找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3, G. Sai Sundara Krishnan,R. Anitha,Manuel Gra?a Co

[復(fù)制鏈接]
查看: 51416|回復(fù): 60
樓主
發(fā)表于 2025-3-21 19:52:12 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Computational Intelligence, Cyber Security and Computational Models
副標(biāo)題Proceedings of ICC3,
編輯G. Sai Sundara Krishnan,R. Anitha,Manuel Gra?a
視頻videohttp://file.papertrans.cn/233/232549/232549.mp4
概述Provides information on recent research trends in areas of computational intelligence, cyber security, and computational models.Includes theories and applications to provide design, analysis, and mode
叢書名稱Advances in Intelligent Systems and Computing
圖書封面Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3, G. Sai Sundara Krishnan,R. Anitha,Manuel Gra?a Co
描述This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19–21, 2013. The materials in the book include theory and applications to provide design, analysis, and modeling of the key areas. The book will be useful material for students, researchers, professionals, as well academicians in understanding current research trends and findings and future scope of research in computational intelligence, cyber security, and computational models.
出版日期Conference proceedings 2014
關(guān)鍵詞Bio-Inspired Computing; Cloud Computing; Cloud Security; Combinatorial Optimization; Computational Intel
版次1
doihttps://doi.org/10.1007/978-81-322-1680-3
isbn_softcover978-81-322-1679-7
isbn_ebook978-81-322-1680-3Series ISSN 2194-5357 Series E-ISSN 2194-5365
issn_series 2194-5357
copyrightSpringer India 2014
The information of publication is updating

書目名稱Computational Intelligence, Cyber Security and Computational Models影響因子(影響力)




書目名稱Computational Intelligence, Cyber Security and Computational Models影響因子(影響力)學(xué)科排名




書目名稱Computational Intelligence, Cyber Security and Computational Models網(wǎng)絡(luò)公開度




書目名稱Computational Intelligence, Cyber Security and Computational Models網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computational Intelligence, Cyber Security and Computational Models被引頻次




書目名稱Computational Intelligence, Cyber Security and Computational Models被引頻次學(xué)科排名




書目名稱Computational Intelligence, Cyber Security and Computational Models年度引用




書目名稱Computational Intelligence, Cyber Security and Computational Models年度引用學(xué)科排名




書目名稱Computational Intelligence, Cyber Security and Computational Models讀者反饋




書目名稱Computational Intelligence, Cyber Security and Computational Models讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:16:27 | 只看該作者
PR-Evaluation in Wissenschaft und Praxis,epends on the prevalence of the disease in the immediate neighborhood. One approach to handling such linked data is “collective learning.” In collective learning, one deals with a set of data points taken at a time. The dependencies between the data points are modeled as a graph, with the nodes repr
板凳
發(fā)表于 2025-3-22 00:37:06 | 只看該作者
地板
發(fā)表于 2025-3-22 08:19:28 | 只看該作者
,Modell für strategische PR-Evaluation,In the context of the famous Internet file size data of Crovella and some very recent data sets from a wireless mobility network, we examine the new class of LogPH distributions introduced by Ramaswami for modeling heavy-tailed random variables. The fits obtained are validated using separate trainin
5#
發(fā)表于 2025-3-22 10:43:20 | 只看該作者
6#
發(fā)表于 2025-3-22 13:48:11 | 只看該作者
7#
發(fā)表于 2025-3-22 18:01:03 | 只看該作者
,Modell für strategische PR-Evaluation,ive of this paper is to identify the optimal subset of genes from the leukemia dataset in order to classify the leukemia cancer. Different clustering approaches such as .-means (KM) clustering, fuzzy .-means (FCM) clustering, and modified .-means (MKM) clustering have been adopted in this research.
8#
發(fā)表于 2025-3-23 01:15:58 | 只看該作者
,Instrument für strategische PR-Evaluation,tion of roadside units (RSU) that takes part in communication between vehicular nodes is a challenging task because of the high mobility or dynamic nature of these networks. The nodes in the VANET whether stationary or moving are limited in terms of storage capacity, reliability, and energy. The mai
9#
發(fā)表于 2025-3-23 04:03:00 | 只看該作者
10#
發(fā)表于 2025-3-23 08:52:43 | 只看該作者
https://doi.org/10.1007/978-3-322-99607-7on in the presence of simultaneous sources of drift, other than sensor drift, should also be investigated, since it is often the case in practical situations. ELM is a competitive machine learning technique, which has been applied in different domains for classification. In this paper, ELM with diff
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-9 22:48
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
奉节县| 宜川县| 茶陵县| 美姑县| 亳州市| 甘南县| 乌兰浩特市| 淮滨县| 佳木斯市| 阿克苏市| 阜新市| 喜德县| 新沂市| 志丹县| 乌鲁木齐市| 岳阳市| 霍城县| 长春市| 东至县| 崇义县| 封开县| 富蕴县| 板桥市| 东光县| 磐安县| 延津县| 邹平县| 将乐县| 仙桃市| 资阳市| 宁南县| 石林| 黄山市| 凭祥市| 札达县| 鄯善县| 晋州市| 贺兰县| 哈密市| 新源县| 三亚市|