標題: Titlebook: Applied Computing and Information Technology; Roger Lee Book 2020 Springer Nature Switzerland AG 2020 Computational Intelligence.Applied C [打印本頁] 作者: Goiter 時間: 2025-3-21 19:17
書目名稱Applied Computing and Information Technology影響因子(影響力)
書目名稱Applied Computing and Information Technology影響因子(影響力)學科排名
書目名稱Applied Computing and Information Technology網(wǎng)絡公開度
書目名稱Applied Computing and Information Technology網(wǎng)絡公開度學科排名
書目名稱Applied Computing and Information Technology被引頻次
書目名稱Applied Computing and Information Technology被引頻次學科排名
書目名稱Applied Computing and Information Technology年度引用
書目名稱Applied Computing and Information Technology年度引用學科排名
書目名稱Applied Computing and Information Technology讀者反饋
書目名稱Applied Computing and Information Technology讀者反饋學科排名
作者: hypnogram 時間: 2025-3-21 22:06
Improvement of Data Sparsity and Scalability Problems in Collaborative Filtering Based Recommendatind more, the related technologies have also advanced. Among them, the technique, which analyzes customer preference information to measure similarity between customers or between items and recommends items based on it, is called the collaborative filtering. Since it has an advantage that the more am作者: Indelible 時間: 2025-3-22 02:47
A Study on the Methods for Establishing Security Information & Event Management,al control system and enterprises, what’s called cyber-hacking and cyber-attack on the cyber space like cyber war, for the sake of the nation and organization. Besides, APT (Advanced Persistent Threat) attack utilizing complex types of attack in order to attack a certain target brings about a tremen作者: 四牛在彎曲 時間: 2025-3-22 07:16 作者: coalition 時間: 2025-3-22 12:39
Real-Time Ultra-Wide Viewing Player for Spatial and Temporal Random Access,he problems concerning playing UWV video in terms of system resources and user preference. Users may be interested in a certain region or a particular time interval of the entire set of UWV images. In this case, decoding all images is a waste of system resources and requires a lot of computational t作者: obviate 時間: 2025-3-22 15:34 作者: Assignment 時間: 2025-3-22 18:20 作者: LURE 時間: 2025-3-23 00:26
Fall Detection of Elderly Persons by Action Recognition Using Data Augmentation and State Transitioction of falls requiring emergency treatment.?This paper proposes a method to acquire posture information of a person from a camera watching?over elderly people, and to recognize the behavior?of the person using Long Short Term Memory. The proposed method detects falls of elderly people automaticall作者: 弄污 時間: 2025-3-23 05:19
Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data, by this fraudulent act is severe as what happened to the Equifax data breach in 2017. Here cryptography and steganography are applied to secure identity data contained in the electronic Indonesian identity card (e-KTP). Cryptography has been used for decades to secure data in storage. Steganography作者: fender 時間: 2025-3-23 08:27
Labeling Algorithm and Fully Connected Neural Network for Automated Number Plate Recognition Systemof ANPR system such as vehicle parking, toll enforcement, and traffic management are already widely used but not in Indonesia today. In this paper, the Labeling algorithm and a fully connected neural network are used to create an ANPR system for vehicle parking management in Universitas Multimedia N作者: 委屈 時間: 2025-3-23 12:44 作者: GROG 時間: 2025-3-23 14:14
Transforming YAWL Workflows into Petri Nets,rful business workflow modeling languages that is capable of representing the essential business workflow patterns needed for the software driven workflow automation. However, to do the model checking of a workflow written in YAWL is merely automated and the exhaustive simulations of the YAWL would 作者: 致命 時間: 2025-3-23 19:26 作者: peak-flow 時間: 2025-3-24 00:30
978-3-030-25219-9Springer Nature Switzerland AG 2020作者: MOCK 時間: 2025-3-24 02:49 作者: 確認 時間: 2025-3-24 07:21 作者: 全國性 時間: 2025-3-24 10:40 作者: Mosaic 時間: 2025-3-24 18:28 作者: Carcinogenesis 時間: 2025-3-24 22:15
https://doi.org/10.1007/978-3-030-95746-9eled for the capacitive probes and TSVs with fabrication errors of a crack, a pin-hole, and a micro-void. The large probe can measure multiple TSVs, simultaneously. From the post-processing of the measured data, the capability of error detection is verified for error cognition, the size and the number of errors.作者: LEVER 時間: 2025-3-25 01:49 作者: 散步 時間: 2025-3-25 05:12 作者: recession 時間: 2025-3-25 08:47
https://doi.org/10.1007/978-3-030-95746-9al control system and enterprises, what’s called cyber-hacking and cyber-attack on the cyber space like cyber war, for the sake of the nation and organization. Besides, APT (Advanced Persistent Threat) attack utilizing complex types of attack in order to attack a certain target brings about a tremen作者: Merited 時間: 2025-3-25 11:39 作者: COMA 時間: 2025-3-25 15:48
https://doi.org/10.1007/978-3-030-95746-9he problems concerning playing UWV video in terms of system resources and user preference. Users may be interested in a certain region or a particular time interval of the entire set of UWV images. In this case, decoding all images is a waste of system resources and requires a lot of computational t作者: 帳單 時間: 2025-3-25 21:59
Frictional Behaviours and Mechanismsoice rate, gentle form and function, pitch tone, language habits, and gender. Human voices are a key element of human communication. In the era of the Fourth Industrial Revolution, the voices are the main means of communication between people and people, between humans and machines, machines and mac作者: 天然熱噴泉 時間: 2025-3-26 00:12 作者: TAG 時間: 2025-3-26 05:57 作者: 冒失 時間: 2025-3-26 10:04
Frictional Behaviours and Mechanisms by this fraudulent act is severe as what happened to the Equifax data breach in 2017. Here cryptography and steganography are applied to secure identity data contained in the electronic Indonesian identity card (e-KTP). Cryptography has been used for decades to secure data in storage. Steganography作者: Accede 時間: 2025-3-26 13:04
Frictional Behaviours and Mechanismsof ANPR system such as vehicle parking, toll enforcement, and traffic management are already widely used but not in Indonesia today. In this paper, the Labeling algorithm and a fully connected neural network are used to create an ANPR system for vehicle parking management in Universitas Multimedia N作者: Accede 時間: 2025-3-26 19:02
https://doi.org/10.1007/978-3-030-95746-9ng the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Po作者: Locale 時間: 2025-3-27 00:22
Seyedsina Moeinzadeh,Esmaiel Jabbari Ph.D.rful business workflow modeling languages that is capable of representing the essential business workflow patterns needed for the software driven workflow automation. However, to do the model checking of a workflow written in YAWL is merely automated and the exhaustive simulations of the YAWL would 作者: deceive 時間: 2025-3-27 03:16 作者: Melodrama 時間: 2025-3-27 08:47
https://doi.org/10.1007/978-3-030-95746-9ction to analyze a general system and application log-based event. As far as an effective security detection is concerned, strategies for a systemic preparation and execution to actively solve the security issue are necessary by utilizing enormous big data occurring throughout the enterprise IT infr作者: Chameleon 時間: 2025-3-27 10:23 作者: 撤退 時間: 2025-3-27 15:03 作者: alabaster 時間: 2025-3-27 19:11
Improvement of Data Sparsity and Scalability Problems in Collaborative Filtering Based Recommendatiimprove these limits have been continued, it is needed more practical studies. Therefore, this paper proposed the collaborative filtering technique that improves the limits of the collaborative filtering recommendation technique’s data sparsity and scalability through two-stage clustering. First, it作者: 分貝 時間: 2025-3-28 00:05 作者: Employee 時間: 2025-3-28 03:21 作者: 豐富 時間: 2025-3-28 07:39 作者: RACE 時間: 2025-3-28 12:49 作者: 磨碎 時間: 2025-3-28 14:50
1860-949X erence’s most promising papers were selected for this Springer (SCI) book and not the conference proceedings. We eagerly await the important contributions that we know these authors will make to the field of co978-3-030-25219-9978-3-030-25217-5Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: outskirts 時間: 2025-3-28 19:18
1860-949X Applied Computing and Information Technology ACIT 2019, heldThis book gathers the outcomes of the 7th International Conference on Applied Computing and Information Technology (ACIT 2019), which was held on May 29–31, 2019 in Honolulu, Hawaii. The aim of the conference was to bring together researche作者: 灌輸 時間: 2025-3-29 00:17 作者: 有害 時間: 2025-3-29 05:32
A Comparative Study of Using Bag-of-Words and Word-Embedding Attributes in the Spoiler Classificatiag of words could be due to its scalability. Between Word2Vec and FastText embeddings, the former was favorable when few out-of-vocabulary (OOV) words were present. Finally, although FastText was expected to be helpful with a large number of OOV words, its benefit was hardly seen for Thai language.作者: Microgram 時間: 2025-3-29 09:18
Fall Detection of Elderly Persons by Action Recognition Using Data Augmentation and State Transitioy using the result of action recognition. Since it is difficult to capture dangerous scenes such as fall of elderly people and to capture a lot of data, this paper proposes a new method that can create a large amount of data necessary for learning from a small amount of data.作者: ALOFT 時間: 2025-3-29 12:19
Transforming YAWL Workflows into Petri Nets,still be time-consuming. In this paper, we propose an alternative to transform a YAWL workflow into a corresponding Petri nets model. A set of mapping rules would be proposed to cope with the non well formed model of YAWL. The resulting Petri nets model of the YAWL workflows is correct and ready for model checking.作者: Cerebrovascular 時間: 2025-3-29 15:49
Frictional Behaviours and Mechanismsr Indonesian civilian number plate. Testing shows that the ANPR system has been implemented successfully. Evaluation of the system gives a precision value of 1 and a recall value of 0.78. These values are obtained with hidden layer nodes of 75, 85, and 95. These number of hidden nodes delivers an F-score of 0.88 with the accuracy of 88%.作者: Salivary-Gland 時間: 2025-3-29 20:04
Labeling Algorithm and Fully Connected Neural Network for Automated Number Plate Recognition Systemr Indonesian civilian number plate. Testing shows that the ANPR system has been implemented successfully. Evaluation of the system gives a precision value of 1 and a recall value of 0.78. These values are obtained with hidden layer nodes of 75, 85, and 95. These number of hidden nodes delivers an F-score of 0.88 with the accuracy of 88%.作者: bile648 時間: 2025-3-30 02:26 作者: Essential 時間: 2025-3-30 04:51