锯齿状 发表于 2025-3-25 03:53:11

Stochastic Processes and Their Applicationsnt years, predictive modeling using ensemble learning techniques has increased the attention of researchers to develop competent models for various predictive tasks. Ensemble techniques combine the predictions of multiple models to yield a single consolidated decision. Thus, predictive modeling with

Cirrhosis 发表于 2025-3-25 08:35:57

http://reply.papertrans.cn/24/2324/232363/232363_22.png

AGONY 发表于 2025-3-25 12:40:44

Phase Dependent Population Growth Models to increase port efficiency by integrating state-of-the-art technology with port management and predicting a ship’s estimated time of arrival (ETA) is a critical step towards establishing a smart port system. This study aims to develop a data-driven model to estimate the ETA of incoming ships to Po

形容词 发表于 2025-3-25 16:45:33

Ann-Lee Wang,David Vere-Jones,Xiao-gu Zhengh area for security researchers. Several proposed techniques partially achieve the automatic test case generation of detecting security issues that target specific programming languages or API types. This review paper performs a comparative analysis of research papers published during 2010–21 specif

AROMA 发表于 2025-3-25 21:47:01

Computational Modeling of Multilevel Organizational Learning: From Conceptual to Computational Mech of organizational learning. It is discussed how various conceptual mechanisms in multilevel organizational learning as identified in the literature, can be formalized by computational mechanisms which provide mathematical formalizations that enable computer simulation. The formalizations have been

眨眼 发表于 2025-3-26 00:59:23

Deep Learning-Based Black Hole Detection Model for WSN in Smart Grid,ted by malicious nodes in WSN at the same time, which leads to a black hole (BH) attack in the system. The BH attacks block the data instead of forwarding it to the destination. In order to overcome this, the proposed method adopts deep learning-based scheme to detect BH attacks in WSN. The proposed

Cholecystokinin 发表于 2025-3-26 06:31:31

http://reply.papertrans.cn/24/2324/232363/232363_27.png

fertilizer 发表于 2025-3-26 09:11:00

Learning to Transfer Knowledge Between Datasets to Enhance Intrusion Detection Systems,ever, by splitting the control layer and data layer, the SDN architecture also attracts numerous types of attacks such as spoofing or information disclosure. In the recent years, a few research articles coped with the security problem by introducing open datasets and classification techniques to det

callous 发表于 2025-3-26 13:05:17

http://reply.papertrans.cn/24/2324/232363/232363_29.png

orthodox 发表于 2025-3-26 19:55:08

Building Web-Based Subject-Specific Corpora on the Desktop: Evaluation of Search Metrics,rawlers and take document similarity algorithms for selection. We take a different lean resource approach by applying traditional search metrics with a relatively large (more than 100 search terms) ‘bag of domain words’ approach on the colossal clean crawled corpus. This approach enables one to buil
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Computational Intelligence; Select Proceedings o Anupam Shukla,B. K. Murthy,Jean-Paul Van Belle Conference proceedings 2023 The Editor(s) (