標(biāo)題: Titlebook: CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI); Advances and Applica Marcelo V. Garcia,C [打印本頁] 作者: 討論小組 時(shí)間: 2025-3-21 20:01
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)影響因子(影響力)
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)影響因子(影響力)學(xué)科排名
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)網(wǎng)絡(luò)公開度
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)被引頻次
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)被引頻次學(xué)科排名
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)年度引用
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)年度引用學(xué)科排名
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)讀者反饋
書目名稱CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)讀者反饋學(xué)科排名
作者: 能量守恒 時(shí)間: 2025-3-21 21:06 作者: MAPLE 時(shí)間: 2025-3-22 02:46 作者: 軍火 時(shí)間: 2025-3-22 05:03 作者: 清楚說話 時(shí)間: 2025-3-22 12:19 作者: 鑲嵌細(xì)工 時(shí)間: 2025-3-22 14:09
Multi-agent Architecture for?Passive Rootkit Detection with?Data Enrichmentand aggregation of information to generate threat intelligence, while maintaining high performance. The results show the possibility of aggregating information to data flows used by rootkits in order to have effective cyber defense actions against cybernetic threats without major impacts on the existing network infrastructure.作者: 鑲嵌細(xì)工 時(shí)間: 2025-3-22 19:40 作者: gimmick 時(shí)間: 2025-3-22 22:26 作者: Ccu106 時(shí)間: 2025-3-23 02:20
2367-3370 se of metaheuristic for non-deterministic problem solutions..This book provides insights into the 5th Edition of the Proceedings of the Conference on Computer Science, Electronics, and Industrial Engineering (CSEI 2022) held in Ambato, Ecuador. This event brings together researchers, students, and p作者: 隱士 時(shí)間: 2025-3-23 06:43
PCAnEn - Hindcasting with?Analogue Ensembles of?Principal Componentsrors in the prediction of some meteorological variables by 30% and, at the same time, decreased the prediction time by 48%. It was also verified that our implementation of this methodology in MATLAB is around two times faster than in R.作者: hemorrhage 時(shí)間: 2025-3-23 11:04 作者: Vasodilation 時(shí)間: 2025-3-23 17:52
Conference proceedings 2023overed by the event are smart trends for industrial applications, the Internet of things (IoT), control and automation engineering, computer science, and health informatics. The book is helpful for active researchers and practitioners in the field..作者: resuscitation 時(shí)間: 2025-3-23 21:34 作者: 揮舞 時(shí)間: 2025-3-23 23:30
Interdisciplinary Systems Researchrors in the prediction of some meteorological variables by 30% and, at the same time, decreased the prediction time by 48%. It was also verified that our implementation of this methodology in MATLAB is around two times faster than in R.作者: 攤位 時(shí)間: 2025-3-24 03:53
https://doi.org/10.1007/978-3-662-58186-5 by the theory of optimal control. The original problem is discretized into a constrained optimization problem. The solution of this problem by two alternative numerical optimization methods shows that the strategy is feasible and leads to optimal or quasi-optimal solutions.作者: 心胸狹窄 時(shí)間: 2025-3-24 08:44 作者: inundate 時(shí)間: 2025-3-24 14:12
Advances in Numerical Mathematicstor skills, an increase of 70% on the success level was attained while the cognitive skills showed a 35% increase on the level of success. These positive results corroborate that the proposed study is an efficient tool for improving the cognitive and gross motor skills in 4–5-year-old children.作者: Feedback 時(shí)間: 2025-3-24 18:55
OSINT Methods in?the?Intelligence Cycleo the type of information. This paper makes a comparative study of the intelligence cycles of some relevant actors in the international OSINT scene, locates open-source collection in the intelligence cycle, and presents a workflow that combines this cycle with the techniques that form a method for OSINT.作者: BRAND 時(shí)間: 2025-3-24 19:55
Kinect-Enabled Electronic Game for?Developing Cognitive and?Gross Motor Skills in?4-5-Year-Old Childtor skills, an increase of 70% on the success level was attained while the cognitive skills showed a 35% increase on the level of success. These positive results corroborate that the proposed study is an efficient tool for improving the cognitive and gross motor skills in 4–5-year-old children.作者: 圍裙 時(shí)間: 2025-3-24 23:12 作者: Canyon 時(shí)間: 2025-3-25 07:05
Methodology for?Cyber Threat Intelligence with?Sensor Integrationt Intelligence consists of collecting, classifying, enriching, classifying data, and producing knowledge about threats in network defense systems. In this scenario, we find network Intrusion Detection Systems that specifically analyze network traffic and through signatures detect anomalies, generati作者: 嘮叨 時(shí)間: 2025-3-25 07:49 作者: Hirsutism 時(shí)間: 2025-3-25 12:29
OSINT Methods in?the?Intelligence Cycleracterized by the application of a set of disciplines to obtain information that will be analyzed for the production of an intelligence product. These disciplines are characterized according to the type of source, its methods and techniques. Open-Source Intelligence (OSINT) is the collection discipl作者: 摘要 時(shí)間: 2025-3-25 17:04 作者: 牛的細(xì)微差別 時(shí)間: 2025-3-25 23:10 作者: 傻 時(shí)間: 2025-3-26 00:08
Methodology to?Improve the?Quality of?Cyber Threat Intelligence Production Through Open Source Platftial attacks. Traditional security approaches are not able to contain the dynamic nature of new techniques and threats, which are increasingly resilient and complex. In this scenario, the sharing of threat intelligence is growing. However, the vast majority of data is shared in the form of unstructu作者: Inveterate 時(shí)間: 2025-3-26 05:24 作者: HAWK 時(shí)間: 2025-3-26 08:47 作者: 暗語 時(shí)間: 2025-3-26 16:22 作者: 單調(diào)女 時(shí)間: 2025-3-26 20:51 作者: 小口啜飲 時(shí)間: 2025-3-26 23:27
Optimizing User Information Value in a Web Search Through the Whittle Indexmizing the value of information presented in an electronic device to users who seek information on the web and whose attention is a priori limited and considered as a scarce and valuable resource. The optimization problem is posed as a dynamic and stochastic prioritization problem and is modeled as 作者: kyphoplasty 時(shí)間: 2025-3-27 01:59 作者: expository 時(shí)間: 2025-3-27 07:44
Prediction Models for?Car Theft Detection Using CCTV Cameras and?Machine Learning: A Systematic Revian resources that are required. Therefore, the task of checking closed circuit television (CCTV) cameras can be automated using machine learning techniques. The implementation of such a system would mean an optimization of the current technology. Even if a CCTV camera is installed, it requires human作者: Console 時(shí)間: 2025-3-27 12:21 作者: perpetual 時(shí)間: 2025-3-27 14:11
Home Automation System for?People with?Limited Upper Limb Capabilities Using Artificial Intelligencen communicate through hand gestures or facial gestures, among others. However, selecting the features and patterns that separate one gesture from another is not a trivial problem. In this sense, we propose a real-time domotic system (DS) that works with three subsystems. The first subsystem recogniz作者: Trigger-Point 時(shí)間: 2025-3-27 21:15
CSEI: International Conference on Computer Science, Electronics and Industrial Engineering (CSEI)Advances and Applica作者: COM 時(shí)間: 2025-3-28 00:10 作者: creatine-kinase 時(shí)間: 2025-3-28 03:29
https://doi.org/10.1007/978-3-642-57910-3Ambato were analyzed and quantified somatically. Within the results it is evident that political communication in social networks is not strategic, there is an excess of information that saturates the social network and lacks content of value to the citizen. Finally, it is concluded that political c作者: Instinctive 時(shí)間: 2025-3-28 06:44 作者: Daily-Value 時(shí)間: 2025-3-28 14:25 作者: anthropologist 時(shí)間: 2025-3-28 14:44
Klassische atomistische Simulationenat intelligence has a positive impact on incident response time. In this work we propose an Indicator of Compromise enrichment process to improve the quality of CTI, based on the intelligence production cycle, we conduct research to define metrics capable of evaluating the CTI produced through open 作者: 藝術(shù) 時(shí)間: 2025-3-28 20:07
Numerische Methoden in der Technikulations, however, the SRI website presents least problems and the GADMA website presents the most accessibility problems, In a cross-sectional analysis, it was determined that the Operable principle is the one that presents the most problems in all websites, in its criterion 2.4.4 Purpose of the li作者: 改變立場(chǎng) 時(shí)間: 2025-3-28 23:20
Interpolation und Approximation,, poor location of the business, products/services that do not meet the needs, high costs of ICT, lack of skills in the entrepreneurial team, external and competitive pressure, few benefits perceived ICT use, low resources, low government support.作者: 殺蟲劑 時(shí)間: 2025-3-29 04:21
Optimierungsaufgaben und Optimiermethoden,ble ways to implement the proposed automatic solution. This scientific study retrieved 384 articles from Web of Science, Scopus, and IEEE databases. The number of studies used to answer the research questions was 58. Finally, analyzing the most frequent models and metrics, Convolutional Neural Netwo作者: Fierce 時(shí)間: 2025-3-29 07:37
https://doi.org/10.1007/978-3-662-58186-5rvations, giving an accuracy rate of 92.759%. Additionally, the DS was tested online with 1500 observations from 10 users whose persons were not part of the input dataset or model testing. Online testing gives an accuracy rate of 84.07%. Once the hand gesture is recognized, it is sent wireless to an作者: 拖網(wǎng) 時(shí)間: 2025-3-29 15:12
QR Codes as?a?Strategy in?Political Marketing 2.0Ambato were analyzed and quantified somatically. Within the results it is evident that political communication in social networks is not strategic, there is an excess of information that saturates the social network and lacks content of value to the citizen. Finally, it is concluded that political c作者: fodlder 時(shí)間: 2025-3-29 18:33 作者: Accolade 時(shí)間: 2025-3-29 19:54 作者: 殘酷的地方 時(shí)間: 2025-3-30 00:33
Methodology to?Improve the?Quality of?Cyber Threat Intelligence Production Through Open Source Platfat intelligence has a positive impact on incident response time. In this work we propose an Indicator of Compromise enrichment process to improve the quality of CTI, based on the intelligence production cycle, we conduct research to define metrics capable of evaluating the CTI produced through open 作者: SPECT 時(shí)間: 2025-3-30 05:29
Evaluation of?Web Accessibility in?the?State Citizen Service Portals Most Used by?Disabled Peopleulations, however, the SRI website presents least problems and the GADMA website presents the most accessibility problems, In a cross-sectional analysis, it was determined that the Operable principle is the one that presents the most problems in all websites, in its criterion 2.4.4 Purpose of the li作者: 催眠 時(shí)間: 2025-3-30 09:19 作者: AGONY 時(shí)間: 2025-3-30 16:28
Prediction Models for?Car Theft Detection Using CCTV Cameras and?Machine Learning: A Systematic Revible ways to implement the proposed automatic solution. This scientific study retrieved 384 articles from Web of Science, Scopus, and IEEE databases. The number of studies used to answer the research questions was 58. Finally, analyzing the most frequent models and metrics, Convolutional Neural Netwo作者: 能夠支付 時(shí)間: 2025-3-30 18:41
Home Automation System for?People with?Limited Upper Limb Capabilities Using Artificial Intelligencervations, giving an accuracy rate of 92.759%. Additionally, the DS was tested online with 1500 observations from 10 users whose persons were not part of the input dataset or model testing. Online testing gives an accuracy rate of 84.07%. Once the hand gesture is recognized, it is sent wireless to an作者: 倔強(qiáng)一點(diǎn) 時(shí)間: 2025-3-30 21:11
Marcelo V. Garcia,Carlos Gordón-GallegosCovers proceedings of the Conference on Computer Science, Electronics, and Industrial Engineering (CSEI 2022).Discusses topics such as the use of metaheuristic for non-deterministic problem solutions.作者: 代理人 時(shí)間: 2025-3-31 00:58
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/c/image/220579.jpg作者: diathermy 時(shí)間: 2025-3-31 06:53