標(biāo)題: Titlebook: Smart, Sustainable Manufacturing in an Ever-Changing World; Proceedings of Inter Konrad von Leipzig,Natasha Sacks,Michelle Mc Clell Confere [打印本頁] 作者: vein220 時間: 2025-3-21 17:25
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World影響因子(影響力)
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World影響因子(影響力)學(xué)科排名
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World網(wǎng)絡(luò)公開度
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World被引頻次
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World被引頻次學(xué)科排名
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World年度引用
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World年度引用學(xué)科排名
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World讀者反饋
書目名稱Smart, Sustainable Manufacturing in an Ever-Changing World讀者反饋學(xué)科排名
作者: CODA 時間: 2025-3-21 21:03 作者: DEFER 時間: 2025-3-22 02:50 作者: 合并 時間: 2025-3-22 06:40 作者: COLIC 時間: 2025-3-22 09:15
Alexander Mütze,Simon Lebbing,Simon Hillnhagen,Matthias Schmidt,Peter Nyhuiscientific literature over the previous 12 years. It was felt that sensors for use with industrial robots merited a section and accordingly just over 200 papers were included. It is a sign of the increased research into sensors in production engineering that this bibliography on both the contact and 作者: Pituitary-Gland 時間: 2025-3-22 16:55 作者: 責(zé)怪 時間: 2025-3-22 18:26 作者: 反饋 時間: 2025-3-22 23:02
Peter Kuhlang,Martin Benter,Maria Neumannto big data management to help decision-making. Understanding and better managing big data makes it possible to collect and analyze relevant information to make predictions. However, vulnerabilities exist at all scales of the big data platforms, including at the data level. Despite the tremendous ef作者: penance 時間: 2025-3-23 02:57 作者: 壕溝 時間: 2025-3-23 06:16
H. Theunissen,T. Van Niekerk,J. H. C. Pretoriusthe integrity, confidentiality, and availability of information, consisting of a set of tools, risk management approaches, technologies, and methods to protect networks, devices, programs, and data against attacks or non-access authorized. Big Data becomes a barrier for network security to understan作者: Myocarditis 時間: 2025-3-23 12:34
T. M. Demke,A. Mütze,P. Nyhuis.Proposes many case studies and applications of machine inte.This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and 作者: ingrate 時間: 2025-3-23 14:39
ted by warping the frequency-axis by appropriate . factor. However, it is computationally expensive to find warping factor for each speaker. This problem is overcome by incorporating a . warping function for all the speakers. Different psychoacoustic scales have been proposed over the past decade th作者: mosque 時間: 2025-3-23 20:26
Titanilla Komenda,Jorge Blesa Garcia,Maximilian Schelle,Felix Leber,Mathias Brandst?tterted by warping the frequency-axis by appropriate . factor. However, it is computationally expensive to find warping factor for each speaker. This problem is overcome by incorporating a . warping function for all the speakers. Different psychoacoustic scales have been proposed over the past decade th作者: 減弱不好 時間: 2025-3-24 00:21 作者: inventory 時間: 2025-3-24 05:47
Alexej Simeth,Peter Plapperted by warping the frequency-axis by appropriate . factor. However, it is computationally expensive to find warping factor for each speaker. This problem is overcome by incorporating a . warping function for all the speakers. Different psychoacoustic scales have been proposed over the past decade th作者: 滴注 時間: 2025-3-24 08:46
Jan Schuhmacher,Vera Hummelted by warping the frequency-axis by appropriate . factor. However, it is computationally expensive to find warping factor for each speaker. This problem is overcome by incorporating a . warping function for all the speakers. Different psychoacoustic scales have been proposed over the past decade th作者: formula 時間: 2025-3-24 11:58
ted by warping the frequency-axis by appropriate . factor. However, it is computationally expensive to find warping factor for each speaker. This problem is overcome by incorporating a . warping function for all the speakers. Different psychoacoustic scales have been proposed over the past decade th作者: seruting 時間: 2025-3-24 15:52 作者: rectum 時間: 2025-3-24 19:52 作者: Anthropoid 時間: 2025-3-25 02:25 作者: 刪除 時間: 2025-3-25 06:24
Smart, Sustainable Manufacturing in an Ever-Changing WorldProceedings of Inter作者: SUGAR 時間: 2025-3-25 08:04
T. M. Demke,A. Mütze,P. Nyhuisevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploringthe latest advances on machine intelligence and big data analytics for cybersecurity applications...?..?.978-3-030-57026-2978-3-030-57024-8Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 苦惱 時間: 2025-3-25 15:17
2194-0525 improved engineering training and education, relevant applied research, and an active interaction between academia and industry.978-3-031-15604-5978-3-031-15602-1Series ISSN 2194-0525 Series E-ISSN 2194-0533 作者: Entrancing 時間: 2025-3-25 18:38 作者: 概觀 時間: 2025-3-25 20:06 作者: adjacent 時間: 2025-3-26 01:56 作者: Fabric 時間: 2025-3-26 06:08 作者: FIG 時間: 2025-3-26 10:49 作者: 貪婪性 時間: 2025-3-26 12:41 作者: PRO 時間: 2025-3-26 19:31
an Advanced Light Gradient Boosting Machine technique to detect credit card frauds. In this method, a Bayesian-based Hyperparameter Optimization technique is incorporated to Light Gradient Boosting Machine (LightGBM) in modifying its hyperparameters. To validate its efficacy in identifying fraudule作者: 松馳 時間: 2025-3-26 21:54
Peter Kuhlang,Martin Benter,Maria Neumannng. We also regroup the most sensitive security aspects that should be addressed to protect valuable data. All the contributions and dimensions were addressed through a set of security use cases, namely, malware detection, intrusion, anomaly, access control, and data ingestion controls. Furthermore,作者: MURAL 時間: 2025-3-27 01:40
D. J. van Niekerk,K. Kruger,A. H. Bassonng. We also regroup the most sensitive security aspects that should be addressed to protect valuable data. All the contributions and dimensions were addressed through a set of security use cases, namely, malware detection, intrusion, anomaly, access control, and data ingestion controls. Furthermore,作者: 嘲笑 時間: 2025-3-27 08:00
H. Theunissen,T. Van Niekerk,J. H. C. Pretoriususion detection system, which given the growing sophistication of cyber breaches. Cybersecurity is fundamental pillars of digital experience, so organizations’ digital initiatives must consider, from the beginning, the requirements in cyber and privacy, concerning the security and privacy of this da作者: 獎牌 時間: 2025-3-27 10:21
ssification performance. In particular, Equivalent Rectangular Bandwidth (ERB)-scale based warping improves the precision by 7.17?% over state-of-the-art mel frequency cepstral coefficients (MFCC) for template matching done on isolated digits of TIDIGITS database and 6.16?% on words from TIMIT datab作者: tattle 時間: 2025-3-27 17:15 作者: 表示向前 時間: 2025-3-27 19:09 作者: 拉開這車床 時間: 2025-3-27 21:58
Alexej Simeth,Peter Plapperssification performance. In particular, Equivalent Rectangular Bandwidth (ERB)-scale based warping improves the precision by 7.17?% over state-of-the-art mel frequency cepstral coefficients (MFCC) for template matching done on isolated digits of TIDIGITS database and 6.16?% on words from TIMIT datab作者: ASSET 時間: 2025-3-28 05:57 作者: jabber 時間: 2025-3-28 06:56 作者: muster 時間: 2025-3-28 14:29 作者: 不斷的變動 時間: 2025-3-28 18:40
Yafet Haile-Melekot,Karel Kruger,J?rg Niemanngy of the adjacent well with?~?9000 well log data points, 70% of which are used for training and 30% for testing. Finally,?the accuracy check using the F1-score is performed, showing 97 and 94% accuracy in subsurface lithology prediction for random forest and decision tree classifications, respectiv作者: mortuary 時間: 2025-3-28 22:11 作者: MELD 時間: 2025-3-29 00:43
Identification of Residual Development Efforts in Agile Ramp-Up Productionmics of the product development process and the knowledge already generated for the validation and stabilization of the manufacturing process. However, due to the integration of ramp-up production into product development, there are additional far-reaching effects of product and technology uncertain作者: 并排上下 時間: 2025-3-29 05:59
Cross-Process Modeling of Manufacturing Process Sequences with Consideration of Model Uncertaintiesmodel uncertainties and their effects on cross-process models is presented. These cross-process models predict the final state characteristics of a component considering all manufacturing processes of the process sequence. For validation, the systematic approach is applied to a manufacturing process作者: aquatic 時間: 2025-3-29 08:04 作者: 極端的正確性 時間: 2025-3-29 11:47 作者: 鴿子 時間: 2025-3-29 18:56 作者: 談判 時間: 2025-3-29 23:38
Design and Construction Framework to Enable the Modular Block Building Methodology to Broaden South nally, each shipyard may have a speciality area of production that will lead to a more cost effective “block” being built, saving on overall costs. This ultimately leads to a cheaper, better quality and faster construction of the ship. A qualitative and quantitative, mixed methods research methodolo作者: 季雨 時間: 2025-3-30 02:49 作者: 多樣 時間: 2025-3-30 06:21
Productivity Driven Dynamic Task Allocation in Human–Robot-Collaboration for Assembly Processesnt time. This paper describes an approach that enhances developed methods considering ergonomic optimisation by combining it with economic improvement of human–robot collaborations by means of semi-autonomous group work. Based on the ergonomic and economic criterias within a work system, the task al作者: RAGE 時間: 2025-3-30 08:49 作者: infarct 時間: 2025-3-30 12:27
Development of an AI-Based Method for Dynamic Affinity-Based Warehouse Slotting Using Indoor Localisgenerate close-to-real-time location and movement data of logistic staff during order picking processes. By applying k-Means cluster analysis methods, the localization data from the indoor localization system can be used in combination with other data sources (e.g. customer orders to be fulfilled, h