標題: Titlebook: Kids Cybersecurity Using Computational Intelligence Techniques; Wael M. S. Yafooz,Hussain Al-Aqrabi,Abdelhamid Ema Book 2023 The Editor(s) [打印本頁] 作者: 明顯 時間: 2025-3-21 18:29
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques影響因子(影響力)
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques影響因子(影響力)學科排名
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques網(wǎng)絡公開度
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques網(wǎng)絡公開度學科排名
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques被引頻次
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques被引頻次學科排名
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques年度引用
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques年度引用學科排名
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques讀者反饋
書目名稱Kids Cybersecurity Using Computational Intelligence Techniques讀者反饋學科排名
作者: OTTER 時間: 2025-3-21 22:23
Kalimuthu Sivanantham,Blessington Praveen P,V. Deepa,R. Mohan Kumaretical ideas as they arise...Fuzzy Logic Type 1 and Type 2 Based on LabVIEW FPGA?, helps students studying embedded control systems to design and program those controllers more efficiently and to understand the978-3-319-79990-2978-3-319-26656-5Series ISSN 1434-9922 Series E-ISSN 1860-0808 作者: Pcos971 時間: 2025-3-22 00:28
1860-949X on, cyberbullying, kid’s exposure to harmful content. This book is beneficial to postgraduate students and researchers‘ concerns on recent methods and approaches to kids‘ cybersecurity..978-3-031-21201-7978-3-031-21199-7Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 農(nóng)學 時間: 2025-3-22 07:30 作者: olfction 時間: 2025-3-22 10:39
Kids Cybersecurity Using Computational Intelligence Techniques作者: Noisome 時間: 2025-3-22 15:56 作者: IDEAS 時間: 2025-3-22 18:13
Protection of Users Kids on Twitter Platform Using Na?ve Bayesarticulations for the expulsion of undesirable information. The element will be changed over into a vector by applying all the arrangement strategies to the information. Term Frequency Inverse Document Frequency (TF-IDF) vectorizer will be utilized for changing over text into vector. Based on the re作者: FOIL 時間: 2025-3-23 00:36 作者: 大吃大喝 時間: 2025-3-23 05:11 作者: CANT 時間: 2025-3-23 07:33
Learning Arabic for Kids Online Using Google Classroom Arabic language learning activities. This is proven when technological devices used for learning can improve children’s ability to speak Arabic, the increase in these abilities is seen in the aspects of listening skills, speaking skills. As for reading and writing skills, they cannot yet be improve作者: NAV 時間: 2025-3-23 12:59 作者: 束以馬具 時間: 2025-3-23 15:18
The Impact of Fake News on Kid’s Life from the Holy Al-Qur’an Perspectiveful for perpetrators and victims such as time is wasted, triggers divisions, benefits certain parties and is detrimental the other party, and cast doubt on the facts. This study proposes suggestions for policy makers to issue regulations and laws for perpetrators of spreading fake news, both offline作者: 打算 時間: 2025-3-23 18:14
Early Prediction of Dyslexia Risk Factors in Kids Through Machine Learning Techniqueswas applied to balance the sample distribution. The PCA and XGBoost techniques were utilized to select dominant features. To detect dyslexic and non-dyslexic classes, various machine learning classifiers like SVM, Naive Bayes, Logistic Regression, Decision Trees, and Neural Networks were trained usi作者: 心胸開闊 時間: 2025-3-23 23:05
Development of Metamodel for Information Security Risk Management desire to model. Even though many current ISRM models appear, finding a suitable model that could provide a straight guideline to the ISRM users based on their problems is limited. To overcome this issue, this book chapter follows the design science research to create a generic metamodel that can d作者: 舊石器時代 時間: 2025-3-24 06:19
Book 2023 for children on social media and online and to combat problems, such as lack of supervision, cyberbullying, kid’s exposure to harmful content. This book is beneficial to postgraduate students and researchers‘ concerns on recent methods and approaches to kids‘ cybersecurity..作者: defray 時間: 2025-3-24 10:14 作者: 抵制 時間: 2025-3-24 13:50
Lori L. Sussmanlled timing. Finally the key areas of research in fuzzy logic control are discussed. First the paper discusses how fuzzy logic control can be combined with other methods. By properly separating the a priori model knowledge of the process under control, a hierarchy of non-linear control methods is es作者: chemoprevention 時間: 2025-3-24 14:53
Howida Abubaker Al-kaaflled timing. Finally the key areas of research in fuzzy logic control are discussed. First the paper discusses how fuzzy logic control can be combined with other methods. By properly separating the a priori model knowledge of the process under control, a hierarchy of non-linear control methods is es作者: GROUP 時間: 2025-3-24 21:02
Hong Diep Ngo,Van Chien Nguyenlled timing. Finally the key areas of research in fuzzy logic control are discussed. First the paper discusses how fuzzy logic control can be combined with other methods. By properly separating the a priori model knowledge of the process under control, a hierarchy of non-linear control methods is es作者: Aggressive 時間: 2025-3-24 23:34 作者: Alveoli 時間: 2025-3-25 04:47 作者: 水槽 時間: 2025-3-25 09:15 作者: BILIO 時間: 2025-3-25 13:32
traffic conditions. Speed control is also an important concern for teleoperation of planetary rovers and for auto-pilot highway guidance systems. These systems ., rather than totally replace, the driver. Therefore, it is desirable that a solution for speed control in an autonomous vehicle be compat作者: 油氈 時間: 2025-3-25 16:03 作者: diabetes 時間: 2025-3-25 21:44
Ihyani Malik,Abdillah Abdillah,Lukman Nul Hakim Amran Saputra,Inayah Mappatoba,Wahyuddin Sreflect the dynamic changes in the environment, static objects like, desks, chairs, and boxes can block or partially occlude parts of known paths. Their appearance and disappearance in the environment can not be foreseen (planned) .. Therefore, not only does the human interface to the robot have to 作者: gene-therapy 時間: 2025-3-26 03:11 作者: 價值在貶值 時間: 2025-3-26 08:15 作者: 畢業(yè)典禮 時間: 2025-3-26 09:25 作者: Comedienne 時間: 2025-3-26 13:32
Izzah Sakinah Ahmad,Mohd Faaizie Darmawan,Corrienna Abdul Talibe logical tradition. Both types may be pervaded with uncertainty when modelling knowledge, or may be a matter of degree when handling preferences. The presentation will first describe how the two types of information can be accommodated in the framework of possibility theory. The existence of the tw作者: promote 時間: 2025-3-26 19:32 作者: 虛度 時間: 2025-3-27 00:53
Mohammed Salem,Siti Hajar Othman,Arafat Al-Dhaqm,Abdulalem Alialing e.g. with ‘sets of sentences’ and ‘sets of ground atoms’, may easily lead to confusion and undesirable constructions if generalizations are performed only as a shift from ‘set’ to ‘fuzzy set’. We present some basic results on how adaptation of a strictly categorical framework enables us to be 作者: figure 時間: 2025-3-27 04:14
Wael M. S. Yafooz,Hussain Al-Aqrabi,Abdelhamid EmaFocuses on the new trends of kid’s activities on social media and what are the technologies that can protect them.Presents insights on Kids Cybersecurity Using Computational Intelligence Techniques.Pr作者: 注入 時間: 2025-3-27 06:20
Studies in Computational Intelligencehttp://image.papertrans.cn/k/image/542696.jpg作者: palpitate 時間: 2025-3-27 12:27
https://doi.org/10.1007/978-3-031-21199-7Computational Intelligence; Social Media; Cybersecurity; Cyberbullying; Artificial intelligent; Kids eLea作者: 縮影 時間: 2025-3-27 15:21
978-3-031-21201-7The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: AGONY 時間: 2025-3-27 19:53
Kids Cybersecurity Using Computational Intelligence Techniques978-3-031-21199-7Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 防水 時間: 2025-3-27 22:16 作者: MUMP 時間: 2025-3-28 03:09 作者: 禁止,切斷 時間: 2025-3-28 07:12
Book 2023well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content online. There have been many attempts to resolve this issue by conducting methods based on rating and ranking as well as reviewing comments to show 作者: laparoscopy 時間: 2025-3-28 13:21
1860-949X Cybersecurity Using Computational Intelligence Techniques.Pr.This book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for ki作者: NAIVE 時間: 2025-3-28 14:57 作者: 昆蟲 時間: 2025-3-28 22:04
Factors Influencing on Online Education Outcomes–An Empirical Study Based on Kids’ Parentsctiveness. However, interactions between learners and family learning method have a negative impact on online learning effectiveness. Finally, the chapter found no evidence of family sharings on online learning.作者: 臭了生氣 時間: 2025-3-29 01:04
Database Forensics Field and Children Crimesorensics role in revealing childrens‘ crimes. Also, it highlights the challenges and issues of database forensics. The results of this book chapter showed that database forensics lacks a well-defined and integrated approach that enables working, distributing, and reprocessing the database forensic domain knowledge.作者: flamboyant 時間: 2025-3-29 04:31 作者: Discrete 時間: 2025-3-29 10:25 作者: N斯巴達人 時間: 2025-3-29 11:23 作者: 話 時間: 2025-3-29 18:46 作者: 草率男 時間: 2025-3-29 21:30 作者: Institution 時間: 2025-3-30 00:43
Howida Abubaker Al-kaafy four case studies. The first example shows how fuzzy logic, incorporated in the hardware of an industrial controller, helps to improve a classical linear PID controller by reducing its overshoot. In the second example the overshoot of a PID controller is drastically reduced by scheduling of the se作者: 下級 時間: 2025-3-30 06:03 作者: 流動性 時間: 2025-3-30 10:25
Zakarya Mohsen Al-Hodianyy four case studies. The first example shows how fuzzy logic, incorporated in the hardware of an industrial controller, helps to improve a classical linear PID controller by reducing its overshoot. In the second example the overshoot of a PID controller is drastically reduced by scheduling of the se作者: Robust 時間: 2025-3-30 13:30
Arafat Al-Dhaqm,Siti Hajar Othman,Wael M. S. Yafooz,Abdulalem Aliy four case studies. The first example shows how fuzzy logic, incorporated in the hardware of an industrial controller, helps to improve a classical linear PID controller by reducing its overshoot. In the second example the overshoot of a PID controller is drastically reduced by scheduling of the se作者: Bombast 時間: 2025-3-30 18:53 作者: 冬眠 時間: 2025-3-30 20:53
Marek Górkaroposed solutions by the reader.Discussion of pros and cons In the past decade a critical mass of work that uses fuzzy logic for autonomous vehicle navigation has been reported. Unfortunately, reports of this work are scattered among conference, workshop, and journal publications that belong to diff作者: 財產(chǎn) 時間: 2025-3-31 02:01
te at the highest velocity possible, yet be able to slow down in order to maneuver safely around obstacles and over various types of terrains. In the case of automated highway driving, vehicle safety can be endangered by going around a curve too fast and crossing into the oncoming lane, traveling to作者: 鎮(zhèn)痛劑 時間: 2025-3-31 07:11
Saud Alshammari,Eman Aljabarti,Yusliza Yusoff[3]. These robots, known as service robots, have four common features. .. Office environments can be considered structured as they have fixed building elements like: corridors, halls, elevators, rooms, etc. (2) .. Not only do the structured building elements differ from building to building, but als