派博傳思國(guó)際中心

標(biāo)題: Titlebook: Computer and Information Science 2021—Summer; Roger Lee Book 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license [打印本頁]

作者: 可憐    時(shí)間: 2025-3-21 18:54
書目名稱Computer and Information Science 2021—Summer影響因子(影響力)




書目名稱Computer and Information Science 2021—Summer影響因子(影響力)學(xué)科排名




書目名稱Computer and Information Science 2021—Summer網(wǎng)絡(luò)公開度




書目名稱Computer and Information Science 2021—Summer網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer and Information Science 2021—Summer被引頻次




書目名稱Computer and Information Science 2021—Summer被引頻次學(xué)科排名




書目名稱Computer and Information Science 2021—Summer年度引用




書目名稱Computer and Information Science 2021—Summer年度引用學(xué)科排名




書目名稱Computer and Information Science 2021—Summer讀者反饋




書目名稱Computer and Information Science 2021—Summer讀者反饋學(xué)科排名





作者: 裝勇敢地做    時(shí)間: 2025-3-21 22:45
https://doi.org/10.1007/978-3-030-79474-3Computational Intelligence; Computer Science; Information Science; 20th ICIS; ICIS; ICIS 2021
作者: Extemporize    時(shí)間: 2025-3-22 02:48

作者: 出處    時(shí)間: 2025-3-22 05:18

作者: jovial    時(shí)間: 2025-3-22 09:36

作者: 四海為家的人    時(shí)間: 2025-3-22 13:57

作者: 四海為家的人    時(shí)間: 2025-3-22 19:46

作者: antenna    時(shí)間: 2025-3-22 22:28
https://doi.org/10.1007/978-94-007-0656-9fect. To counteract, semiconductor manufacturers?aim to optimize capacity utilization, to deliver with shorter lead times and exploit this to generate revenue. Additionally, in a competitive market, firms seek?to maintain customer relationships while applying revenue management strategies such as dy
作者: 坦白    時(shí)間: 2025-3-23 03:18
The Ethical Economy of the Credit Market fourth industrial revolution, today’s world is changing rapidly. However, public organizations in Korea are still manually entering reports written by hand in many fields into the information system by a government official in charge. This study studies the improvement method for optical character
作者: 形容詞詞尾    時(shí)間: 2025-3-23 06:08
https://doi.org/10.1007/978-94-007-0656-9is that recognize real objects, but it is difficult to find application cases for image analysis cases that are not common. Unusual objects, that is, drawing images, such as hand-drawn drawings, are rarely learned and have limitations in image detection. In order to overcome these limitations, this
作者: 健談    時(shí)間: 2025-3-23 13:19

作者: troponins    時(shí)間: 2025-3-23 15:58

作者: Myocyte    時(shí)間: 2025-3-23 20:53
Law, Governance and Technology Seriesd a semantic segmentation model and a time series probability model?based on U-Net and HSMM respectively,?and fusion model results by average consistency. The?proposed method are conducted on various datasets, including?the publicly available PhysioNet and a children?heart sound dataset collected by
作者: GLIDE    時(shí)間: 2025-3-24 02:02
Law, Governance and Technology Seriesbecause the integrity of artwork information and the authenticity of artwork are crucial factors for the price of artwork. The blockchain supports these properties well. However, existing services based on blockchain in art domain could not address the problem so called, blockchain air gap, between
作者: 消息靈通    時(shí)間: 2025-3-24 02:32

作者: Amylase    時(shí)間: 2025-3-24 09:11

作者: Vulnerable    時(shí)間: 2025-3-24 11:06

作者: laxative    時(shí)間: 2025-3-24 18:39

作者: 面包屑    時(shí)間: 2025-3-24 20:28

作者: allergy    時(shí)間: 2025-3-25 01:08

作者: 美色花錢    時(shí)間: 2025-3-25 05:44
A Novel Authentication System for Artwork Based on Blockchain,the blockchain listing and physical artworks. This paper provides the novel solution that addresses the problem efficiently but not expensively. Additionally, proposing system does not store owner’s password, which is used for proving the ownership and the authenticity of artwork, in system at all. Therefore, proposing system is very secured.
作者: –吃    時(shí)間: 2025-3-25 11:27
Book 2021CIS 2021) held on June 23–25, 2021 in Shanghai, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and e
作者: Torrid    時(shí)間: 2025-3-25 13:57
The Ethical Economy of the Credit Marketudes modern DDos attacks. The testing results show that CNN has the highest accuracy on DDos attack detection compared to other selected models, Support Vector Machine (SVM) and Random Forest. The performances of CNN with various multi-hidden layer amounts are similar.
作者: characteristic    時(shí)間: 2025-3-25 16:57
Brent Daniel Mittelstadt,Luciano Floridity, new technology, partiality, readiness, and legal and policy environment of the TOE affected the intention of using the system. It was also identified to have the moderating effect of the number of employees in the firm.
作者: Texture    時(shí)間: 2025-3-25 22:54
Intrusion Detection for Modern DDos Attacks Classification Based on Convolutional Neural Networks,udes modern DDos attacks. The testing results show that CNN has the highest accuracy on DDos attack detection compared to other selected models, Support Vector Machine (SVM) and Random Forest. The performances of CNN with various multi-hidden layer amounts are similar.
作者: Organization    時(shí)間: 2025-3-26 03:45
Factors Affecting the Intention to Use Artificial Intelligence-Based Recruitment System: A Structurty, new technology, partiality, readiness, and legal and policy environment of the TOE affected the intention of using the system. It was also identified to have the moderating effect of the number of employees in the firm.
作者: impale    時(shí)間: 2025-3-26 05:20
The Ethical Economy of the Capital MarketThe comparison shows that there is a correlation between the sentiment index of investor and the volatility of stock price, which is beneficial to help investor monitor public opinion and adopts diverse strategies in the stock market.
作者: 懲罰    時(shí)間: 2025-3-26 09:41
Brent Daniel Mittelstadt,Luciano Floriditational cost and proposes to replace it with another lightweight vectorization approach. The comparative study using four alternative approaches proved that the Sent2Vec, one of the alternatives, can build the vectorization model 14 times faster than the conventional one while maintaining the capability of detecting inconsistent method names.
作者: Memorial    時(shí)間: 2025-3-26 15:21
Law, Governance and Technology Seriesour method has outperformed the current state-of-the-art method by achieving the average recall, F1-score of 96.29%, 96.14% on PhysioNet dataset, and 86.95% and 87.24% on children heart sound dataset respectively.
作者: 最高峰    時(shí)間: 2025-3-26 19:52

作者: DOTE    時(shí)間: 2025-3-26 22:02

作者: 小隔間    時(shí)間: 2025-3-27 03:50
Heart Sound Segmentation Based on a Joint HSMM Method,our method has outperformed the current state-of-the-art method by achieving the average recall, F1-score of 96.29%, 96.14% on PhysioNet dataset, and 86.95% and 87.24% on children heart sound dataset respectively.
作者: 爭(zhēng)吵加    時(shí)間: 2025-3-27 09:05

作者: 連鎖,連串    時(shí)間: 2025-3-27 13:28

作者: chassis    時(shí)間: 2025-3-27 16:42

作者: 鄙視讀作    時(shí)間: 2025-3-27 18:52
A Framework and Decision Algorithm to Determine the Best Feature Extraction Technique for Supportin-based hate speech detection. Specifically, the contributions of this work are three-fold: (1) a seamless modular pipeline that automatically preprocesses, vectorizes, and classifies whether or not a text message is a hate speech; (2) a decision algorithm that determines the best FET approach among
作者: obscurity    時(shí)間: 2025-3-27 22:01

作者: Ingest    時(shí)間: 2025-3-28 02:48
Intrusion Detection for Modern DDos Attacks Classification Based on Convolutional Neural Networks, and also companies. Intrusion detection is an effective method for detecting and responding to it. But due to different characteristics brought by modern DDos attacks, traditional intrusion detection is not as useful as before. New researches on combination between deep learning algorithms and intr
作者: 休息    時(shí)間: 2025-3-28 08:23

作者: 不感興趣    時(shí)間: 2025-3-28 11:18

作者: 記成螞蟻    時(shí)間: 2025-3-28 14:45

作者: 值得    時(shí)間: 2025-3-28 19:43

作者: 天文臺(tái)    時(shí)間: 2025-3-29 00:34
A Comparative Study of Vectorization Approaches for Detecting Inconsistent Method Names,ce, the name of a method should be a summary of?what the method does. There has been a study utilizing Word2Vec, Doc2Vec, and the convolutional neural network (CNN) to evaluate the consistency between a method’s name and body in an automated way. While the conventional evaluation procedure detects i
作者: 開始發(fā)作    時(shí)間: 2025-3-29 04:04
Heart Sound Segmentation Based on a Joint HSMM Method,d a semantic segmentation model and a time series probability model?based on U-Net and HSMM respectively,?and fusion model results by average consistency. The?proposed method are conducted on various datasets, including?the publicly available PhysioNet and a children?heart sound dataset collected by
作者: chisel    時(shí)間: 2025-3-29 09:05
A Novel Authentication System for Artwork Based on Blockchain,because the integrity of artwork information and the authenticity of artwork are crucial factors for the price of artwork. The blockchain supports these properties well. However, existing services based on blockchain in art domain could not address the problem so called, blockchain air gap, between
作者: Keshan-disease    時(shí)間: 2025-3-29 14:19

作者: 6Applepolish    時(shí)間: 2025-3-29 18:14

作者: avulsion    時(shí)間: 2025-3-29 20:47

作者: 從屬    時(shí)間: 2025-3-30 01:50
The Effect of Online Investor Sentiment on Stock Movements: An LSTM Approach, advantage in sentiment analysis, which presents a higher accuracy (99.87%) than the sentiment lexicon-based method (94.57%). Taking the delay impact of stockholders’ sentiments on the stock trend into account, this research discusses the correlation between current investor sentiments and stock mar
作者: 直覺沒有    時(shí)間: 2025-3-30 06:57
KnowGraph-PM: A Knowledge Graph Based Pricing Model for Semiconductor Supply Chains,er order data. The pricing algorithm is realized as a SPARQL query that relies on customer profile and order behavior to determine the corresponding price premium. We evaluate the approach by calculating the revenue generated after applying the pricing algorithm. Based on competency questions that t
作者: 數(shù)量    時(shí)間: 2025-3-30 10:41

作者: 嫻熟    時(shí)間: 2025-3-30 12:28

作者: 尋找    時(shí)間: 2025-3-30 18:37
Image Steganography Using GANs,tal results of the proposed system demonstrated an accuracy of 92.34% achieved by the extractor model while retrieving the hidden information from the stego images and an overall steganography capacity of 93.75e?3 bytes/pixel for the entire system. Thus, the proposed system reduces the probability o




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
青冈县| 焦作市| 兴山县| 大新县| 平遥县| 连江县| 兖州市| 娄底市| 石台县| 登封市| 广丰县| 武冈市| 伊川县| 彰化县| 大化| 台江县| 香港| 宾阳县| 周宁县| 固安县| 云阳县| 邵武市| 手游| 武胜县| 杭锦后旗| 搜索| 罗源县| 江孜县| 微博| 乌拉特前旗| 太谷县| 理塘县| 桓仁| 固镇县| 酉阳| 华宁县| 昌吉市| 枞阳县| 安吉县| 萨迦县| 林周县|