標(biāo)題: Titlebook: Computational Science and Its Applications – ICCSA 2024 Workshops; Hanoi, Vietnam, July Osvaldo Gervasi,Beniamino Murgante,Maria Noelia Fa [打印本頁] 作者: Reagan 時(shí)間: 2025-3-21 19:38
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops影響因子(影響力)
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops影響因子(影響力)學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops網(wǎng)絡(luò)公開度
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops被引頻次
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops被引頻次學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops年度引用
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops年度引用學(xué)科排名
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops讀者反饋
書目名稱Computational Science and Its Applications – ICCSA 2024 Workshops讀者反饋學(xué)科排名
作者: CRUE 時(shí)間: 2025-3-21 23:30
Exploring the?Navigation Patterns of?Learners on?an?Educational Recommender Systemsemantic web-based educational recommender system. The educational recommender system was used as a supplementary tool by 172 voluntary students who took the Digital Computer Design course of the Computer Engineering curriculum at a public university in Turkey. Different types of learning resources 作者: GENRE 時(shí)間: 2025-3-22 03:15 作者: entitle 時(shí)間: 2025-3-22 07:36
A General Study on?the?Malware Propagation Models in?Wireless Sensor Networksthe critical characteristics of wireless sensor networks and the spread of malware within them. The vulnerability of wireless sensor networks to malware attacks poses a significant challenge due to the limited defense capabilities of sensors. Consequently, the propagation of malware within these net作者: 喪失 時(shí)間: 2025-3-22 10:51 作者: 控制 時(shí)間: 2025-3-22 16:22 作者: 控制 時(shí)間: 2025-3-22 21:07
Metabolic Cost of Load Carriage in a Special Forces Team – A Non-parametric Approachnd Fully loaded groups, it was analysed if it provided different results of peak oxygen uptake, heart rate and blood Lactate. Second, taking into account that higher differences were detected across categories (steps), we are interested in conducting an analysis which enables the definition of the v作者: 迅速飛過 時(shí)間: 2025-3-23 00:08 作者: filial 時(shí)間: 2025-3-23 04:04 作者: Allowance 時(shí)間: 2025-3-23 08:51 作者: Brocas-Area 時(shí)間: 2025-3-23 13:36 作者: 我悲傷 時(shí)間: 2025-3-23 17:52 作者: Robust 時(shí)間: 2025-3-23 20:16
Christian Karpfinger,Kurt Meybergating the seismic performances of bridges and viaducts with those of the connected housing systems. The latter are estimated by modelling their physical damage with vulnerability curves for buildings. The main results are illustrated and discussed.作者: BOON 時(shí)間: 2025-3-24 00:46
Tensor Products and Flat Modulessemantic web-based educational recommender system. The educational recommender system was used as a supplementary tool by 172 voluntary students who took the Digital Computer Design course of the Computer Engineering curriculum at a public university in Turkey. Different types of learning resources 作者: 現(xiàn)任者 時(shí)間: 2025-3-24 05:39 作者: 冒煙 時(shí)間: 2025-3-24 09:22
Christian Karpfinger,Kurt Meybergthe critical characteristics of wireless sensor networks and the spread of malware within them. The vulnerability of wireless sensor networks to malware attacks poses a significant challenge due to the limited defense capabilities of sensors. Consequently, the propagation of malware within these net作者: 索賠 時(shí)間: 2025-3-24 14:01 作者: 領(lǐng)導(dǎo)權(quán) 時(shí)間: 2025-3-24 16:32 作者: 難聽的聲音 時(shí)間: 2025-3-24 21:55
Der Hauptsatz über endliche abelsche Gruppennd Fully loaded groups, it was analysed if it provided different results of peak oxygen uptake, heart rate and blood Lactate. Second, taking into account that higher differences were detected across categories (steps), we are interested in conducting an analysis which enables the definition of the v作者: concert 時(shí)間: 2025-3-24 23:44 作者: 分期付款 時(shí)間: 2025-3-25 04:40 作者: 使混合 時(shí)間: 2025-3-25 08:44 作者: averse 時(shí)間: 2025-3-25 15:44
https://doi.org/10.1007/978-3-642-80634-6he problem-solving reasoning process to the smaller elements like expressions, domain objects, their classes, properties, and relationships. The method allowed to reduce the number of templates used in the intelligent tutoring system for learning programming-language expressions by about half and the number of words used in templates by about 60%.作者: CODE 時(shí)間: 2025-3-25 19:50 作者: chisel 時(shí)間: 2025-3-25 22:29 作者: 擁擠前 時(shí)間: 2025-3-26 03:53 作者: 本土 時(shí)間: 2025-3-26 08:16 作者: 火光在搖曳 時(shí)間: 2025-3-26 08:36 作者: 鎮(zhèn)痛劑 時(shí)間: 2025-3-26 15:57 作者: 調(diào)情 時(shí)間: 2025-3-26 19:21
Conference proceedings 19646th edition model involved validating the hypothesis, revealing that the carry-over effect was found to be not significant, when assessed at the usual levels of significance (1% and 5%). In terms of the treatments, it was concluded that there was statistical significance, leading to the assertion that the studied pharmaceuticals were not bioequivalent.作者: BLANK 時(shí)間: 2025-3-26 21:49 作者: 容易生皺紋 時(shí)間: 2025-3-27 03:33
Enhancement of Database Access Performance by Improving Data Consistency in a Non-relational Databasvely, as compared to the baseline metrics of 2914.110?ms, 26510.930?ms, and 32457.662?ms. These results demonstrate that our proposed model effectively enhances consistency in document-based NoSQL databases like MongoDB and other NoSQL database variants, including key-value, graph, and wide-column stores.作者: 類似思想 時(shí)間: 2025-3-27 07:25 作者: venous-leak 時(shí)間: 2025-3-27 13:19 作者: 正式通知 時(shí)間: 2025-3-27 16:20
0302-9743 onal Science and Its Applications, ICCSA 2024, held at Hanoi, Vietnam, during July 1–4, 2024...The 281 full papers, 17 short papers and 2 PHD showcase papers included in this volume were carefully reviewed and selected from a total of 450 submissions...In addition, the conference consisted of 55 wor作者: deface 時(shí)間: 2025-3-27 18:22
Conference proceedings 2024ce and Its Applications, ICCSA 2024, held at Hanoi, Vietnam, during July 1–4, 2024...The 281 full papers, 17 short papers and 2 PHD showcase papers included in this volume were carefully reviewed and selected from a total of 450 submissions...In addition, the conference consisted of 55 workshops, fo作者: 碌碌之人 時(shí)間: 2025-3-27 23:59
Community Resilience Analysis for the Formulation of a Seismic Mitigation Strategy at Inter-municipa concepts is extremely complex. In the study of seismic risk, applications are highly multidisciplinary. Consequently, they are often incomplete or partial. Although new rigorous mathematical models have been developed, most applications are extremely complicated and susceptible to the input data an作者: 蹣跚 時(shí)間: 2025-3-28 04:10
Exploring the?Navigation Patterns of?Learners on?an?Educational Recommender System quite a challenging task to measure and model how learning actually takes place, the main contribution of this paper is to provide insights into the learning processes of learners based on interaction data. Various types of factors about learners such as prior knowledge level, motivation level, and作者: 原來 時(shí)間: 2025-3-28 07:39 作者: 強(qiáng)壯 時(shí)間: 2025-3-28 13:53 作者: SPURN 時(shí)間: 2025-3-28 15:41 作者: indicate 時(shí)間: 2025-3-28 20:23
A General Study on?the?Malware Propagation Models in?Wireless Sensor Networksor networks consist of sensor nodes interconnected in a decentralized and distributed manner via wireless connectivity. Malware attacks can raise the energy consumption of wireless sensor network sensor nodes. The propagation of the infection initiates from a single infected node and utilizes neighb作者: Plaque 時(shí)間: 2025-3-28 23:59 作者: 窩轉(zhuǎn)脊椎動(dòng)物 時(shí)間: 2025-3-29 03:05 作者: 茁壯成長(zhǎng) 時(shí)間: 2025-3-29 08:42 作者: 沖擊力 時(shí)間: 2025-3-29 12:27
Performance Evaluation of Information Systems in Portuguese Municipalitiesprovided to all of us, as citizens, depends on this performance, then it is essential that we can evaluate it. This research evaluates the performance of information systems in the Portuguese municipalities, applying the DeLone and McLean model, which is based on the perceptions of the systems’ user作者: Guileless 時(shí)間: 2025-3-29 18:04
Portuguese Service Electricity Continuity Indicators: Municipality Code and?Quality Service Zones Event a serious cost. Productivity and competitiveness in manufacturing and service industries increasingly depend on the quality of electricity supply and are also dependent on the good efficiency of continuity indicators. After initially monitoring its indicators in 2001, Portugal introduced a conti作者: 勤勞 時(shí)間: 2025-3-29 23:03
Spatial and?Multivariate Statistics in?Assessing Water Quality in?the?North Sea a critical process that involves an assessment of physical, chemical, and biological parameters, essential to guarantee environmental sustainability and the health of local communities and marine ecosystems. Using Multivariate and Spatial Statistics methods, this study seeks to identify spatial pat作者: 謙虛的人 時(shí)間: 2025-3-30 02:45 作者: DEAWL 時(shí)間: 2025-3-30 07:59 作者: flex336 時(shí)間: 2025-3-30 11:02
Crossover Design on?the?Bioequivalence of?Pharmaceuticals - A Case of?Studycacy of different treatments administered to two distinct cohorts of patients: the control group and the test group. In order to compare the control group that received the reference medication, with the test/treatment group that received the investigational drug, a crossover experimental design was作者: Frequency 時(shí)間: 2025-3-30 15:19
Christian Karpfinger,Kurt Meyberg concepts is extremely complex. In the study of seismic risk, applications are highly multidisciplinary. Consequently, they are often incomplete or partial. Although new rigorous mathematical models have been developed, most applications are extremely complicated and susceptible to the input data an作者: prostatitis 時(shí)間: 2025-3-30 19:24 作者: 符合國(guó)情 時(shí)間: 2025-3-31 00:43
https://doi.org/10.1007/978-3-642-80634-6nal scaffolding. That can be organized in the form of learning dialogue consisting of closed-answer questions and explanations for answers to them. However, designing Intelligent Tutoring Systems that support generating pedagogical questions is very labor-intensive. In this paper, we propose a metho作者: Optometrist 時(shí)間: 2025-3-31 04:55
https://doi.org/10.1007/978-1-4612-6101-8 detection and classification. Over the last decade, numerous Machine Learning (ML) and Deep Learning (DL)-based techniques have been proposed to address the growth of malicious applications, focusing on utilizing features derived from dynamic malware analysis. However, these approaches are often co