派博傳思國際中心

標題: Titlebook: Applied Computing and Information Technology; Roger Lee Book 2020 Springer Nature Switzerland AG 2020 Computational Intelligence.Applied C [打印本頁]

作者: Goiter    時間: 2025-3-21 19:17
書目名稱Applied Computing and Information Technology影響因子(影響力)




書目名稱Applied Computing and Information Technology影響因子(影響力)學科排名




書目名稱Applied Computing and Information Technology網(wǎng)絡公開度




書目名稱Applied Computing and Information Technology網(wǎng)絡公開度學科排名




書目名稱Applied Computing and Information Technology被引頻次




書目名稱Applied Computing and Information Technology被引頻次學科排名




書目名稱Applied Computing and Information Technology年度引用




書目名稱Applied Computing and Information Technology年度引用學科排名




書目名稱Applied Computing and Information Technology讀者反饋




書目名稱Applied Computing and Information Technology讀者反饋學科排名





作者: hypnogram    時間: 2025-3-21 22:06
Improvement of Data Sparsity and Scalability Problems in Collaborative Filtering Based Recommendatind more, the related technologies have also advanced. Among them, the technique, which analyzes customer preference information to measure similarity between customers or between items and recommends items based on it, is called the collaborative filtering. Since it has an advantage that the more am
作者: Indelible    時間: 2025-3-22 02:47
A Study on the Methods for Establishing Security Information & Event Management,al control system and enterprises, what’s called cyber-hacking and cyber-attack on the cyber space like cyber war, for the sake of the nation and organization. Besides, APT (Advanced Persistent Threat) attack utilizing complex types of attack in order to attack a certain target brings about a tremen
作者: 四牛在彎曲    時間: 2025-3-22 07:16

作者: coalition    時間: 2025-3-22 12:39
Real-Time Ultra-Wide Viewing Player for Spatial and Temporal Random Access,he problems concerning playing UWV video in terms of system resources and user preference. Users may be interested in a certain region or a particular time interval of the entire set of UWV images. In this case, decoding all images is a waste of system resources and requires a lot of computational t
作者: obviate    時間: 2025-3-22 15:34

作者: Assignment    時間: 2025-3-22 18:20

作者: LURE    時間: 2025-3-23 00:26
Fall Detection of Elderly Persons by Action Recognition Using Data Augmentation and State Transitioction of falls requiring emergency treatment.?This paper proposes a method to acquire posture information of a person from a camera watching?over elderly people, and to recognize the behavior?of the person using Long Short Term Memory. The proposed method detects falls of elderly people automaticall
作者: 弄污    時間: 2025-3-23 05:19
Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data, by this fraudulent act is severe as what happened to the Equifax data breach in 2017. Here cryptography and steganography are applied to secure identity data contained in the electronic Indonesian identity card (e-KTP). Cryptography has been used for decades to secure data in storage. Steganography
作者: fender    時間: 2025-3-23 08:27
Labeling Algorithm and Fully Connected Neural Network for Automated Number Plate Recognition Systemof ANPR system such as vehicle parking, toll enforcement, and traffic management are already widely used but not in Indonesia today. In this paper, the Labeling algorithm and a fully connected neural network are used to create an ANPR system for vehicle parking management in Universitas Multimedia N
作者: 委屈    時間: 2025-3-23 12:44

作者: GROG    時間: 2025-3-23 14:14
Transforming YAWL Workflows into Petri Nets,rful business workflow modeling languages that is capable of representing the essential business workflow patterns needed for the software driven workflow automation. However, to do the model checking of a workflow written in YAWL is merely automated and the exhaustive simulations of the YAWL would
作者: 致命    時間: 2025-3-23 19:26

作者: peak-flow    時間: 2025-3-24 00:30
978-3-030-25219-9Springer Nature Switzerland AG 2020
作者: MOCK    時間: 2025-3-24 02:49

作者: 確認    時間: 2025-3-24 07:21

作者: 全國性    時間: 2025-3-24 10:40

作者: Mosaic    時間: 2025-3-24 18:28

作者: Carcinogenesis    時間: 2025-3-24 22:15
https://doi.org/10.1007/978-3-030-95746-9eled for the capacitive probes and TSVs with fabrication errors of a crack, a pin-hole, and a micro-void. The large probe can measure multiple TSVs, simultaneously. From the post-processing of the measured data, the capability of error detection is verified for error cognition, the size and the number of errors.
作者: LEVER    時間: 2025-3-25 01:49

作者: 散步    時間: 2025-3-25 05:12

作者: recession    時間: 2025-3-25 08:47
https://doi.org/10.1007/978-3-030-95746-9al control system and enterprises, what’s called cyber-hacking and cyber-attack on the cyber space like cyber war, for the sake of the nation and organization. Besides, APT (Advanced Persistent Threat) attack utilizing complex types of attack in order to attack a certain target brings about a tremen
作者: Merited    時間: 2025-3-25 11:39

作者: COMA    時間: 2025-3-25 15:48
https://doi.org/10.1007/978-3-030-95746-9he problems concerning playing UWV video in terms of system resources and user preference. Users may be interested in a certain region or a particular time interval of the entire set of UWV images. In this case, decoding all images is a waste of system resources and requires a lot of computational t
作者: 帳單    時間: 2025-3-25 21:59
Frictional Behaviours and Mechanismsoice rate, gentle form and function, pitch tone, language habits, and gender. Human voices are a key element of human communication. In the era of the Fourth Industrial Revolution, the voices are the main means of communication between people and people, between humans and machines, machines and mac
作者: 天然熱噴泉    時間: 2025-3-26 00:12

作者: TAG    時間: 2025-3-26 05:57

作者: 冒失    時間: 2025-3-26 10:04
Frictional Behaviours and Mechanisms by this fraudulent act is severe as what happened to the Equifax data breach in 2017. Here cryptography and steganography are applied to secure identity data contained in the electronic Indonesian identity card (e-KTP). Cryptography has been used for decades to secure data in storage. Steganography
作者: Accede    時間: 2025-3-26 13:04
Frictional Behaviours and Mechanismsof ANPR system such as vehicle parking, toll enforcement, and traffic management are already widely used but not in Indonesia today. In this paper, the Labeling algorithm and a fully connected neural network are used to create an ANPR system for vehicle parking management in Universitas Multimedia N
作者: Accede    時間: 2025-3-26 19:02
https://doi.org/10.1007/978-3-030-95746-9ng the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Po
作者: Locale    時間: 2025-3-27 00:22
Seyedsina Moeinzadeh,Esmaiel Jabbari Ph.D.rful business workflow modeling languages that is capable of representing the essential business workflow patterns needed for the software driven workflow automation. However, to do the model checking of a workflow written in YAWL is merely automated and the exhaustive simulations of the YAWL would
作者: deceive    時間: 2025-3-27 03:16

作者: Melodrama    時間: 2025-3-27 08:47
https://doi.org/10.1007/978-3-030-95746-9ction to analyze a general system and application log-based event. As far as an effective security detection is concerned, strategies for a systemic preparation and execution to actively solve the security issue are necessary by utilizing enormous big data occurring throughout the enterprise IT infr
作者: Chameleon    時間: 2025-3-27 10:23

作者: 撤退    時間: 2025-3-27 15:03

作者: alabaster    時間: 2025-3-27 19:11
Improvement of Data Sparsity and Scalability Problems in Collaborative Filtering Based Recommendatiimprove these limits have been continued, it is needed more practical studies. Therefore, this paper proposed the collaborative filtering technique that improves the limits of the collaborative filtering recommendation technique’s data sparsity and scalability through two-stage clustering. First, it
作者: 分貝    時間: 2025-3-28 00:05

作者: Employee    時間: 2025-3-28 03:21

作者: 豐富    時間: 2025-3-28 07:39

作者: RACE    時間: 2025-3-28 12:49

作者: 磨碎    時間: 2025-3-28 14:50
1860-949X erence’s most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of co978-3-030-25219-9978-3-030-25217-5Series ISSN 1860-949X Series E-ISSN 1860-9503
作者: outskirts    時間: 2025-3-28 19:18
1860-949X Applied Computing and Information Technology ACIT 2019, heldThis book gathers the outcomes of the 7th International Conference on Applied Computing and Information Technology (ACIT 2019), which was held on May 29–31, 2019 in Honolulu, Hawaii. The aim of the conference was to bring together researche
作者: 灌輸    時間: 2025-3-29 00:17

作者: 有害    時間: 2025-3-29 05:32
A Comparative Study of Using Bag-of-Words and Word-Embedding Attributes in the Spoiler Classificatiag of words could be due to its scalability. Between Word2Vec and FastText embeddings, the former was favorable when few out-of-vocabulary (OOV) words were present. Finally, although FastText was expected to be helpful with a large number of OOV words, its benefit was hardly seen for Thai language.
作者: Microgram    時間: 2025-3-29 09:18
Fall Detection of Elderly Persons by Action Recognition Using Data Augmentation and State Transitioy using the result of action recognition. Since it is difficult to capture dangerous scenes such as fall of elderly people and to capture a lot of data, this paper proposes a new method that can create a large amount of data necessary for learning from a small amount of data.
作者: ALOFT    時間: 2025-3-29 12:19
Transforming YAWL Workflows into Petri Nets,still be time-consuming. In this paper, we propose an alternative to transform a YAWL workflow into a corresponding Petri nets model. A set of mapping rules would be proposed to cope with the non well formed model of YAWL. The resulting Petri nets model of the YAWL workflows is correct and ready for model checking.
作者: Cerebrovascular    時間: 2025-3-29 15:49
Frictional Behaviours and Mechanismsr Indonesian civilian number plate. Testing shows that the ANPR system has been implemented successfully. Evaluation of the system gives a precision value of 1 and a recall value of 0.78. These values are obtained with hidden layer nodes of 75, 85, and 95. These number of hidden nodes delivers an F-score of 0.88 with the accuracy of 88%.
作者: Salivary-Gland    時間: 2025-3-29 20:04
Labeling Algorithm and Fully Connected Neural Network for Automated Number Plate Recognition Systemr Indonesian civilian number plate. Testing shows that the ANPR system has been implemented successfully. Evaluation of the system gives a precision value of 1 and a recall value of 0.78. These values are obtained with hidden layer nodes of 75, 85, and 95. These number of hidden nodes delivers an F-score of 0.88 with the accuracy of 88%.
作者: bile648    時間: 2025-3-30 02:26

作者: Essential    時間: 2025-3-30 04:51





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
民和| 米易县| 三原县| 西吉县| 新巴尔虎左旗| 织金县| 天长市| 广昌县| 秦皇岛市| 麦盖提县| 渭源县| 惠安县| 兴和县| 冕宁县| 阿图什市| 根河市| 淮北市| 拜城县| 东山县| 大兴区| 上蔡县| 建昌县| 老河口市| 西安市| 仁化县| 彭州市| 裕民县| 五寨县| 如东县| 灵川县| 湄潭县| 鄂州市| 凭祥市| 乐至县| 万山特区| 东兴市| 望城县| 邢台市| 金湖县| 吐鲁番市| 白朗县|