標(biāo)題: Titlebook: Computational Intelligence in Pattern Recognition; Proceedings of CIPR Asit Kumar Das,Janmenjoy Nayak,Danilo Pelusi Conference proceedings [打印本頁] 作者: 適婚女孩 時間: 2025-3-21 18:09
書目名稱Computational Intelligence in Pattern Recognition影響因子(影響力)
書目名稱Computational Intelligence in Pattern Recognition影響因子(影響力)學(xué)科排名
書目名稱Computational Intelligence in Pattern Recognition網(wǎng)絡(luò)公開度
書目名稱Computational Intelligence in Pattern Recognition網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Intelligence in Pattern Recognition被引頻次
書目名稱Computational Intelligence in Pattern Recognition被引頻次學(xué)科排名
書目名稱Computational Intelligence in Pattern Recognition年度引用
書目名稱Computational Intelligence in Pattern Recognition年度引用學(xué)科排名
書目名稱Computational Intelligence in Pattern Recognition讀者反饋
書目名稱Computational Intelligence in Pattern Recognition讀者反饋學(xué)科排名
作者: Leisureliness 時間: 2025-3-21 21:37 作者: 輕打 時間: 2025-3-22 01:23 作者: Habituate 時間: 2025-3-22 06:59 作者: 不出名 時間: 2025-3-22 11:43 作者: 愛哭 時間: 2025-3-22 15:04
Performance Analysis of Hybrid Filter Using PI and PI-Fuzzy Based UVTG Technique, controller to improve the power quality. The proposed conditioner consists of a low pass filter and a shunt active power filter. Low pass filter is used to mitigate higher order harmonics and the shunt active filter is used to mitigate lower order harmonics. The switching action of the shunt part o作者: 愛哭 時間: 2025-3-22 19:45
,Transmission of?Aggregated Data in?LOADng-Based IoT Networks,ant number of packets must be sent over a low-power and lossy network (LLN) with multiple nodes, energy is quickly depleted. Each sensor’s energy usage has a direct impact on the network’s operational lifespan. In traditional sensor networks, only cluster-heads (CHs) based data aggregation approach 作者: 變形詞 時間: 2025-3-23 00:12
Deep Learning Based Facial Mask Detection Using Mobilenetv2,e masks. This research paper introduces face mask detection that authorities can use to reduce and prevent COVID-19. The face mask recognition process in this research paper is done with a deep learning algorithm and image processing done using MobileNetV2. Steps to build the model are data collecti作者: 共同給與 時間: 2025-3-23 03:26 作者: ASSET 時間: 2025-3-23 08:40 作者: Coronation 時間: 2025-3-23 12:26 作者: Autobiography 時間: 2025-3-23 14:27 作者: perjury 時間: 2025-3-23 21:48
,Identification of?Lung Cancer Nodules from?CT Images Using 2D Convolutional Neural Networks,oach is to introduce computer-aided-diagnosis systems. Recently, deep learning approaches have outperformed other classification methods. In this paper, we use 2D convolutional neural networks to detect malignant nodules from CT scan images. We use modified . for the identification of lung cancer. .作者: infatuation 時間: 2025-3-24 02:09
A Pixel Dependent Adaptive Gamma Correction Based Image Enhancement Technique,lgorithms to increase colour accuracy, which have a number of drawbacks. This paper aims to formulate a novel approach to contrast correct through the use of indigenous pixel values of each individual channel. Allowing the gamma correction algorithm to have a larger pixel dependant intercept aids in作者: 錢財 時間: 2025-3-24 04:14 作者: sebaceous-gland 時間: 2025-3-24 08:58
TextUnet: Text Segmentation Using U-net,aning to the images they are extracted from. Text extraction from images comprises of three steps: Text Localization, Text Segmentation and Text Recognition. The intermediary step - text segmentation - plays a key role in determining the efficiency of the entire process as the quality of segmentatio作者: staging 時間: 2025-3-24 11:32
A Survey on Prediction of Heart Disease Using Machine Intelligence Techniques,s the need of the hour in healthcare industry which can address and learn all the major causes of heart related issues before its actual occurrence. Therefore, accurate and quick prediction of HD is necessary in order to reduce the mortality rate. There are lots of risk factors associated with HD. T作者: Dealing 時間: 2025-3-24 15:57 作者: 得意人 時間: 2025-3-24 22:57
Impact of Security in Blockchain Based Real Time Applications,me highly secure cryptographic techniques as well as intrusion detection systems emerged to solve such issues. Because of centralization many of the time it has been recorded that intrusion within the system occurred and people bears huge loss of financial and confidential data. In this paper, it is作者: Amplify 時間: 2025-3-25 00:59
Conference proceedings 2022binatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments..作者: 發(fā)展 時間: 2025-3-25 04:06
The Role of Hypoxia in Radiation Response, of time is taken to carry out these tests and prediction of COVID 19 is done. The purpose of this work is to propose a model based on CNN and finding out the best fit segmentation algorithm to apply to the chest X-ray scans in order to predict the test result. Most importantly the result is instantaneous.作者: Hypopnea 時間: 2025-3-25 09:59 作者: convert 時間: 2025-3-25 11:54
Wettbewerbsmatrix (M. E. Porter)rt Vector Machine (SVM) and Artificial Neural Network (ANN). The results show that DT classifier based scheme gives accuracy of 100% with training and testing time of 9.0088?ms and 2.7592?ms respectively and hence can be used as a secure IDM.作者: 浪費物質(zhì) 時間: 2025-3-25 18:42
Strategiewerkzeuge aus der PraxisGamma Correction (PAGC) methodology. With our suggested strategy, we gained absolute supremacy in the entropy score as well as the colourfulness measure over standard gamma correction and histogram equalisation contrast-adjustment techniques.作者: 說不出 時間: 2025-3-25 20:33 作者: Indent 時間: 2025-3-26 02:33 作者: Galactogogue 時間: 2025-3-26 07:35
Perceptive Analysis of Chronic Kidney Disease Data Through Conceptual Visualization,lection algorithms. The results of the perceptive analysis, viz., observed data during imputation and detection of outliers i.e., skewness, threshold values, p-value and other statistical reports are presented. Classifier models have been built after perceptive analysis and the CKD stage prediction results are also reported.作者: 不如屎殼郎 時間: 2025-3-26 10:28 作者: 杠桿 時間: 2025-3-26 14:17 作者: irreparable 時間: 2025-3-26 18:18
TextUnet: Text Segmentation Using U-net,ital images preprocessed in four different ways - dithering, binarization, edge enhancement and conversion to greyscale. We have also developed a model that outperforms the current topper of the ICDAR 2011 Robust Reading Competition’s Text Segmentation leader board and has an F-score of 83.90% and accuracy of 97.42%.作者: Infuriate 時間: 2025-3-26 21:43 作者: kindred 時間: 2025-3-27 04:27
More Resilient with Mars or Mary?d to generate the reference signal and after that, PI controller is combined with fuzzy logic controller along with unit vector template generator (UVTG) is used to achieve accurate refence signals for proper operation of the voltage source inverter. The effectiveness the single and combined controller is verified through simulation.作者: 最有利 時間: 2025-3-27 06:01
Strategisches Frühwarninformationssystemily available. It is based on assigning scores to sentences in the transcripts and selecting the ones with highest scores. Then from the original video, segments corresponding to the selected sentences are extracted and merged to obtain the final summary.作者: 長矛 時間: 2025-3-27 10:05 作者: deactivate 時間: 2025-3-27 14:50 作者: 方便 時間: 2025-3-27 20:35 作者: cushion 時間: 2025-3-27 23:58
Vehicle Number Plate Recognition System,mber plates make use of infrared lighting to capture at any time of day. Flashes are also used to ensure the accurate capturing of number plates. This work implements vehicle number plate recognition in matlab.作者: Adulterate 時間: 2025-3-28 03:16 作者: fender 時間: 2025-3-28 09:18 作者: fatty-acids 時間: 2025-3-28 14:04
A Survey on Prediction of Heart Disease Using Machine Intelligence Techniques,telligence techniques, the improvement achieved, the tools used and the challenges faced while thoroughly studying the literature survey. This study helps the researchers for their future study by providing brief knowledge on various existing HD prediction system based on different techniques.作者: 昆蟲 時間: 2025-3-28 16:07 作者: 痛打 時間: 2025-3-28 21:36
Impact of Security in Blockchain Based Real Time Applications,presents how this technology is working on a mechanism through which they may distribute control and decision power among the entities within the blockchain network. In this paper, it has also been presented that data hacking for hackers may not be impossible but it will surely not be effortless to do.作者: 出汗 時間: 2025-3-28 23:04 作者: 染色體 時間: 2025-3-29 03:49
,Identification of?Lung Cancer Nodules from?CT Images Using 2D Convolutional Neural Networks, dataset is used to train and evaluate the proposed method, and experimental results show encouraging identification performance of the proposed method. We also compare the performance of the proposed method with the existing 2D CNN methods.作者: Offstage 時間: 2025-3-29 07:34
Conference proceedings 2022IPR 2022), held at Indian Institute of Engineering Science and Technology, Shibpur, Howrah, West Bengal, India, during 23 – 24 April 2022. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and 作者: jocular 時間: 2025-3-29 11:49 作者: Camouflage 時間: 2025-3-29 19:13
https://doi.org/10.1007/978-3-658-29059-7in the summarised file of a given day, the count of that topic is increased on every successful match of the search. The graphs for the counts of all the themes for each day were then plotted. To identify patterns, seven-day moving average graphs are drawn for each topic.作者: cardiopulmonary 時間: 2025-3-29 21:47
Martin Endress,Lukas Clemens,Benjamin Rampped layers on the collected facial embeddings of FACENET. The proposed Haar-Cascade FACENET Fully Connected Face Authentication (HFFCFA) model eliminates the faults which occur in the Euclidean-based approach, thus reducing false positive and false negative cases. The network model works perfectly to作者: pellagra 時間: 2025-3-30 00:15
https://doi.org/10.1007/978-3-658-29059-7tered by the user is processed with the pivotal implementation of NLP. After DiagZone has gathered adequate keywords from the original messages, it will start to lead the conversation by interrogating the user and trying to list a few diseases that the user may suffer from. Once the Chatbot has dete作者: PALMY 時間: 2025-3-30 05:40
Grundlagen der Strategietransformation,on each sensor node, discarding duplicate data and updating route lifetime. Performance of the proposed technique is evaluated and also compared with the traditional approach based on various parameters such as packet loss, end-to-end delay, energy consumption, jitter and round-trip time. Results sh作者: antecedence 時間: 2025-3-30 12:17
Instrumente der Strategietransformation, as per our chosen country and type of cases like total cases, total deaths etc. Such systems are already available, but the efficiency of the available mask detection systems was not achieved thoroughly. This newly developed system proposes to take a step further, which recognizes more than one per作者: STENT 時間: 2025-3-30 14:46
https://doi.org/10.1007/978-3-658-42394-0n platform was used to simulate and train the different ML algorithms on the available dataset. In the present case study, Logistic Regression delivered the best theft-detection accuracy of 100%, followed by Decision Tree, SVM and ANN each offering 96% recognition accuracy on the test data.作者: cavity 時間: 2025-3-30 17:07 作者: 過濾 時間: 2025-3-30 22:03 作者: 反抗者 時間: 2025-3-31 03:40 作者: ELATE 時間: 2025-3-31 06:36
,Low-Computation IoT System Framework for?Face Recognition Using Deep Learning Algorithm,ed layers on the collected facial embeddings of FACENET. The proposed Haar-Cascade FACENET Fully Connected Face Authentication (HFFCFA) model eliminates the faults which occur in the Euclidean-based approach, thus reducing false positive and false negative cases. The network model works perfectly to