作者: Corporeal 時間: 2025-3-22 00:08 作者: 注意 時間: 2025-3-22 02:32
An Empirical Analysis of?the?Usage of?Requirements Attributes in?Requirements Engineering Research aature review and two industrial case studies performed at two large organizations developing software-intensive products for a global market. We performed seven snowballing iterations and identified 18 studies where we extracted requirements attributes. Next, we compare these identified attributes w作者: inhumane 時間: 2025-3-22 05:22
Experimental Study on?Link Prediction in?Unweighted and?Weighted Time-Evolving Organizational Social to forecast future connections between pairs of unconnected nodes by analyzing existing connections. The main goal of the paper is to experimentally verify whether incorporating weights on links between vertices, indicating the strength of the relationship, enhances the performance of similarity-ba作者: bibliophile 時間: 2025-3-22 11:45
Assessing Student Quality of Life: Analysis of Key Influential Factors-being. Recognizing the complexity of students’ well-being, our research employed a comprehensive questionnaire distributed among a cohort of 544 participants, featuring 201 carefully designed questions across seven thematic blocks. These blocks were tailored to explore various dimensions of student作者: 沉默 時間: 2025-3-22 15:04 作者: 沉默 時間: 2025-3-22 18:43
Strengthening Network Intrusion Detection in?IoT Environments with?Self-supervised Learning and?Few of connectivity between them. As the IoT networks grow and expand, they become more susceptible to cybersecurity attacks. A significant challenge in current intrusion detection systems for IoT includes handling imbalanced datasets where labeled data are scarce, particularly for new and rare types o作者: arboretum 時間: 2025-3-23 00:53 作者: 注意 時間: 2025-3-23 02:37
Detection of Fake Facial Images and Changes in Real Facial Imagesnise objects, characters, and player movements in video games. This allows games to react to player behaviours more intelligently, providing more dynamic and engaging experiences. Additionally, applying deep learning techniques combined with Computer Vision supports generating automatic special effe作者: strdulate 時間: 2025-3-23 06:12
TabGAN-Powered Data Augmentation and?Explainable Boosting-Based Ensemble Learning for?Intrusion Deteenging. This study presents TDAELID, a method designed to improve cyber assault detection on the widely used IEC 60870-5-104 protocol in ICS. TDAELID employs TabGAN to generate realistic samples from minority classes and a clustering approach to select representative samples from majority classes, e作者: Frisky 時間: 2025-3-23 12:19
Malware Detection Among Contact Tracing Apps with?Deep Learning. Especially these days that meningitis, influenza, but also streptococcus and respiratory syncytial virus (RSV) are on the rise and affect vulnerable populations, e.g. young children, whose immune system is unprepared due to lack of exposure to common viruses during the recent pandemic, contact tra作者: Blemish 時間: 2025-3-23 17:24
Modeling the?Functioning of?Decision Trees Based on?Decision Rule Systems by?Greedy Algorithmclarity and ease of interpretation in data analysis are widely recognized. The study of the relationship between DTs and DRSs is an important problem in computer science. There are established methods for converting DTs to DRSs. In this work, we explore the inverse transformation problem, which is c作者: lanugo 時間: 2025-3-23 19:27 作者: Medley 時間: 2025-3-24 01:59
Reinforcement Learning-Based Cooperative Traffic Control Systemhis paper explores the application of reinforcement learning to enhance traffic flow and reduce congestion. Our goal was to develop a reinforcement learning-based model that adapts to varying traffic conditions in real-time. Several methods are available for the real-time optimization of traffic, ra作者: menopause 時間: 2025-3-24 04:45 作者: 預防注射 時間: 2025-3-24 06:44
New Results for?Some Turán Problem Instances Obtained Using the?Reinforcement Learning Techniqueng-standing and challenging open problem. Ideally, one aims not only to compute these numbers exactly but also to understand their asymptotic behavior, although such results are currently limited to specific cases. This article introduces new results for . and the associated parameter .(.,?2.), achi作者: arbiter 時間: 2025-3-24 13:33
An Empirical Analysis of?the?Usage of?Requirements Attributes in?Requirements Engineering Research aith those of two large companies developing software-intensive products for a global market. We found common attributes that describe stakeholders and roles, support change management, tracing and communication, tracking the status, and estimating the business value of requirements.作者: 浸軟 時間: 2025-3-24 17:28
New Results for?Some Turán Problem Instances Obtained Using the?Reinforcement Learning Techniqueeved through the application of reinforcement machine learning techniques. Specifically, the RLS algorithm, initially proposed by Zhou . for vertex coloring in graphs, has been adapted to address certain Turán problems involving edge coloring.作者: Coordinate 時間: 2025-3-24 22:36 作者: 外表讀作 時間: 2025-3-25 00:28
0302-9743 Intelligence, ICCCI 2024, held in Leipzig, Germany, during September 9–11, 2024...The 59 revised full papers presented in these proceedings were carefully reviewed and selected from 234 submissions.?..Part I:??collective intelligence and collective decision-making;?deep learning techniques;?natural 作者: 天氣 時間: 2025-3-25 07:20
Aktienrechtliche Jahresabschlu?prüfungfor interpersonal emotion regulation using such human-like bots. The bot‘s multimodal interactions helped to regulate the human’s emotions by effects of emerging synchrony during the interaction even under less favorable situations such as poor individual emotion regulation capabilities.作者: 啟發(fā) 時間: 2025-3-25 07:58 作者: infatuation 時間: 2025-3-25 12:55
Marktwirtschaft, Wettbewerb und Aktienrechtices has been carried out. The study has been conducted on the organizational social network, which is based on email communication among employees in a public organization. The results confirmed that considering weights between vertices leads to better predictions, regardless of the similarity measure applied.作者: 淘氣 時間: 2025-3-25 17:33 作者: 占線 時間: 2025-3-25 23:34
Zusammenfassung, Implikationen und Ausblick,ence for the existence of delays, showing the differences among them in different island topologies, try to explain their nature and prepare to propose dedicated migration operators considering these observations.作者: cancellous-bone 時間: 2025-3-26 03:06
Experimental Study on?Link Prediction in?Unweighted and?Weighted Time-Evolving Organizational Socialices has been carried out. The study has been conducted on the organizational social network, which is based on email communication among employees in a public organization. The results confirmed that considering weights between vertices leads to better predictions, regardless of the similarity measure applied.作者: NICE 時間: 2025-3-26 04:57 作者: Barter 時間: 2025-3-26 09:15 作者: 的染料 時間: 2025-3-26 13:16 作者: 支形吊燈 時間: 2025-3-26 16:47
Aktienemissionen und Kurseffekteains high success rates in environments with many malicious collectives, demonstrating robust scalability and reliability as the network expands. This research provides new insights into reputation systems in online environments and suggests directions for future progress in trust management with social networks.作者: demote 時間: 2025-3-27 00:12 作者: sleep-spindles 時間: 2025-3-27 01:57 作者: iodides 時間: 2025-3-27 07:38 作者: 自由職業(yè)者 時間: 2025-3-27 11:20
Detection of Fake Facial Images and Changes in Real Facial Imagesod for detecting modified, real facial images and artificially generated facial images based on convolutional neural networks. Our technique allows for classifying facial photos into one of three classes: real faces, real faces with applied modifications (using photo editing software), and artificially generated facial images.作者: 遺棄 時間: 2025-3-27 17:18
Malware Detection Among Contact Tracing Apps with?Deep Learningcy. We also introduce a safe and efficient retrieval mechanism for apps associated with the Sustainable Development Goal (SDG) 3 associated with communicable diseases. We aspire to contribute to the safe dissemination of tracing apps in the era of contagious viruses.作者: Creditee 時間: 2025-3-27 21:06
Conference proceedings 2024ce, ICCCI 2024, held in Leipzig, Germany, during September 9–11, 2024...The 59 revised full papers presented in these proceedings were carefully reviewed and selected from 234 submissions.?..Part I:??collective intelligence and collective decision-making;?deep learning techniques;?natural language p作者: MAOIS 時間: 2025-3-28 01:04
An Adaptive Network Model for Interpersonal Emotion Regulation in Multimodal Human-Bot Interactionfor interpersonal emotion regulation using such human-like bots. The bot‘s multimodal interactions helped to regulate the human’s emotions by effects of emerging synchrony during the interaction even under less favorable situations such as poor individual emotion regulation capabilities.作者: 音樂學者 時間: 2025-3-28 03:20 作者: NADIR 時間: 2025-3-28 09:12 作者: ENDOW 時間: 2025-3-28 10:43 作者: 賞心悅目 時間: 2025-3-28 18:27 作者: 財主 時間: 2025-3-28 21:20 作者: conspicuous 時間: 2025-3-29 02:40
Aktienrecht zwischen Markt und Staatature review and two industrial case studies performed at two large organizations developing software-intensive products for a global market. We performed seven snowballing iterations and identified 18 studies where we extracted requirements attributes. Next, we compare these identified attributes w作者: Sad570 時間: 2025-3-29 03:44
Marktwirtschaft, Wettbewerb und Aktienrecht to forecast future connections between pairs of unconnected nodes by analyzing existing connections. The main goal of the paper is to experimentally verify whether incorporating weights on links between vertices, indicating the strength of the relationship, enhances the performance of similarity-ba作者: 無思維能力 時間: 2025-3-29 09:47 作者: micronutrients 時間: 2025-3-29 12:28 作者: 連系 時間: 2025-3-29 17:49 作者: Nibble 時間: 2025-3-29 21:39
,Risikofaktoren und Pr?vention, applications exploiting smart homes can be designed to improve the daily lives of older people, allowing them to stay at home longer, while receiving the health care they need. In this article, we present an original solution to conduct a long-term analysis of elderly’s behavior in order to detect 作者: Genetics 時間: 2025-3-30 02:44 作者: 糾纏,纏繞 時間: 2025-3-30 05:09
https://doi.org/10.1007/978-3-322-81415-9enging. This study presents TDAELID, a method designed to improve cyber assault detection on the widely used IEC 60870-5-104 protocol in ICS. TDAELID employs TabGAN to generate realistic samples from minority classes and a clustering approach to select representative samples from majority classes, e作者: cinder 時間: 2025-3-30 09:39 作者: 冬眠 時間: 2025-3-30 14:10
Strategisches Kompetenz-Managementclarity and ease of interpretation in data analysis are widely recognized. The study of the relationship between DTs and DRSs is an important problem in computer science. There are established methods for converting DTs to DRSs. In this work, we explore the inverse transformation problem, which is c作者: 字謎游戲 時間: 2025-3-30 18:07
Zusammenfassung, Implikationen und Ausblick,ture, e.g. supercomputers. However, there are still many issues that are not well researched in this context, e.g. existence of delays in HPC-grade implementations of metaheuristics and how they affect the computation itself. The lack of this knowledge may expose the fact, that the power of supercom作者: Epidural-Space 時間: 2025-3-30 23:22
Christian Kn?chel,Benedikt Friedrichshis paper explores the application of reinforcement learning to enhance traffic flow and reduce congestion. Our goal was to develop a reinforcement learning-based model that adapts to varying traffic conditions in real-time. Several methods are available for the real-time optimization of traffic, ra作者: 主動 時間: 2025-3-31 01:18
Viola Oertel-Kn?chel,Frank H?nsel hidden knowledge between spatial features in space. Many efficient algorithms have been proposed and the common idea of them is to first generate a set of candidates and then search for all co-location instances of these candidates. Although the existing algorithms designed different data structure作者: N斯巴達人 時間: 2025-3-31 05:06 作者: Obsequious 時間: 2025-3-31 11:00
Computational Collective Intelligence978-3-031-70819-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Hippocampus 時間: 2025-3-31 13:34
https://doi.org/10.1007/978-3-031-70819-0Knowledge representation and reasoning; Information retrieval; Recommender systems; Social networks; Dat作者: Costume 時間: 2025-3-31 18:32
978-3-031-70818-3The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: chuckle 時間: 2025-3-31 22:49 作者: cornucopia 時間: 2025-4-1 02:11