標題: Titlebook: Unconventional Computing; A Volume in the Ency Andrew Adamatzky Reference work 2018 Springer Science+Business Media, LLC, part of Springer [打印本頁] 作者: incoherent 時間: 2025-3-21 18:22
書目名稱Unconventional Computing影響因子(影響力)
作者: PAC 時間: 2025-3-21 20:21
Tetsuya AsaiR. The accuracy achieved with different SVM kernels varied from 24.17% to 85.07% with training-testing ratio of 70–30% for 16,240 entries in the dataset. The 10-fold cross validation is performed to prove the robustness of the kernel with SVM.作者: 寬宏大量 時間: 2025-3-22 03:24
Joanne Macdonald,Darko Stefanovic,Milan Stojanovicnd Semantic Computing for Object Modeling; SCME, 1st Symposium on Conceptual Modeling Education; and PhD Symposium. Continuing the ER tradition, the ER 2013 workshops provided researchers, students, and industry professionals with a forum to present and discuss emerging, cutting-edge topics related to conceptual modeling and its applications.作者: DEMUR 時間: 2025-3-22 05:37
Reference work 2018etical and experimental findings, prepared by the world leaders in unconventional computing. Topics covered include bacterial computing, artificial chemistry, amorphous computing, computing with Solitons, evolution in materio, immune computing, mechanical computing, molecular automata, membrane comp作者: FILLY 時間: 2025-3-22 10:04
2629-2327 nd engineering.Extensively illustrated with many graphical e.This volume of the Encyclopedia of Complexity and Systems Science, Second Edition, is a unique collection of concise overviews of state-of-art, theoretical and experimental findings, prepared by the world leaders in unconventional computin作者: 擁擠前 時間: 2025-3-22 15:45
John H. Reif analysis. Linear Regression, Exponential, Parabolic, Power function, Logarithmic, polynomial of degree 2 and 4 curves are shown as cases. Novel facts related to business forecasting in the light of machine learning classifiers have been pointed out leading to new directions in the field of research in business analytics.作者: 正常 時間: 2025-3-22 20:56
Evgeny Katz data structure can be designed which allowed updates in constant time and supports fingers. We answer the question in the affirmative by giving an algorithm in the RAM with logarithmic word size model [1].作者: 好開玩笑 時間: 2025-3-22 23:15
Christof Teuschers, a model of historical spatio-temporal trajectories analysis combined with web browsing behavior is proposed to discover the relationship among them. A large-scale real-life mobile data set has been used in constructing the system, the performance of which is evaluated to be effective, efficient and user-friendly.作者: Obsessed 時間: 2025-3-23 04:24 作者: 確定方向 時間: 2025-3-23 07:46 作者: 把手 時間: 2025-3-23 11:26
iminate the need for costly inter-iteration I/O. Thus, the total number of I/O operations has been minimized and I/O operations are needed only to input the matrix to be inverted and to retrieve its inverse.作者: AMITY 時間: 2025-3-23 14:14
Viv Kendontransformer models: Bangla BERT, Bengali DistilBERT, and XLM-RoBERTa. Using transformer models, we achieved a very satisfactory score and the best performance we got was using the XML-RoBERTa model which achieved the highest accuracy of 85% and F1-score of 86%.作者: needle 時間: 2025-3-23 18:50 作者: Institution 時間: 2025-3-23 23:46 作者: 受辱 時間: 2025-3-24 03:37
Andrew Adamatzkyed technique for checking the completeness and well-formed-ness of a requirements specification in KAOS language. Such a technique can be useful, especially to business or requirements analysts in industries and research, to check that requirements specification in KAOS language is well formed.作者: chapel 時間: 2025-3-24 07:20
Computing in Geometrical Constrained Excitable Chemical Systems作者: MARS 時間: 2025-3-24 14:26
Enzyme-Based Logic Systems: Composition, Operation, Interfacing, and Applications作者: municipality 時間: 2025-3-24 15:17
Neuromorphic Computing Based on Organic Memristive Systems作者: Salivary-Gland 時間: 2025-3-24 20:16
Bruce J. MacLennan. A very general recognized control mechanism is regarded as vaccination strategy, which is deployed in order to defend the malicious object in the computer network. Finally we examine the effect of vaccination on performance of the controlling strategy of malicious objects in the network. The simul作者: acquisition 時間: 2025-3-25 02:21 作者: 天真 時間: 2025-3-25 04:06 作者: 清洗 時間: 2025-3-25 09:31
Andrew Adamatzky,Benjamin De Lacy Costellor analyzing and verifying the optimal number of clusters. To alleviate these issues, this paper aims to inspect various clustering algorithms from the theoretical and experimental perspectives. The experimental results elucidate the best algorithm from each categories using a physiological data set.作者: confederacy 時間: 2025-3-25 15:20
Simon Harding,Julian F. Millerthis scenario, a multilingual ontology to harmonize definitions and facilitate compliance is proposed. On the other hand, the crucial role of Social Media policies, their algorithms’ transparency, and educating roles are considered. This leads to the need for an enhanced regulation of social media, 作者: 震驚 時間: 2025-3-25 19:33 作者: eardrum 時間: 2025-3-25 20:49
Reference work 2018ems, enzyme-based computing, inductive Turing machines, reservoir computing, Grossone Infinity computing, slime mould computing, biomolecular data structures, parallelization of bio-inspired unconventional computing, and photonic computing..Unconventional computing is a cross-breed of computer scien作者: 神圣在玷污 時間: 2025-3-26 01:12
facilities and services to the tourists and travelers. With so many beauty and diversity in Indonesia, we should see this potential and create a container that can help the people in the world to see the natural beauty found in this country. If this can be realized it will cause a positive impact fo作者: 骨 時間: 2025-3-26 06:02 作者: Modify 時間: 2025-3-26 11:47
Bruce J. MacLennanted resources. In this paper a mathematical model is formulated, the two sources susceptible, vaccinated, infected, recovered nanonodes in the target population (e-.) and susceptible, infected, susceptible nanonodes in the attacking population (e-SIS) epidemic model generated in order to propagate m作者: fluoroscopy 時間: 2025-3-26 14:39 作者: 男生如果明白 時間: 2025-3-26 19:05
Thomas J. Naughton,Damien Woodsntional medical workflow and successfully decentralized and stabilized communication between caregivers and patients, making medical services more affordable and accessible to patients. The Internet of Medical Things (IoMT) has efficaciously unified the healthcare ecosystem and made remote patient m作者: 吼叫 時間: 2025-3-27 00:51
Bhavin J. Shastri,Alexander N. Tait,Thomas Ferreira de Lima,Mitchell A. Nahmias,Hsuan-Tung Peng,Paulh predicting disease in one part of the body either brain, heart or lungs, this paper focuses on three different organs brain, chest, and knee for better understanding the real word challenge where problems do not include crisp classification but the multiclass classification. For simplicity this pa作者: V切開 時間: 2025-3-27 03:13
Viv Kendon, due to the lack of resources, a few work has been done in detection of cyberbullying in social media for the Bangla language. In this paper, we have applied different transformer models to detect cyberbullying in social media. We have used a Bangla text dataset with 44,001 Bangla comments which ar作者: 火車車輪 時間: 2025-3-27 05:59
Darren Rand,Ken Steiglitzivision of image watermarking in the intellect that images have particular necessities. Watermarked medical images should not diverge relating to their creative complement because clinical interpretation of images should not be pretentious. Watermarking methods rely on discrete wavelet transform (DW作者: 裂縫 時間: 2025-3-27 09:44 作者: BRAWL 時間: 2025-3-27 16:54
Jerzy Gorecki,Joanna Natalia Goreckas is presented. Using hat functions for the approximation of function, we get a stable and efficient algorithm for numerically computing finite quaternion Mellin transform. Efficiency of the proposed method with numerical examples are illustrated. Graphical representation and error analysis is also 作者: 漂浮 時間: 2025-3-27 21:03 作者: 無關(guān)緊要 時間: 2025-3-28 01:58
H. John Caulfield,Lei Qianous disease that multiplies at a very fast rate. Although countries have prepared vaccines and have started with the process of vaccination, it has been advised by the government to follow the norms of wearing face masks, following social distancing and hand sanitization for atleast a few months fro作者: 和平主義者 時間: 2025-3-28 05:14 作者: 沒有貧窮 時間: 2025-3-28 09:57
Joanne Macdonald,Darko Stefanovic,Milan StojanovicChina in November 2013. The 30 revised full papers were carefully reviewed and selected out of 57 submissions. The papers are organized in sections related to the individual workshops: LSAWM, Legal and Social Aspects in Web Modeling; MoBiD, 1st International Workshop on Modeling and Management of Bi作者: LAVE 時間: 2025-3-28 12:31 作者: adipose-tissue 時間: 2025-3-28 18:10
Christof Teuschermo shows a relationship-discovery system of mobile users from their spatio-temporal trajectories. The system first matches all the access device IDs to places of interest (POI) on the map, and then finds out the access device IDs visited by more than one phone frequently or regularly. For these user作者: 孤僻 時間: 2025-3-28 20:17 作者: trigger 時間: 2025-3-29 02:50
Andrew Adamatzkyon, and analysis. Currently, KAOS is being used in areas such as business process modelling, and enterprise architecture (EA). But, an incomplete or malformed KAOS model can result to incomplete and erroneous requirements analysis, which in turn can lead to overall systems failure . Therefore, it is作者: cacophony 時間: 2025-3-29 05:21