分贝 发表于 2025-3-26 23:03:45

A Comparative Study of Various Apriori and FP-Growth Tree-Based Incremental Mining Methods,tting updated. Each time either some new data instances are added and some obsolete data instances are deleted. As a result, traditional association mining is not much used in real-world applications. So, mining these changing databases is a big challenge in front of practitioners. This led to the e

Mumble 发表于 2025-3-27 01:26:17

http://reply.papertrans.cn/88/8705/870482/870482_32.png

抒情短诗 发表于 2025-3-27 08:29:05

http://reply.papertrans.cn/88/8705/870482/870482_33.png

FLOAT 发表于 2025-3-27 12:34:37

Modeling of Discrete Jaya Optimized Frequency Controller for Renewable-Based Interconnected Power Sareas in which both the conventional power plant and renewable-based plant have been considered. Normally, the control signal fed to the speed governor or plant is a pulse-type signal. So, to convert the analogous signal into digital, a zero-order hold circuit is used. However, it is observed that m

树胶 发表于 2025-3-27 13:57:16

Grey Wolf Optimizer for Data Envelopment Analysis,l governorship and hunting nature of grey wolves. Data envelopment analysis (DEA) is a data-oriented decision support technique that helps decision-makers select the best potential solutions among a group of candidate solutions. In the current study, we propose GWO algorithm for solving DEA problems

Cardiac 发表于 2025-3-27 19:15:34

http://reply.papertrans.cn/88/8705/870482/870482_36.png

GUILE 发表于 2025-3-28 00:15:23

http://reply.papertrans.cn/88/8705/870482/870482_37.png

LIEN 发表于 2025-3-28 04:39:53

http://reply.papertrans.cn/88/8705/870482/870482_38.png

不爱防注射 发表于 2025-3-28 08:44:44

A Secure Data Transfer in Cloud Environment Using Double-Layer Security for Internet of Medical Thikey to enabling the safe delivery of healthcare. A significant issue is that a considerable number of the machine-to-machine (M2M) conventions utilized today are characteristically uncertain, leaving IoMT gadgets at the edge of the system vulnerable to attacks. Hackers influence traded off IoMT gadg

模仿 发表于 2025-3-28 13:02:16

Grey Wolf Optimizer for Data Envelopment Analysis,kers select the best potential solutions among a group of candidate solutions. In the current study, we propose GWO algorithm for solving DEA problems. Moreover, we present a real-life application of the proposed approach to the education sector.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Soft Computing for Problem Solving; Proceedings of SocPr Aruna Tiwari,Kapil Ahuja,Atulya K. Nagar Conference proceedings 2021 The Editor(s)