material for students, researchers, professionals, as well academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.
出版日期Conference proceedings 2014
關(guān)鍵詞Bio-Inspired Computing; Cloud Computing; Cloud Security; Combinatorial Optimization; Computational Intel
版次1
doihttps://doi.org/10.1007/978-81-322-1680-3
isbn_softcover978-81-322-1679-7
isbn_ebook978-81-322-1680-3Series ISSN 2194-5357 Series E-ISSN 2194-5365
issn_series 2194-5357
copyrightSpringer India 2014
The information of publication is updating

書目名稱Computational Intelligence, Cyber Security and Computational Models影響因子(影響力)




書目名稱Computational Intelligence, Cyber Security and Computational Models影響因子(影響力)學(xué)科排名




書目名稱Computational Intelligence, Cyber Security and Computational Models網(wǎng)絡(luò)公開度




書目名稱Computational Intelligence, Cyber Security and Computational Models網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computational Intelligence, Cyber Security and Computational Models被引頻次




書目名稱Computational Intelligence, Cyber Security and Computational Models被引頻次學(xué)科排名




書目名稱Computational Intelligence, Cyber Security and Computational Models年度引用




書目名稱Computational Intelligence, Cyber Security and Computational Models年度引用學(xué)科排名




書目名稱Computational Intelligence, Cyber Security and Computational Models讀者反饋




書目名稱Computational Intelligence, Cyber Security and Computational Models讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:16:27 | 只看該作者
PR-Evaluation in Wissenschaft und Praxis,epends on the prevalence of the disease in the immediate neighborhood. One approach to handling such linked data is “collective learning.” In collective learning, one deals with a set of data points taken at a time. The dependencies between the data points are modeled as a graph, with the nodes repr
板凳
發(fā)表于 2025-3-22 00:37:06 | 只看該作者
地板
發(fā)表于 2025-3-22 08:19:28 | 只看該作者
,Modell für strategische PR-Evaluation,In the context of the famous Internet file size data of Crovella and some very recent data sets from a wireless mobility network, we examine the new class of LogPH distributions introduced by Ramaswami for modeling heavy-tailed random variables. The fits obtained are validated using separate trainin
5#
發(fā)表于 2025-3-22 10:43:20 | 只看該作者
6#
發(fā)表于 2025-3-22 13:48:11 | 只看該作者
7#
發(fā)表于 2025-3-22 18:01:03 | 只看該作者
,Modell für strategische PR-Evaluation,ive of this paper is to identify the optimal subset of genes from the leukemia dataset in order to classify the leukemia cancer. Different clustering approaches such as .-means (KM) clustering, fuzzy .-means (FCM) clustering, and modified .-means (MKM) clustering have been adopted in this research.
8#
發(fā)表于 2025-3-23 01:15:58 | 只看該作者
,Instrument für strategische PR-Evaluation,tion of roadside units (RSU) that takes part in communication between vehicular nodes is a challenging task because of the high mobility or dynamic nature of these networks. The nodes in the VANET whether stationary or moving are limited in terms of storage capacity, reliability, and energy. The mai
9#
發(fā)表于 2025-3-23 04:03:00 | 只看該作者
10#
發(fā)表于 2025-3-23 08:52:43 | 只看該作者
https://doi.org/10.1007/978-3-322-99607-7on in the presence of simultaneous sources of drift, other than sensor drift, should also be investigated, since it is often the case in practical situations. ELM is a competitive machine learning technique, which has been applied in different domains for classification. In this paper, ELM with diff
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 22:48
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
资阳市| 中卫市| 阿图什市| 洪泽县| 元朗区| 湘阴县| 侯马市| 曲水县| 武汉市| 田林县| SHOW| 温州市| 文登市| 淅川县| 旌德县| 新昌县| 海安县| 寿阳县| 称多县| 新干县| 柳河县| 朝阳区| 资溪县| 稻城县| 沾化县| 葵青区| 涡阳县| 宁南县| 崇礼县| 石首市| 台江县| 谢通门县| 海宁市| 郯城县| 湖北省| 赤壁市| 松溪县| 瓦房店市| 信丰县| 永定县| 阿拉善盟|