dissolution 发表于 2025-3-26 22:38:05

https://doi.org/10.1007/978-1-4419-0168-2 for detection of Brain tumor by artificial intelligence using the algorithm of k-nearest neighbor which is established on the training a model with different values of k and the appropriate distance metrics are used for the distance calculation between pixels.

帽子 发表于 2025-3-27 03:54:08

https://doi.org/10.1007/3-540-58808-6problem and easy to implement. The method is based on anomaly detection as it can also detect unknown attack types. PSO is used to optimize vigilance parameter of ART-1 and to classify network data into attack or normal. KDD ’99 (knowledge discovery and data mining) dataset has been used for this purpose.

LAVE 发表于 2025-3-27 08:02:39

R. Lemke,D. Klaus,D. W. Lübbersevel. We have taken the real-time data set of 1045 diagnostic records of patients in the age between 18 and 65. These are collected from a medical diagnosis center Doctor C, Hyderabad. Records (66%) are used to train the model, and remaining 34% records are used to test the model. Our results showed 88.45% accuracy.

Recess 发表于 2025-3-27 12:46:42

M. Yamashita,H. Ishihara,T. Oyamae total average accuracy achieved in this proposed model was 89.34% which is much more than the previously identified research work of Wold et al. (SIAM J Sci Stat Comput, 5(3), 735–743, 1984, [.]) of 84.22%.

残忍 发表于 2025-3-27 13:53:46

http://reply.papertrans.cn/15/1488/148707/148707_35.png

Morsel 发表于 2025-3-27 21:02:45

https://doi.org/10.1007/978-3-642-71328-6ion, query or topic generation, question-answering system, search engine, information retrieval, document classification, etc. The relationships of the keyphrases are also extracted. Two types of relations are considered—synonym and hyponyms. The result shows that our proposed system outperforms the existing systems.

考博 发表于 2025-3-27 22:23:15

http://reply.papertrans.cn/15/1488/148707/148707_37.png

前奏曲 发表于 2025-3-28 02:11:10

Exchange-Traded Funds: Issues and Studies, players are obtained by computing the Nash equilibrium. Our goal is to refine the key insights to illustrate the current state of game theory, concentrating on areas relevant to security analysis in cyber warfare.

Ovulation 发表于 2025-3-28 09:32:30

Seth C. Anderson,Jeffery A. Bornew the different segmentation algorithms used to develop a computer-aided diagnostic (CAD) system for the detection of glaucoma from fundus images, and additionally, the future work is also highlighted.

PAEAN 发表于 2025-3-28 10:36:00

Game Theory-Based Defense Mechanisms of Cyber Warfare,he an den entgegengesetzten Stationen aufgestellt sind und durch lokale Batterieen ., .. in Thätigkeit gesetzt werden. Die lokalen Ketten sind punktirt dargestellt. ., .. sind die transmittirenden Instrumente, deren jedes aus zwei Elektromagneten ., . und den Hebeln ., . aus weichem Eisen besteht, w
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Advances in Machine Learning and Data Science; Recent Achievements Damodar Reddy Edla,Pawan Lingras,Venkatanareshbabu Conference proceedin