International Conference of Soft Computing and Pattern Recognition最新文献

筛选
英文 中文
Sentiment Analysis on Tweets for Trains Using Machine Learning 使用机器学习对火车推文进行情感分析
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_10
Sachin Kumar, M. Nezhurina
{"title":"Sentiment Analysis on Tweets for Trains Using Machine Learning","authors":"Sachin Kumar, M. Nezhurina","doi":"10.1007/978-3-030-17065-3_10","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_10","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk Assessment 基于规则信任风险评估的防火墙过滤服务新概念
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_30
Faouzi Jaïdi
{"title":"A Novel Concept of Firewall-Filtering Service Based on Rules Trust-Risk Assessment","authors":"Faouzi Jaïdi","doi":"10.1007/978-3-030-17065-3_30","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_30","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116349476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combinatorial Optimization Method Considering Distance in Scheduling Problem 考虑距离的调度问题组合优化方法
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_15
Y. Obinata, K. Tamura, J. Tsuchiya, K. Yasuda
{"title":"Combinatorial Optimization Method Considering Distance in Scheduling Problem","authors":"Y. Obinata, K. Tamura, J. Tsuchiya, K. Yasuda","doi":"10.1007/978-3-030-17065-3_15","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_15","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model Driven Architectural Design of Information Security System 模型驱动的信息安全体系结构设计
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_35
Ivan Gaidarski, Z. Minchev, R. Andreev
{"title":"Model Driven Architectural Design of Information Security System","authors":"Ivan Gaidarski, Z. Minchev, R. Andreev","doi":"10.1007/978-3-030-17065-3_35","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_35","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130715499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Ensemble Prediction Accuracy of Breast Cancer Survivability and Diabetes Diagnostic Using Optimized EKF-RBFN Trained Prototypes 利用优化的EKF-RBFN训练原型提高乳腺癌生存能力和糖尿病诊断的集成预测准确性
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_6
Vincent F. Adegoke, Daqing Chen, E. Banissi, Safia Barsikzai
{"title":"Enhancing Ensemble Prediction Accuracy of Breast Cancer Survivability and Diabetes Diagnostic Using Optimized EKF-RBFN Trained Prototypes","authors":"Vincent F. Adegoke, Daqing Chen, E. Banissi, Safia Barsikzai","doi":"10.1007/978-3-030-17065-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_6","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132648153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Network Security Evaluation and Training Based on Real World Scenarios of Vulnerabilities Detected in Portuguese Municipalities' Network Devices 基于葡萄牙市政当局网络设备检测漏洞的真实世界场景的网络安全评估和培训
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_29
D. J. Franco, R. Silva, A. Muhammed, O. K. Akram, Andreia Graça
{"title":"Network Security Evaluation and Training Based on Real World Scenarios of Vulnerabilities Detected in Portuguese Municipalities' Network Devices","authors":"D. J. Franco, R. Silva, A. Muhammed, O. K. Akram, Andreia Graça","doi":"10.1007/978-3-030-17065-3_29","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_29","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Discrete Wavelet Transform Application in Variable Displacement Pumps Condition Monitoring 离散小波变换在变量泵状态监测中的应用
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_13
Molham Chikhalsouk, B. Esakki, Khalid Zhouri, Yassin Nmir
{"title":"Discrete Wavelet Transform Application in Variable Displacement Pumps Condition Monitoring","authors":"Molham Chikhalsouk, B. Esakki, Khalid Zhouri, Yassin Nmir","doi":"10.1007/978-3-030-17065-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_13","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114096069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diverse Ranking Approach in MCDM Based on Trapezoidal Intuitionistic Fuzzy Numbers 基于梯形直觉模糊数的MCDM多元排序方法
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_2
Z. Tarmudi, N. A. Rahman
{"title":"Diverse Ranking Approach in MCDM Based on Trapezoidal Intuitionistic Fuzzy Numbers","authors":"Z. Tarmudi, N. A. Rahman","doi":"10.1007/978-3-030-17065-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_2","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":" 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131809750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Warning of Affected Users About an Identity Leak 对受影响用户的身份泄露警告
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_28
Timo Malderle, Matthias Wübbeling, S. Knauer, M. Meier
{"title":"Warning of Affected Users About an Identity Leak","authors":"Timo Malderle, Matthias Wübbeling, S. Knauer, M. Meier","doi":"10.1007/978-3-030-17065-3_28","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_28","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"160 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Passive Video Forgery Detection Considering Spatio-Temporal Consistency 考虑时空一致性的被动视频伪造检测
International Conference of Soft Computing and Pattern Recognition Pub Date : 2018-12-13 DOI: 10.1007/978-3-030-17065-3_38
Kazuhiro Kono, T. Yoshida, Shoken Ohshiro, N. Babaguchi
{"title":"Passive Video Forgery Detection Considering Spatio-Temporal Consistency","authors":"Kazuhiro Kono, T. Yoshida, Shoken Ohshiro, N. Babaguchi","doi":"10.1007/978-3-030-17065-3_38","DOIUrl":"https://doi.org/10.1007/978-3-030-17065-3_38","url":null,"abstract":"","PeriodicalId":145803,"journal":{"name":"International Conference of Soft Computing and Pattern Recognition","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123741192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信