標(biāo)題: Titlebook: Computational Science and Its Applications – ICCSA 2018; 18th International C Osvaldo Gervasi,Beniamino Murgante,Yeonseung Ryu Conference p [打印本頁] 作者: 小客車 時間: 2025-3-21 17:54
書目名稱Computational Science and Its Applications – ICCSA 2018影響因子(影響力)
書目名稱Computational Science and Its Applications – ICCSA 2018影響因子(影響力)學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2018網(wǎng)絡(luò)公開度
書目名稱Computational Science and Its Applications – ICCSA 2018網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2018被引頻次
書目名稱Computational Science and Its Applications – ICCSA 2018被引頻次學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2018年度引用
書目名稱Computational Science and Its Applications – ICCSA 2018年度引用學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2018讀者反饋
書目名稱Computational Science and Its Applications – ICCSA 2018讀者反饋學(xué)科排名
作者: recession 時間: 2025-3-21 20:27 作者: 進入 時間: 2025-3-22 04:11 作者: outset 時間: 2025-3-22 06:33 作者: FLIT 時間: 2025-3-22 08:49 作者: grotto 時間: 2025-3-22 14:10 作者: grotto 時間: 2025-3-22 18:59 作者: Altitude 時間: 2025-3-22 23:50
Anomalies of the Gastrointestinal Tractlution of the frequency of cell collision and aggregation and their relations to other variables that quantify some of the dynamics of cell populations can be predicted by this model for different cell seeding distributions.作者: 惡臭 時間: 2025-3-23 01:51
Classification of Erythematous - Squamous Skin Diseases Through SVM Kernels and Identification of Fe作者: 大量 時間: 2025-3-23 07:11 作者: Vital-Signs 時間: 2025-3-23 09:54 作者: MUTED 時間: 2025-3-23 14:14
Gini Based Learning for the Classification of Alzheimer’s Disease and Features Identification with Asegments (iv) creating the AD_dataset using the pixels of the lesion areas calculated via MR imaging (v) the post-processing stage that involves the application of Classification and Regression Tree (CART) algorithm to the AD_dataset. This study aims at contributing to the literature with the decisi作者: 褲子 時間: 2025-3-23 19:44 作者: anaphylaxis 時間: 2025-3-24 01:37
Geo-environmental Study Applied to the Life Cycle Assessment in the Wood Supply Chain: Study Case ofat most of the Water Footprint associated with the raw material, in the wood supply chain, is attributable to the growth stage of forest types present in the Mount Vulture area. Obviously, this study focused on the initial phase of an extensive research project and has provided the information requi作者: 向前變橢圓 時間: 2025-3-24 03:03
A Preliminary Method for Assessing Sea Cliff Instability Hazard: Study Cases Along Apulian Coastlineach are difficult to be performed. This paper presents a procedure to assess the stability conditions of three rocky cliffs located along the Apulia coast based on a heuristic slope instability system, the Slope Mass Rating (SMR) of Romana (1985). This model was used to individuate the most unstable作者: 一瞥 時間: 2025-3-24 08:37 作者: Overdose 時間: 2025-3-24 11:19
A Learner Ontology Based on Learning Style Models for Adaptive E-Learninglogies in different adaptive e-learning systems for personalization. Then, we proposed a learner modeling ontology based on three learning style models; Felder-Silverman, Honey-Mumford and Kolb; for personalized e-learning. Initial usage of the proposed learner ontology in a multi-agent based e-lear作者: defeatist 時間: 2025-3-24 15:54
Simulating Cell-Cell Interactions Using a Multicellular Three-Dimensional Computational Model of Tislution of the frequency of cell collision and aggregation and their relations to other variables that quantify some of the dynamics of cell populations can be predicted by this model for different cell seeding distributions.作者: 一再遛 時間: 2025-3-24 21:58 作者: 貴族 時間: 2025-3-25 01:25
Methodological Approach to the Definition of a Blockchain System for the Food Industry Supply Chain? process and provide the ultimate customer with enough information about the origin of the product to make an informed purchase decision. This methodology gathers the best practices in marketing, process engineering and the technology itself, alongside with the authors’ experience during its applica作者: Banister 時間: 2025-3-25 06:16 作者: Ointment 時間: 2025-3-25 07:44 作者: STENT 時間: 2025-3-25 14:39 作者: Exposition 時間: 2025-3-25 17:13
RUM: An Approach to Support Web Applications Adaptation During User?Browsingly adapt the content of pages according to the user interest. However, the adaptation of the interface structure to meet user needs and preferences is still incipient. In addition, building adaptive Web applications requires a lot of effort from developers. In this paper, we propose an approach to s作者: 翻動 時間: 2025-3-25 23:43
Gini Based Learning for the Classification of Alzheimer’s Disease and Features Identification with Ans, particularly in Alzheimer’s Disease (AD). In this study, we have developed a new automatic segmentation algorithm which can be seen as a novel decision making technique that can help diagnose decision rules studying magnetic resonance images of the brain. The proposed work consist of a total of 作者: 清唱劇 時間: 2025-3-26 00:54
ANN Classification of MS Subgroups with Diffusion Limited Aggregationhe slowest phase tends to be the diffusion of substance to aggregate. This study focuses on the procedure where substances enduring a random walk because of Brownian motion cluster together to form aggregates of such particles. Magnetic Resonance Image (MRI) is one of the methods used for identifyin作者: libertine 時間: 2025-3-26 07:45 作者: granite 時間: 2025-3-26 09:56
A Preliminary Method for Assessing Sea Cliff Instability Hazard: Study Cases Along Apulian Coastline this reason, the hazard associated to instability processes affecting cliffs can be carried out by means of different methodological approaches. In particular, the presence of a beach at the cliff toe, which dampens the impulsive impact of sea waves and reduces the marine processes of erosion on th作者: habile 時間: 2025-3-26 16:40 作者: Tractable 時間: 2025-3-26 18:25
Course Map: A Career-Driven Course Planning Toolcisions about their course and subjects. However, students are less likely to make the best choices when they lack meaningful information. The task of subject selection is very complex and require multiple considerations on the value of the content, skills, time and workload. Choosing inappropriate 作者: 誹謗 時間: 2025-3-27 00:39 作者: 擁護者 時間: 2025-3-27 02:24
Simulating Cell-Cell Interactions Using a Multicellular Three-Dimensional Computational Model of Tismploying a discrete approach based on cellular automata. In particular, we present results of cell collision and aggregation for three cell populations each having its own division and motion characteristics based on experimental data. The developed model allows us to study the tissue growth rates a作者: Fillet,Filet 時間: 2025-3-27 08:21 作者: 終端 時間: 2025-3-27 11:39 作者: hemophilia 時間: 2025-3-27 16:55
Head and Neck Variations: Vesselsourse, skills and career help students by providing a clarity on what is expected of them, what skills they need to develop, how they need to learn, progress and succeed. The interactive dashboards help students to effectively manage their studies and provide more personalized learning experience.作者: Instrumental 時間: 2025-3-27 20:09
Implementation Phase Methodology for the Development of Safe Code in the Information Systems of the formation security and aimed at covering the development phase in the process of creating information systems for the MHCT. This is a specific methodology that was raised from different methodologies that address this problem, which we compared and evaluated based on different criteria that are relevant in the MHCT.作者: 滲入 時間: 2025-3-27 23:22 作者: Ingenuity 時間: 2025-3-28 05:39 作者: cartilage 時間: 2025-3-28 06:26 作者: Desert 時間: 2025-3-28 12:43 作者: 看法等 時間: 2025-3-28 14:46 作者: GULLY 時間: 2025-3-28 20:59 作者: sebaceous-gland 時間: 2025-3-29 02:58
Cryptanalysis and Improvement of an ECC-Based Authentication Protocol for Wireless Sensor Networksmpersonation attack, and the denial of service attack. In order to overcome these problems, we review Wu et al.’s protocol and propose an improved protocol based on their protocol. Then, we show that our proposed protocol is more secure than other authentication protocols for wireless sensor network.作者: 緊張過度 時間: 2025-3-29 05:45
Conference proceedings 2018Applications, ICCSA 2018, held in Melbourne, Australia, in July 2018.. Apart from the general tracks, ICCSA 2018 also includes 34 international workshops in various areas of computational sciences, ranging from computational science technologies, to specific areas of computational sciences, such as 作者: ULCER 時間: 2025-3-29 10:13 作者: Torrid 時間: 2025-3-29 14:01 作者: 障礙物 時間: 2025-3-29 16:17 作者: 周興旺 時間: 2025-3-29 22:43 作者: CROW 時間: 2025-3-30 00:14
https://doi.org/10.1007/978-3-319-95165-2artificial intelligence; cloud computing; computer networks; data communication systems; data security; i作者: OVERT 時間: 2025-3-30 04:40
978-3-319-95164-5Springer International Publishing AG, part of Springer Nature 2018作者: Osmosis 時間: 2025-3-30 09:22 作者: 發(fā)源 時間: 2025-3-30 13:33
Surgical Treatment of Haemorrhoids process and provide the ultimate customer with enough information about the origin of the product to make an informed purchase decision. This methodology gathers the best practices in marketing, process engineering and the technology itself, alongside with the authors’ experience during its applica作者: ESPY 時間: 2025-3-30 16:56
https://doi.org/10.1007/978-1-84800-314-9th public and private organizations. Considering the large budget that the nation must invest to prevent and repair computer attacks, the development of secure software in the Ministry of Housing, City, and Territory –MHCT– became a need that must be solved from the area of technology. Since informa作者: concubine 時間: 2025-3-30 22:01
Conservative/Nonoperative Therapy,, and sensors. Wireless sensor network is used extensively in implementation of the Internet of Things system. With the increasing use of them, many researchers have focused on the security in wireless sensor network environment. In 2016, Wu et al. proposed a user authentication protocol for wireles作者: Costume 時間: 2025-3-31 02:59
Surgical Anatomy of the Hepatic Hilus methodology to assist the selection of a group of individuals for vaccination in order to restrain the spread of an epidemic. The proposed methodology is to build over the SIR (Susceptible/Infected/Recovered) epidemiological model combined to a genetic algorithm. The results obtained by the applica