杀菌剂 发表于 2025-3-25 04:34:52

http://reply.papertrans.cn/23/2290/228951/228951_21.png

催眠 发表于 2025-3-25 10:18:30

Fusion of Features from Mammogram and DBT Views for Detection of Breast Tumour,is used to advance precision in discovery of breast cancer. Methods are developed in the four phases like pre-processing, segmentation, feature mining and classifications. SVM and KNN algorithms are used in the classification of breast cancer.

考博 发表于 2025-3-25 14:19:10

http://reply.papertrans.cn/23/2290/228951/228951_23.png

磨坊 发表于 2025-3-25 19:03:14

http://reply.papertrans.cn/23/2290/228951/228951_24.png

ineptitude 发表于 2025-3-25 22:34:39

http://reply.papertrans.cn/23/2290/228951/228951_25.png

爱国者 发表于 2025-3-26 03:15:59

Anomaly Detection in Social Media Using Text-Mining and Emotion Classification with Emotion Detecti, emotion classification classified with the different emotions like happy, sad, fear, disgust, anger, surprise, trust. This paper aimsto analyze anomaly detection in social media with micro-blogs. The study deepens with text mining and emotion classification techniques from different authors.

供过于求 发表于 2025-3-26 04:21:43

Approach to Machine Learning for Secured Cloud Computing, we have adopted a novel method in the machine learning process that uses the combination of past and current decisions. And it calculates a final decision by computing the majority of the all the decisions. This approach is more efficient compared to all other classic learning algorithms.

inundate 发表于 2025-3-26 10:35:47

COVID-19 Detection Using Deep Learning Based Medical Image Segmentation,ited by discontinuous ground-glass and acquisitions, as well as clinical alterations. Deep learning-based techniques, primarily Convolutional Neural Networks (CNN), had successfully proved remarkable therapeutic outcomes. Moreover, CNNs are unable to capture complex features amongst images examples,

EXPEL 发表于 2025-3-26 16:28:16

http://reply.papertrans.cn/23/2290/228951/228951_29.png

Bmd955 发表于 2025-3-26 19:22:37

EAP Based Certificateless Authentication Technique to Access Cloud Services in Openstack,ce with our proposed authentication method. We have done the performance analysis of our authentication method compared with the other authentication mechanism to access cloud services. This analysis shows a significant reduction in the computation time required for authentication and reduction in t
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Cognition and Recognition; 8th International Co D. S. Guru,Sharath Kumar Y. H.,Manabu Ichino Conference proceedings 2022 The Editor(s) (if