用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3 Muthukrishnan Senthilkumar,Vijayalakshmi Ramasamy

[复制链接]
查看: 20297|回复: 57
发表于 2025-3-21 16:40:03 | 显示全部楼层 |阅读模式
书目名称Computational Intelligence, Cyber Security and Computational Models
副标题Proceedings of ICC3
编辑Muthukrishnan Senthilkumar,Vijayalakshmi Ramasamy,
视频video
概述ideas in the field of computer science and mathematics.theory and applications, to provide design, analysis and modelling.of Computational Intelligence, Cyber Security, and Computational Models.Useful
丛书名称Advances in Intelligent Systems and Computing
图书封面Titlebook: Computational Intelligence, Cyber Security and Computational Models; Proceedings of ICC3  Muthukrishnan Senthilkumar,Vijayalakshmi Ramasamy
描述.This bookaims at promoting high-quality research by researchers and practitioners fromacademia and industry at the .InternationalConference on Computational Intelligence, Cyber Security, and ComputationalModels ICC3 2015. organized by PSG College of Technology, Coimbatore, Indiaduring December 17 – 19, 2015. This book enriches with innovations in broadareas of research like computational modeling, computational intelligence andcyber security. These emerging inter disciplinary research areas have helped tosolve multifaceted problems and gained lot of attention in recent years. Thisencompasses theory and applications, to provide design, analysis and modelingof the aforementioned key areas..
出版日期Conference proceedings 2016
关键词Computational Intelligence; Cyber Security; Computational Models; ICC3 2015; ICC3; Combinatorial Optimiza
版次1
doihttps://doi.org/10.1007/978-981-10-0251-9
isbn_softcover978-981-10-0250-2
isbn_ebook978-981-10-0251-9Series ISSN 2194-5357 Series E-ISSN 2194-5365
issn_series 2194-5357
copyrightSpringer Science+Business Media Singapore 2016
The information of publication is updating

书目名称Computational Intelligence, Cyber Security and Computational Models影响因子(影响力)




书目名称Computational Intelligence, Cyber Security and Computational Models影响因子(影响力)学科排名




书目名称Computational Intelligence, Cyber Security and Computational Models网络公开度




书目名称Computational Intelligence, Cyber Security and Computational Models网络公开度学科排名




书目名称Computational Intelligence, Cyber Security and Computational Models被引频次




书目名称Computational Intelligence, Cyber Security and Computational Models被引频次学科排名




书目名称Computational Intelligence, Cyber Security and Computational Models年度引用




书目名称Computational Intelligence, Cyber Security and Computational Models年度引用学科排名




书目名称Computational Intelligence, Cyber Security and Computational Models读者反馈




书目名称Computational Intelligence, Cyber Security and Computational Models读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 20:21:11 | 显示全部楼层
https://doi.org/10.1007/978-3-8349-9845-3 objects between them by grid formation. Thirdly, the hand signaling of the student using convex hull is recognized and the alert is given to the invigilator. The system is built using C/C++ and OpenCV library that shows the better performance in the real-time video frames.
发表于 2025-3-22 02:34:15 | 显示全部楼层
发表于 2025-3-22 05:07:04 | 显示全部楼层
https://doi.org/10.1007/978-3-8349-9845-3Data set. The results obtained from the experiment are based on the empirical evidence of the document clustering based on the spatial references present in them. It is concluded that the proposed work will provide users a new way in retrieving documents that have similar spatial references in them.
发表于 2025-3-22 09:39:02 | 显示全部楼层
Performance Analysis of ApEn as a Feature Extraction Technique and Time Delay Neural Networks, Multiication of epilepsy risk levels from EEG signals. The analysis is done in terms of bench mark parameters such as Performance Index (PI), Quality Values (QV), Sensitivity, Specificity, Time Delay and Accuracy.
发表于 2025-3-22 15:55:58 | 显示全部楼层
Suspicious Human Activity Detection in Classroom Examination objects between them by grid formation. Thirdly, the hand signaling of the student using convex hull is recognized and the alert is given to the invigilator. The system is built using C/C++ and OpenCV library that shows the better performance in the real-time video frames.
发表于 2025-3-22 20:08:00 | 显示全部楼层
, State Estimation of Discrete Time Delayed Neural Networks with Multiple Missing Measurements Usinchnique is incorporated to deal with partitioned double summation terms and the conservatism of conditions for the state estimator synthesis is reduced efficiently. Finally, a numerical example is given to demonstrate the effectiveness of the proposed design method.
发表于 2025-3-22 21:34:01 | 显示全部楼层
A Fuzzy Methodology for Clustering Text Documents with Uncertain Spatial ReferencesData set. The results obtained from the experiment are based on the empirical evidence of the document clustering based on the spatial references present in them. It is concluded that the proposed work will provide users a new way in retrieving documents that have similar spatial references in them.
发表于 2025-3-23 04:03:49 | 显示全部楼层
发表于 2025-3-23 06:44:57 | 显示全部楼层
https://doi.org/10.1007/978-3-8349-9845-3to conventional GA. In addition, an autonomous self-healing system for FPGA based signal processing system is proposed using the presented pruning based GA for intrinsic evolution with the goal of reduced power consumption and faster recovery time.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-11 13:27
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表