找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Machine Learning and Data Science; Recent Achievements Damodar Reddy Edla,Pawan Lingras,Venkatanareshbabu Conference proceedin

[复制链接]
楼主: T-Lymphocyte
发表于 2025-3-26 22:38:05 | 显示全部楼层
https://doi.org/10.1007/978-1-4419-0168-2 for detection of Brain tumor by artificial intelligence using the algorithm of k-nearest neighbor which is established on the training a model with different values of k and the appropriate distance metrics are used for the distance calculation between pixels.
发表于 2025-3-27 03:54:08 | 显示全部楼层
https://doi.org/10.1007/3-540-58808-6problem and easy to implement. The method is based on anomaly detection as it can also detect unknown attack types. PSO is used to optimize vigilance parameter of ART-1 and to classify network data into attack or normal. KDD ’99 (knowledge discovery and data mining) dataset has been used for this purpose.
发表于 2025-3-27 08:02:39 | 显示全部楼层
R. Lemke,D. Klaus,D. W. Lübbersevel. We have taken the real-time data set of 1045 diagnostic records of patients in the age between 18 and 65. These are collected from a medical diagnosis center Doctor C, Hyderabad. Records (66%) are used to train the model, and remaining 34% records are used to test the model. Our results showed 88.45% accuracy.
发表于 2025-3-27 12:46:42 | 显示全部楼层
M. Yamashita,H. Ishihara,T. Oyamae total average accuracy achieved in this proposed model was 89.34% which is much more than the previously identified research work of Wold et al. (SIAM J Sci Stat Comput, 5(3), 735–743, 1984, [.]) of 84.22%.
发表于 2025-3-27 13:53:46 | 显示全部楼层
发表于 2025-3-27 21:02:45 | 显示全部楼层
https://doi.org/10.1007/978-3-642-71328-6ion, query or topic generation, question-answering system, search engine, information retrieval, document classification, etc. The relationships of the keyphrases are also extracted. Two types of relations are considered—synonym and hyponyms. The result shows that our proposed system outperforms the existing systems.
发表于 2025-3-27 22:23:15 | 显示全部楼层
发表于 2025-3-28 02:11:10 | 显示全部楼层
Exchange-Traded Funds: Issues and Studies, players are obtained by computing the Nash equilibrium. Our goal is to refine the key insights to illustrate the current state of game theory, concentrating on areas relevant to security analysis in cyber warfare.
发表于 2025-3-28 09:32:30 | 显示全部楼层
Seth C. Anderson,Jeffery A. Bornew the different segmentation algorithms used to develop a computer-aided diagnostic (CAD) system for the detection of glaucoma from fundus images, and additionally, the future work is also highlighted.
发表于 2025-3-28 10:36:00 | 显示全部楼层
Game Theory-Based Defense Mechanisms of Cyber Warfare,he an den entgegengesetzten Stationen aufgestellt sind und durch lokale Batterieen ., .. in Thätigkeit gesetzt werden. Die lokalen Ketten sind punktirt dargestellt. ., .. sind die transmittirenden Instrumente, deren jedes aus zwei Elektromagneten ., . und den Hebeln ., . aus weichem Eisen besteht, w
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-20 09:42
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表