標題: Titlebook: Complex, Intelligent and Software Intensive Systems; Proceedings of the 1 Leonard Barolli,Kangbin Yim,Tomoya Enokido Conference proceedings [打印本頁] 作者: 初生 時間: 2025-3-21 20:09
書目名稱Complex, Intelligent and Software Intensive Systems影響因子(影響力)
書目名稱Complex, Intelligent and Software Intensive Systems影響因子(影響力)學科排名
書目名稱Complex, Intelligent and Software Intensive Systems網(wǎng)絡公開度
書目名稱Complex, Intelligent and Software Intensive Systems網(wǎng)絡公開度學科排名
書目名稱Complex, Intelligent and Software Intensive Systems被引頻次
書目名稱Complex, Intelligent and Software Intensive Systems被引頻次學科排名
書目名稱Complex, Intelligent and Software Intensive Systems年度引用
書目名稱Complex, Intelligent and Software Intensive Systems年度引用學科排名
書目名稱Complex, Intelligent and Software Intensive Systems讀者反饋
書目名稱Complex, Intelligent and Software Intensive Systems讀者反饋學科排名
作者: CARK 時間: 2025-3-21 22:42
Boom-Year Savings and Budgetary Forecastingn refers to the Top Management Team’s spirit and determination to achieve higher excellence professionally. While collective engagement is manifested in the form of cognitive engagement and affective engagement. Collective engagement is based on mutual reinforcement and help among members of the org作者: Torrid 時間: 2025-3-22 01:58
State Government Budget Stabilization the explanations generated by the AI system and the reasoning provided by the experts based on their expertise and experience. Our metric also evaluates the trust of the experts to include different groups of experts using our trust mechanism. Our metric can be easily adapted to any Interpretable A作者: Generator 時間: 2025-3-22 08:16 作者: intention 時間: 2025-3-22 12:26
State Government Budget Stabilization better life for all society. When we mention the medical or healthcare field, there has been much creative and vital research that promotes everyone’s life. Inflammatory Bowel Disease (IBD) is one of the most dangerous diseases that can cause millions of deaths every year. In this research, we woul作者: 畢業(yè)典禮 時間: 2025-3-22 13:28 作者: 畢業(yè)典禮 時間: 2025-3-22 19:45 作者: 大溝 時間: 2025-3-22 23:56
https://doi.org/10.1007/978-1-4614-6061-9high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous work, we implemented a simulation system to solve the node placement problem in WMNs considering Pa作者: 享樂主義者 時間: 2025-3-23 03:07 作者: Ligament 時間: 2025-3-23 06:03
Debt as a Countercyclical Fiscal Tooltraffic conditions and road congestion. The pandemic experience affecting the world with COVID-19 virus since 2020 has radically changed the citizens lives and their habits. Any sector, from sanitary to economics, had to adapt itself to a new approach to everyday-life. Mobility is included in such a作者: 民間傳說 時間: 2025-3-23 11:12 作者: 脫水 時間: 2025-3-23 17:55
Boom-Year Savings and Budgetary Forecastingreduce road congestion, traffic incidents, and environmental pollution. Due to the multiple security issues like single point of failure, data tampering, and false information dissemination, many researchers have proposed Blockchain (BC) based solutions to ensure data correctness and transparency in作者: Dungeon 時間: 2025-3-23 19:57
Boom-Year Savings and Budgetary Forecastingduced. Actual sensor data are sampled from running vehicles gathered to roadside edge computer. On the other hand, those meteorological mesh data are collected into the cloud computing from Meteorological Agency as open data. By integrating those actual data and the meteorological mesh data and appl作者: fibula 時間: 2025-3-23 22:48 作者: Chemotherapy 時間: 2025-3-24 05:45
State Government Budget Stabilizationel. Search services recommend relevant entities based on search trends. If the search engine recommends sufficient related entities, users will acquire adequate information of interest. This enhances user experience and for web service providers, increases the opportunity to attract users. In this s作者: obnoxious 時間: 2025-3-24 09:34
Debt as a Countercyclical Fiscal Toolt architecture as a model of fog computing. A mist system consists of a cloud, mist, and droplets. A conventional mist architecture is premised on boundary defense by a firewall (FW). The mist and droplets are protected by the FW. The cloud accesses the mist using network address translation travers作者: 譏笑 時間: 2025-3-24 14:22
Empirical Experience: an Overview,e issue of limited energy in WSNs, a mechanism of cluster head (CH) selection is also proposed. The nodes in a network are authenticated on the basis of credentials to prevent from malicious activities. The malicious nodes harm the network by providing false data to nodes. Therefore, a blockchain is作者: Fraudulent 時間: 2025-3-24 15:31
Complex, Intelligent and Software Intensive Systems978-3-030-79725-6Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: Mutter 時間: 2025-3-24 19:43
Leonard Barolli,Kangbin Yim,Tomoya EnokidoPresents recent research on complex, intelligent, and software intensive systems.Includes the proceedings of the 15th International Conference on Complex, Intelligent, and Software Intensive Systems, 作者: 發(fā)炎 時間: 2025-3-25 01:00
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/c/image/231618.jpg作者: FOR 時間: 2025-3-25 04:47
https://doi.org/10.1007/978-3-030-79725-6Intelligent Systems; Complex Systems; Artificial Intelligence; Bio-Inspired Computing; Data Mining; Optim作者: MILK 時間: 2025-3-25 08:55 作者: Heretical 時間: 2025-3-25 13:36 作者: Integrate 時間: 2025-3-25 16:49 作者: Conquest 時間: 2025-3-25 22:31 作者: myocardium 時間: 2025-3-26 01:32
State Government Budget Stabilizationsion reduction approach based on Recursive Feature Elimination combining with Random Forest to provide practical prediction tasks on metagenomic data. The relationship between bacteria causing IBD is what we have to figure out. Our goal is to evaluate whether we can make a more reliable prediction u作者: STANT 時間: 2025-3-26 06:39
https://doi.org/10.1007/978-1-4614-6061-9m training model to effectively improve its operating efficiency. The results of simulation experiment prove that in comparison to the unoptimized algorithm, the SPGOA-RF flight delay prediction accuracy rate could achieve to 89.17%.作者: 不能逃避 時間: 2025-3-26 09:57
https://doi.org/10.1007/978-1-4614-6061-9g training time, single machine mode processing could not meet the actual requirements. Combining logistic regression with CC-SOA, a new model LG-SOA is proposed. Finally, LG-CCSOA is distributed processing on Spark platform, Distributed computing is carried out on different nodes, and the final run作者: ligature 時間: 2025-3-26 15:02
Debt as a Countercyclical Fiscal Toolthat area can be source of crowd. In order to reduce this phenomenon, we perform a user profiling with the aim of reducing the probability that drivers are in the same place at the same time. We achieve the goal by computing a risk factor for any pair of vehicles populating the car parking.作者: 痛苦一生 時間: 2025-3-26 20:32
Boom-Year Savings and Budgetary Forecastinguncement scheme to enable secure and efficient announcement dissemination. We use IOTA Tangle to enable the benefits of BC on vehicular layer while reducing the storage and computational cost. We employ Elliptic Curve Cryptography based pseudonym update mechanism for hiding the real identities of ve作者: scotoma 時間: 2025-3-27 00:58
Conference proceedings 2021d adapt through internal and external dynamic interactions.?..The development of intelligent systems and agents, which is each time more characterized by the use of ontologies and their logical foundations build a fruitful impulse for both software intensive systems and complex systems. Recent resea作者: NATTY 時間: 2025-3-27 02:06
Four Grade Levels-Based Models with Random Forest for Student Performance Prediction at a Multidisce proposed method is validated on more than 4.5 million mark records of nearly 100,000 students at a multidisciplinary university in Vietnam. The experimental results show that the four Random Forest-based models give a positive average mean absolute error of 0.452 of Random Forest regression compar作者: AXIOM 時間: 2025-3-27 05:35 作者: commune 時間: 2025-3-27 10:30
Dimensionality Reduction on Metagenomic Data with Recursive Feature Elimination,sion reduction approach based on Recursive Feature Elimination combining with Random Forest to provide practical prediction tasks on metagenomic data. The relationship between bacteria causing IBD is what we have to figure out. Our goal is to evaluate whether we can make a more reliable prediction u作者: 新娘 時間: 2025-3-27 14:50
,The Application of Improved Grasshopper Optimization Algorithm to Flight Delay Prediction–Based on m training model to effectively improve its operating efficiency. The results of simulation experiment prove that in comparison to the unoptimized algorithm, the SPGOA-RF flight delay prediction accuracy rate could achieve to 89.17%.作者: 露天歷史劇 時間: 2025-3-27 21:14 作者: Gleason-score 時間: 2025-3-28 01:33
,COVID-Prevention-Based Parking with?Risk Factor Computation,that area can be source of crowd. In order to reduce this phenomenon, we perform a user profiling with the aim of reducing the probability that drivers are in the same place at the same time. We achieve the goal by computing a risk factor for any pair of vehicles populating the car parking.作者: 負擔 時間: 2025-3-28 05:26
A Privacy Preserving Hybrid Blockchain Based Announcement Scheme for Vehicular Energy Network,uncement scheme to enable secure and efficient announcement dissemination. We use IOTA Tangle to enable the benefits of BC on vehicular layer while reducing the storage and computational cost. We employ Elliptic Curve Cryptography based pseudonym update mechanism for hiding the real identities of ve作者: 厚顏無恥 時間: 2025-3-28 07:23 作者: 不斷的變動 時間: 2025-3-28 10:44 作者: Gobble 時間: 2025-3-28 16:50 作者: 純樸 時間: 2025-3-28 20:40 作者: Integrate 時間: 2025-3-29 02:37
Empirical Experience: an Overview,depletes rapidly due to extra workload. Therefore, the CH is replaced with the node that has the highest residual energy among all nodes. The simulation result shows the network lifetime increases after CH replacement. Moreover, it shows that he transaction cost is very low during authentication phase.作者: 索賠 時間: 2025-3-29 05:28
Related Entity Expansion and Ranking Using Knowledge Graph,system to the production environment and perform quantitative and qualitative estimation using A/B testing. Based on the results, we conclude that our method significantly enhances the impression based coverage of knowledge panels preventing a significant change in click-through rate.作者: sterilization 時間: 2025-3-29 09:26
,Blockchain Based Authentication for?End-Nodes and Efficient Cluster Head Selection in Wireless Sensdepletes rapidly due to extra workload. Therefore, the CH is replaced with the node that has the highest residual energy among all nodes. The simulation result shows the network lifetime increases after CH replacement. Moreover, it shows that he transaction cost is very low during authentication phase.作者: 刺耳 時間: 2025-3-29 13:52 作者: condemn 時間: 2025-3-29 19:30 作者: Monolithic 時間: 2025-3-29 22:35 作者: 熱心助人 時間: 2025-3-30 02:59 作者: Surgeon 時間: 2025-3-30 06:10 作者: 性上癮 時間: 2025-3-30 10:14
The Role of Collective Engagement to Strengthen Organizational Identity,ata were collected using a questionnaire and analyzed by using SmartPLS. The results showed that managerial motivation which comprises of Need of Achievement and Need of Growth will form collective engagement. This collective engagement strengthens organizational identity.作者: 遺產(chǎn) 時間: 2025-3-30 14:40
Performance Evaluation of WMNs by WMN-PSOSA-DGA Hybrid Simulation System Considering Stadium Distrie performance of WMNs by using the WMN-PSOSA-DGA hybrid simulation system considering the Stadium distribution of mesh clients. Simulation results show that 32 mesh routers are enough for maximizing the network connectivity and user coverage.作者: 生命 時間: 2025-3-30 20:06 作者: pantomime 時間: 2025-3-30 23:42
Coarse Traffic Classification for High-Bandwidth Connections in a Computer Network Using Deep Learny reduce the amount of traffic analyzed by IDS, and hence reduces the cost of purchasing and implementing security systems. The proposed model has been developed using the methodology OSEMN to work with data. The system can be used as the first step in the detection of threats and anomalies in systems with cascade security architecture.作者: Medicaid 時間: 2025-3-31 03:52 作者: Paraplegia 時間: 2025-3-31 08:05
Boom-Year Savings and Budgetary Forecastingying Kalman filter technology, temporal and spatial prediction of wide area road state can be realized and visualized on GIS viewer system. In this paper, the fundamental system configuration and both temporal and spatial prediction algorithms are discussed.作者: 無表情 時間: 2025-3-31 10:06
https://doi.org/10.1007/978-1-4614-6061-9and uniform distributions of mesh clients. In this paper, we evaluate performance of CCM-based HC system for different number of mesh routers and instances. For the simulation results, we found that the CCM-based HC system was able to cover more mesh clients for different instances compared with CCM.作者: lavish 時間: 2025-3-31 13:38
Debt as a Countercyclical Fiscal Toolal. However, in recent years, increasing numbers of organizations have adopted the zero trust architecture (ZTA). Additionally, the ZTA does not trust the inside of the FW. In this paper, we describe the mist architecture that realizes ZTA.作者: Cabg318 時間: 2025-3-31 19:31
Trustworthy Explainability Acceptance: A New Metric to Measure the Trustworthiness of InterpretableI system and be used in the standardization process of trustworthy AI systems. We illustrate the proposed metric using the high-stake medical AI application of Predicting Ductal Carcinoma in Situ (DCIS) Recurrence. Our metric successfully captures the explainability of AI systems in DCIS recurrence by experts.作者: Addictive 時間: 2025-3-31 21:41
Prediction of Wide Area Road State Using Measurement Sensor Data and Meteorological Mesh Data,ying Kalman filter technology, temporal and spatial prediction of wide area road state can be realized and visualized on GIS viewer system. In this paper, the fundamental system configuration and both temporal and spatial prediction algorithms are discussed.作者: adipose-tissue 時間: 2025-4-1 03:11
A Coverage Construction and Hill Climbing Approach for Mesh Router Placement Optimization: Simulatiand uniform distributions of mesh clients. In this paper, we evaluate performance of CCM-based HC system for different number of mesh routers and instances. For the simulation results, we found that the CCM-based HC system was able to cover more mesh clients for different instances compared with CCM.作者: 倒轉 時間: 2025-4-1 09:07 作者: 宇宙你 時間: 2025-4-1 13:25
2367-3370 ce on Complex, Intelligent, and Software Intensive Systems, .This book includes the proceedings of the 15th International Conference on Complex, Intelligent, and Software Intensive Systems, which took place in Asan, Korea, on July 1–3, 2021. Software intensive systems are systems, which heavily inte作者: Rebate 時間: 2025-4-1 17:14 作者: filicide 時間: 2025-4-1 19:16
The Role of Collective Engagement to Strengthen Organizational Identity,n refers to the Top Management Team’s spirit and determination to achieve higher excellence professionally. While collective engagement is manifested in the form of cognitive engagement and affective engagement. Collective engagement is based on mutual reinforcement and help among members of the org