標題: Titlebook: Advanced Computing Technologies and Applications; Proceedings of 2nd I Hari Vasudevan,Antonis Michalas,Meera Narvekar Conference proceeding [打印本頁] 作者: 大破壞 時間: 2025-3-21 20:08
書目名稱Advanced Computing Technologies and Applications影響因子(影響力)
書目名稱Advanced Computing Technologies and Applications影響因子(影響力)學科排名
書目名稱Advanced Computing Technologies and Applications網絡公開度
書目名稱Advanced Computing Technologies and Applications網絡公開度學科排名
書目名稱Advanced Computing Technologies and Applications被引頻次
書目名稱Advanced Computing Technologies and Applications被引頻次學科排名
書目名稱Advanced Computing Technologies and Applications年度引用
書目名稱Advanced Computing Technologies and Applications年度引用學科排名
書目名稱Advanced Computing Technologies and Applications讀者反饋
書目名稱Advanced Computing Technologies and Applications讀者反饋學科排名
作者: Barrister 時間: 2025-3-21 20:28
Voice Assistant for Ubuntu Implementation Using Deep Neural Network,978-3-662-33881-0作者: Interim 時間: 2025-3-22 00:44
Analysis of Light Pollution Prediction Using Mathematical Model and Machine Learning Techniques,978-3-642-94678-3作者: Invigorate 時間: 2025-3-22 05:25 作者: 惡名聲 時間: 2025-3-22 11:19
An Efficient E-Commerce Design by Implementing a Novel Data Mapper for Polyglot Persistence,978-3-7091-5382-6作者: PATHY 時間: 2025-3-22 13:17 作者: 法官 時間: 2025-3-22 19:56
https://doi.org/10.1057/9781137425959ions which are best suited and big 5 test for identifying a user’s overall personality. According to the results, the bot will suggest a list of job opportunities well suited for the user. Once the user has selected a job, the chatbot will start mentoring the user in achieving all the necessary skil作者: 解決 時間: 2025-3-22 21:40 作者: Subdue 時間: 2025-3-23 02:50 作者: CBC471 時間: 2025-3-23 06:01
Mark J. Machina,Bertrand Munierp develop enhanced security methods for IoT systems. Proposed system consists of wearable sensors to collect user data and LoRaWAN to connect with the Internet. These measure pulse rate and body temperature of patient and monitor vital signs of health. A standalone local server processes raw sensor 作者: 閑逛 時間: 2025-3-23 13:16 作者: Increment 時間: 2025-3-23 17:57
Jacek Mańdziuk,Przemys?aw Sza?ajoposed a hybrid learning scheme that uses one such optimization technique which will be used to figure out an optimal set of input-hidden node weights, and then a set of optimal input weights are used to determine the output weights analytically. Few of the techniques that are used for optimization 作者: filial 時間: 2025-3-23 18:01 作者: 我正派 時間: 2025-3-23 23:26 作者: 使無效 時間: 2025-3-24 05:56
IndoorNet: Generating Indoor Layouts from a Single Panorama Image,erschiedenste Formen von Reizwirkungen oder Allergien an der Haut und den Schleimh?uten des Menschen ausl?sen k?nnen..Der .erste, allgemeine Teil. dieses Buches behandelt eingehend die .wissenschaftlichen Grundlagen.. Ein .zweiter, spezieller Teil. erg?nzt dies durch zahlreiche .Steckbriefe. in alph作者: FACET 時間: 2025-3-24 08:54
Improvement of Lightweight Integrity Verification Algorithm Using TDHA,samt 12 Modulen befassen sich zwei mit der Struktur und Funktion der pflanzlichen Zelle. Je ein Modul behandelt die Grundorgane der Landpflanzen Wurzel, Spross und Blatt, sowie den Aufbau von Blüten und die unterschiedlichen Samen und Früchte. Ein weiteres Modul stellt exemplarisch verschiedene Vert作者: 十字架 時間: 2025-3-24 14:45 作者: 與野獸博斗者 時間: 2025-3-24 15:51
Crowdsourcing for Urban Laborers and Time Optimization,indungen stellen den überwiegenden Teil der Trockensubstanz der Kulturpflanzen dar. Zum gr??ten Teil sind auch die ?anorganischen“ Elemente in der pflanzlichen Trockensubstanz ?organisch“ gebunden, d. h. Bestandteil von organischen bzw. Kohlenstoffverbindungen.作者: Conquest 時間: 2025-3-24 19:16 作者: DEI 時間: 2025-3-25 02:05 作者: Indelible 時間: 2025-3-25 04:34 作者: Credence 時間: 2025-3-25 07:54
Intelligent System to Diagnose LBP Using Genetic Algorithm and Support Vector Machine,ozesse erforderliche Energie durch die Oxidation der von den Pflanzen gebildeten Biomasse; unter Verbrauch von Sauerstoff entsteht wieder CO.. Die von den Pflanzen eingefangene Sonnenenergie bildet so auch die Energiequelle für den Ablauf der Lebensprozesse der Tiere.作者: 使絕緣 時間: 2025-3-25 14:02 作者: Fibrillation 時間: 2025-3-25 18:30
Implementation of Residual Network (ResNet) for Devanagari Handwritten Character Recognition,t effect on root diameter was found. However, the root morphology of tomato was influenced already by an low inoculum amount of 0.1 oospores per ml. We have to test in further experiments whether root length is also useful as a measuring parameter for the assessment of the influence of bacterial microorganisms against ..作者: amyloid 時間: 2025-3-25 21:46 作者: Abduct 時間: 2025-3-26 00:47 作者: grounded 時間: 2025-3-26 07:56
https://doi.org/10.1007/978-981-15-3242-9ICACTA 2019; Linguistic Computing; Data Computing; Statistical Computing; Ambient Applications; Social Ne作者: BANAL 時間: 2025-3-26 08:28 作者: 運氣 時間: 2025-3-26 15:43 作者: 厭倦嗎你 時間: 2025-3-26 19:18
Algorithms for Intelligent Systemshttp://image.papertrans.cn/a/image/145374.jpg作者: 罵人有污點 時間: 2025-3-26 22:45
https://doi.org/10.1057/9781137425959ormed decision about career and education. Therefore, career counselling plays a very vital role but there is a lack of importance for career counselling in schools and colleges. Hence, this paper reflects the methods through which personalized career counselling for students can be implemented. To 作者: Rejuvenate 時間: 2025-3-27 01:52 作者: Manifest 時間: 2025-3-27 05:31
https://doi.org/10.1057/9781137425959ication network of connected devices offering ubiquitous services to users. IoT follows various communication patterns between users and devices. However, there are various upcoming security threats and vulnerabilities in the IoT. In this paper, we analyze how an increasing number of devices connect作者: Scleroderma 時間: 2025-3-27 10:51
https://doi.org/10.1057/9781137425959 area above a given threshold. Skyglow, over-illumination, trespass of light, and unnecessary glare are some of the major causes for this kind of pollution. Research done over the years has gathered evidence that it causes a lot of health-related issues in men and women both. It also leads to a chan作者: 流眼淚 時間: 2025-3-27 16:07 作者: Myocyte 時間: 2025-3-27 18:03 作者: GIDDY 時間: 2025-3-27 23:15
https://doi.org/10.1057/9781137425959is crypto-system makes use of key exchange algorithm to establish a secret key for future communication. Such algorithms rely on the generation of private keys by each node which becomes a challenge for these devices that are resource constrained in terms of power and memory. The solution proposed h作者: 不足的東西 時間: 2025-3-28 02:14
https://doi.org/10.1057/9781137425959ed changes to sensitive and confidential data. In this paper, we present a research on the various lightweight data integrity algorithms such as lightweight integrity verification (LIVE), the Secure Hash Algorithms (SHA1, SHA2, SHA3), lightweight one-way cryptographic hash algorithm (LOCHA), timesta作者: 哺乳動物 時間: 2025-3-28 09:10 作者: Chivalrous 時間: 2025-3-28 11:51 作者: 支架 時間: 2025-3-28 15:14
Arnold Chassagnon,Jean-Christophe Vergnaudd in medical field. It plays various roles in it like: diagnosing, assisting, interpreting, operating, etc. Lower back pain (LBP) is a common situation of human spine affected in all ranges of population nowadays. As it is a condition of spine, if not correctly diagnosed at the first occurrence, it 作者: 非秘密 時間: 2025-3-28 22:44 作者: NATAL 時間: 2025-3-29 02:18 作者: 膽小鬼 時間: 2025-3-29 06:29 作者: CURB 時間: 2025-3-29 09:54 作者: 紡織品 時間: 2025-3-29 13:40
Jacek Mańdziuk,Przemys?aw Sza?ajural network can be trained. ELM is known as extreme learning machine; a novel algorithm has come under the spotlight in the last decade, and the reason for its popularity is a rapid learning rate and a more efficient generalization capability, in comparison with orthodox gradient descent learning a作者: 高調 時間: 2025-3-29 17:42 作者: relieve 時間: 2025-3-29 22:56 作者: 是他笨 時間: 2025-3-30 03:40 作者: 過份 時間: 2025-3-30 06:49 作者: 跑過 時間: 2025-3-30 10:47
https://doi.org/10.1057/9781137425959ere is to make use of a lightweight random number generator to be used as private key in ECC- Elliptical Curve Cryptography Hellman system. This would substantially bring down computational costs and thus save resources for they are allocated in the first place.作者: patriot 時間: 2025-3-30 12:49 作者: entice 時間: 2025-3-30 17:37 作者: 運動吧 時間: 2025-3-30 23:59
Beliefs, Interactions and Preferencesrains and buses to suggest a cost-efficient path to ease the worker’s travel in a new city. The deep learning approach further enhances the recommender system efficiency by approximating rank for each job before recommending them to the worker.作者: 伸展 時間: 2025-3-31 04:54 作者: Prostatism 時間: 2025-3-31 08:56
Making Diplomacy Bots Individual,d value which was determined using stochastic approaches. Thus, the obtained results concerning the detection ability of the autoencoder, compared to that of random forest algorithm, is also encouraging, with autoencoder limiting the percentage of false positive attacks which is proved to be fatal for an intrusion detection system.作者: 釋放 時間: 2025-3-31 09:15
2524-7565 searchers, academics and industry professionals.This book features selected papers presented at the 2nd International Conference on Advanced Computing Technologies and Applications, held at SVKM’s Dwarkadas J. Sanghvi College of Engineering, Mumbai, India, from 28 to 29 February 2020. Covering recen作者: 爆米花 時間: 2025-3-31 16:30
https://doi.org/10.1057/9781137425959akes input as voice commands, processes it and performs action accordingly. The system will first record the user action in the form of audio signal. Then, it will process the audio signal to generate the text. At last, it will interpret and perform an appropriate action. The system uses deep neural network (DNN) for speech to text conversion.作者: 深淵 時間: 2025-3-31 19:09 作者: 煩人 時間: 2025-4-1 00:33
2524-7565 t advances in next-generation computing, the book focuses on recent developments in intelligent computing, such as linguistic computing, statistical computing, data computing and ambient applications..978-981-15-3244-3978-981-15-3242-9Series ISSN 2524-7565 Series E-ISSN 2524-7573 作者: 暗語 時間: 2025-4-1 05:51 作者: 消極詞匯 時間: 2025-4-1 09:44
https://doi.org/10.1057/9781137425959n overview of these algorithms and second, to suggest changes that will further improve the performance of one of these lightweight algorithms, namely LIVE. We suggest an improvement to traditional token generation in LIVE using TDHA instead of SHA-1. A refinement of content signing and verification using the leapfrog technique is also proposed.