派博傳思國際中心

標(biāo)題: Titlebook: Computational Intelligence in Pattern Recognition; Proceedings of CIPR Asit Kumar Das,Janmenjoy Nayak,Danilo Pelusi Conference proceedings [打印本頁]

作者: 適婚女孩    時間: 2025-3-21 18:09
書目名稱Computational Intelligence in Pattern Recognition影響因子(影響力)




書目名稱Computational Intelligence in Pattern Recognition影響因子(影響力)學(xué)科排名




書目名稱Computational Intelligence in Pattern Recognition網(wǎng)絡(luò)公開度




書目名稱Computational Intelligence in Pattern Recognition網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computational Intelligence in Pattern Recognition被引頻次




書目名稱Computational Intelligence in Pattern Recognition被引頻次學(xué)科排名




書目名稱Computational Intelligence in Pattern Recognition年度引用




書目名稱Computational Intelligence in Pattern Recognition年度引用學(xué)科排名




書目名稱Computational Intelligence in Pattern Recognition讀者反饋




書目名稱Computational Intelligence in Pattern Recognition讀者反饋學(xué)科排名





作者: Leisureliness    時間: 2025-3-21 21:37

作者: 輕打    時間: 2025-3-22 01:23

作者: Habituate    時間: 2025-3-22 06:59

作者: 不出名    時間: 2025-3-22 11:43

作者: 愛哭    時間: 2025-3-22 15:04
Performance Analysis of Hybrid Filter Using PI and PI-Fuzzy Based UVTG Technique, controller to improve the power quality. The proposed conditioner consists of a low pass filter and a shunt active power filter. Low pass filter is used to mitigate higher order harmonics and the shunt active filter is used to mitigate lower order harmonics. The switching action of the shunt part o
作者: 愛哭    時間: 2025-3-22 19:45
,Transmission of?Aggregated Data in?LOADng-Based IoT Networks,ant number of packets must be sent over a low-power and lossy network (LLN) with multiple nodes, energy is quickly depleted. Each sensor’s energy usage has a direct impact on the network’s operational lifespan. In traditional sensor networks, only cluster-heads (CHs) based data aggregation approach
作者: 變形詞    時間: 2025-3-23 00:12
Deep Learning Based Facial Mask Detection Using Mobilenetv2,e masks. This research paper introduces face mask detection that authorities can use to reduce and prevent COVID-19. The face mask recognition process in this research paper is done with a deep learning algorithm and image processing done using MobileNetV2. Steps to build the model are data collecti
作者: 共同給與    時間: 2025-3-23 03:26

作者: ASSET    時間: 2025-3-23 08:40

作者: Coronation    時間: 2025-3-23 12:26

作者: Autobiography    時間: 2025-3-23 14:27

作者: perjury    時間: 2025-3-23 21:48
,Identification of?Lung Cancer Nodules from?CT Images Using 2D Convolutional Neural Networks,oach is to introduce computer-aided-diagnosis systems. Recently, deep learning approaches have outperformed other classification methods. In this paper, we use 2D convolutional neural networks to detect malignant nodules from CT scan images. We use modified . for the identification of lung cancer. .
作者: infatuation    時間: 2025-3-24 02:09
A Pixel Dependent Adaptive Gamma Correction Based Image Enhancement Technique,lgorithms to increase colour accuracy, which have a number of drawbacks. This paper aims to formulate a novel approach to contrast correct through the use of indigenous pixel values of each individual channel. Allowing the gamma correction algorithm to have a larger pixel dependant intercept aids in
作者: 錢財    時間: 2025-3-24 04:14

作者: sebaceous-gland    時間: 2025-3-24 08:58
TextUnet: Text Segmentation Using U-net,aning to the images they are extracted from. Text extraction from images comprises of three steps: Text Localization, Text Segmentation and Text Recognition. The intermediary step - text segmentation - plays a key role in determining the efficiency of the entire process as the quality of segmentatio
作者: staging    時間: 2025-3-24 11:32
A Survey on Prediction of Heart Disease Using Machine Intelligence Techniques,s the need of the hour in healthcare industry which can address and learn all the major causes of heart related issues before its actual occurrence. Therefore, accurate and quick prediction of HD is necessary in order to reduce the mortality rate. There are lots of risk factors associated with HD. T
作者: Dealing    時間: 2025-3-24 15:57

作者: 得意人    時間: 2025-3-24 22:57
Impact of Security in Blockchain Based Real Time Applications,me highly secure cryptographic techniques as well as intrusion detection systems emerged to solve such issues. Because of centralization many of the time it has been recorded that intrusion within the system occurred and people bears huge loss of financial and confidential data. In this paper, it is
作者: Amplify    時間: 2025-3-25 00:59
Conference proceedings 2022binatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments..
作者: 發(fā)展    時間: 2025-3-25 04:06
The Role of Hypoxia in Radiation Response, of time is taken to carry out these tests and prediction of COVID 19 is done. The purpose of this work is to propose a model based on CNN and finding out the best fit segmentation algorithm to apply to the chest X-ray scans in order to predict the test result. Most importantly the result is instantaneous.
作者: Hypopnea    時間: 2025-3-25 09:59

作者: convert    時間: 2025-3-25 11:54
Wettbewerbsmatrix (M. E. Porter)rt Vector Machine (SVM) and Artificial Neural Network (ANN). The results show that DT classifier based scheme gives accuracy of 100% with training and testing time of 9.0088?ms and 2.7592?ms respectively and hence can be used as a secure IDM.
作者: 浪費物質(zhì)    時間: 2025-3-25 18:42
Strategiewerkzeuge aus der PraxisGamma Correction (PAGC) methodology. With our suggested strategy, we gained absolute supremacy in the entropy score as well as the colourfulness measure over standard gamma correction and histogram equalisation contrast-adjustment techniques.
作者: 說不出    時間: 2025-3-25 20:33

作者: Indent    時間: 2025-3-26 02:33

作者: Galactogogue    時間: 2025-3-26 07:35
Perceptive Analysis of Chronic Kidney Disease Data Through Conceptual Visualization,lection algorithms. The results of the perceptive analysis, viz., observed data during imputation and detection of outliers i.e., skewness, threshold values, p-value and other statistical reports are presented. Classifier models have been built after perceptive analysis and the CKD stage prediction results are also reported.
作者: 不如屎殼郎    時間: 2025-3-26 10:28

作者: 杠桿    時間: 2025-3-26 14:17

作者: irreparable    時間: 2025-3-26 18:18
TextUnet: Text Segmentation Using U-net,ital images preprocessed in four different ways - dithering, binarization, edge enhancement and conversion to greyscale. We have also developed a model that outperforms the current topper of the ICDAR 2011 Robust Reading Competition’s Text Segmentation leader board and has an F-score of 83.90% and accuracy of 97.42%.
作者: Infuriate    時間: 2025-3-26 21:43

作者: kindred    時間: 2025-3-27 04:27
More Resilient with Mars or Mary?d to generate the reference signal and after that, PI controller is combined with fuzzy logic controller along with unit vector template generator (UVTG) is used to achieve accurate refence signals for proper operation of the voltage source inverter. The effectiveness the single and combined controller is verified through simulation.
作者: 最有利    時間: 2025-3-27 06:01
Strategisches Frühwarninformationssystemily available. It is based on assigning scores to sentences in the transcripts and selecting the ones with highest scores. Then from the original video, segments corresponding to the selected sentences are extracted and merged to obtain the final summary.
作者: 長矛    時間: 2025-3-27 10:05

作者: deactivate    時間: 2025-3-27 14:50

作者: 方便    時間: 2025-3-27 20:35

作者: cushion    時間: 2025-3-27 23:58
Vehicle Number Plate Recognition System,mber plates make use of infrared lighting to capture at any time of day. Flashes are also used to ensure the accurate capturing of number plates. This work implements vehicle number plate recognition in matlab.
作者: Adulterate    時間: 2025-3-28 03:16

作者: fender    時間: 2025-3-28 09:18

作者: fatty-acids    時間: 2025-3-28 14:04
A Survey on Prediction of Heart Disease Using Machine Intelligence Techniques,telligence techniques, the improvement achieved, the tools used and the challenges faced while thoroughly studying the literature survey. This study helps the researchers for their future study by providing brief knowledge on various existing HD prediction system based on different techniques.
作者: 昆蟲    時間: 2025-3-28 16:07

作者: 痛打    時間: 2025-3-28 21:36
Impact of Security in Blockchain Based Real Time Applications,presents how this technology is working on a mechanism through which they may distribute control and decision power among the entities within the blockchain network. In this paper, it has also been presented that data hacking for hackers may not be impossible but it will surely not be effortless to do.
作者: 出汗    時間: 2025-3-28 23:04

作者: 染色體    時間: 2025-3-29 03:49
,Identification of?Lung Cancer Nodules from?CT Images Using 2D Convolutional Neural Networks, dataset is used to train and evaluate the proposed method, and experimental results show encouraging identification performance of the proposed method. We also compare the performance of the proposed method with the existing 2D CNN methods.
作者: Offstage    時間: 2025-3-29 07:34
Conference proceedings 2022IPR 2022), held at Indian Institute of Engineering Science and Technology, Shibpur, Howrah, West Bengal, India, during 23 – 24 April 2022. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and
作者: jocular    時間: 2025-3-29 11:49

作者: Camouflage    時間: 2025-3-29 19:13
https://doi.org/10.1007/978-3-658-29059-7in the summarised file of a given day, the count of that topic is increased on every successful match of the search. The graphs for the counts of all the themes for each day were then plotted. To identify patterns, seven-day moving average graphs are drawn for each topic.
作者: cardiopulmonary    時間: 2025-3-29 21:47
Martin Endress,Lukas Clemens,Benjamin Rampped layers on the collected facial embeddings of FACENET. The proposed Haar-Cascade FACENET Fully Connected Face Authentication (HFFCFA) model eliminates the faults which occur in the Euclidean-based approach, thus reducing false positive and false negative cases. The network model works perfectly to
作者: pellagra    時間: 2025-3-30 00:15
https://doi.org/10.1007/978-3-658-29059-7tered by the user is processed with the pivotal implementation of NLP. After DiagZone has gathered adequate keywords from the original messages, it will start to lead the conversation by interrogating the user and trying to list a few diseases that the user may suffer from. Once the Chatbot has dete
作者: PALMY    時間: 2025-3-30 05:40
Grundlagen der Strategietransformation,on each sensor node, discarding duplicate data and updating route lifetime. Performance of the proposed technique is evaluated and also compared with the traditional approach based on various parameters such as packet loss, end-to-end delay, energy consumption, jitter and round-trip time. Results sh
作者: antecedence    時間: 2025-3-30 12:17
Instrumente der Strategietransformation, as per our chosen country and type of cases like total cases, total deaths etc. Such systems are already available, but the efficiency of the available mask detection systems was not achieved thoroughly. This newly developed system proposes to take a step further, which recognizes more than one per
作者: STENT    時間: 2025-3-30 14:46
https://doi.org/10.1007/978-3-658-42394-0n platform was used to simulate and train the different ML algorithms on the available dataset. In the present case study, Logistic Regression delivered the best theft-detection accuracy of 100%, followed by Decision Tree, SVM and ANN each offering 96% recognition accuracy on the test data.
作者: cavity    時間: 2025-3-30 17:07

作者: 過濾    時間: 2025-3-30 22:03

作者: 反抗者    時間: 2025-3-31 03:40

作者: ELATE    時間: 2025-3-31 06:36
,Low-Computation IoT System Framework for?Face Recognition Using Deep Learning Algorithm,ed layers on the collected facial embeddings of FACENET. The proposed Haar-Cascade FACENET Fully Connected Face Authentication (HFFCFA) model eliminates the faults which occur in the Euclidean-based approach, thus reducing false positive and false negative cases. The network model works perfectly to




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
武功县| 岢岚县| 濉溪县| 余姚市| 青川县| 榆社县| 通渭县| 田东县| 祁门县| 玛纳斯县| 包头市| 白河县| 天柱县| 连平县| 乐亭县| 同仁县| 龙门县| 阿坝| 潍坊市| 大化| 九寨沟县| 乌恰县| 汶上县| 江川县| 沛县| 改则县| 湟中县| 贵定县| 广南县| 龙胜| 奉节县| 襄垣县| 乌拉特中旗| 安庆市| 大洼县| 晋江市| 龙胜| 开江县| 精河县| 六枝特区| 榕江县|