標(biāo)題: Titlebook: Artificial Intelligence Techniques for Advanced Computing Applications; Proceedings of ICACT D. Jude Hemanth,G. Vadivu,Valentina Emilia Bal [打印本頁] 作者: 并排一起 時(shí)間: 2025-3-21 17:15
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications影響因子(影響力)
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications被引頻次
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications被引頻次學(xué)科排名
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications年度引用
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications年度引用學(xué)科排名
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications讀者反饋
書目名稱Artificial Intelligence Techniques for Advanced Computing Applications讀者反饋學(xué)科排名
作者: 縫紉 時(shí)間: 2025-3-21 21:25
https://doi.org/10.1007/978-1-4302-0352-0e life of the cluster and reduces the losses of the routing. Group maintenance is handed over to cluster head vehicles after cluster maintenance has been established. The proposed approach is generated in Network Simulator-2 by using some of the performance evaluation such as vehicle rate, vehicle s作者: abolish 時(shí)間: 2025-3-22 01:54 作者: 萬花筒 時(shí)間: 2025-3-22 05:28
https://doi.org/10.1007/978-1-4302-0352-0. In order to boost the energy potency more, DED clustering algorithm is implemented. Using this formula a node with higher residual energy, higher degree, and nearer to the base station is more possible elected as a cluster head which saves energy compared to exiting LEACH protocol. Proposed approa作者: 仔細(xì)閱讀 時(shí)間: 2025-3-22 10:32
https://doi.org/10.1007/978-1-4302-0352-0tment score that considers both individual movement and comparability of participation, consequently enables restorative moves to be made when not engaged learners or gatherings are distinguished. The stage enables learners to get to micro lecture videos and other excellent micro lecture assets wher作者: 使入迷 時(shí)間: 2025-3-22 13:00 作者: 多嘴多舌 時(shí)間: 2025-3-22 18:31 作者: maintenance 時(shí)間: 2025-3-23 01:17 作者: Harness 時(shí)間: 2025-3-23 03:31 作者: 狗舍 時(shí)間: 2025-3-23 09:29 作者: Axillary 時(shí)間: 2025-3-23 12:49
Stable Multi-agent Clustering Method to Improve the Security in VANET,e life of the cluster and reduces the losses of the routing. Group maintenance is handed over to cluster head vehicles after cluster maintenance has been established. The proposed approach is generated in Network Simulator-2 by using some of the performance evaluation such as vehicle rate, vehicle s作者: 稱贊 時(shí)間: 2025-3-23 16:54 作者: GUEER 時(shí)間: 2025-3-23 19:08
Railway Wagon Health Monitoring System Using E-BMA Protocol in Wireless Sensor Networks,. In order to boost the energy potency more, DED clustering algorithm is implemented. Using this formula a node with higher residual energy, higher degree, and nearer to the base station is more possible elected as a cluster head which saves energy compared to exiting LEACH protocol. Proposed approa作者: 使顯得不重要 時(shí)間: 2025-3-24 00:37
An Interactive Virtual E-Learning Framework Using Crowdsourced Analytics,tment score that considers both individual movement and comparability of participation, consequently enables restorative moves to be made when not engaged learners or gatherings are distinguished. The stage enables learners to get to micro lecture videos and other excellent micro lecture assets wher作者: 發(fā)芽 時(shí)間: 2025-3-24 04:18
Security for Data in IOT Using a New APS Elliptic Curve Light Weight Cryptography Algorithm,cipher text using his public key and can read the message. This is actually done in the case of a Elliptic Curve Cryptography. The lightweight cipher text is mainly to handle the low resource device on the IOT chain. By considering the naturality of all the devices over the IOT chain and to satisfy 作者: 持續(xù) 時(shí)間: 2025-3-24 10:10
Advanced Accident Avoiding, Tracking and SOS Alert System Using GPS Module and Raspberry Pi,ill be sent to the authorities with the images of the inside environment of the bus along with GPS location of the bus. The complete system uses RPi build around using ARMII76JZF-S Microprocessor. This has interface devices such as camera, GPS, speakers to microprocessor. This basic goal of this is 作者: 金盤是高原 時(shí)間: 2025-3-24 12:34
Review on Traffic Engineering and Load Balancing Techniques in Software Defined Networking,done through the modern age of networking SDN (Software Defined Networking), as it makes optimum use of resources in the network. We can have a quick glance where the techniques of traffic engineering (TE) perform for the traditional networks and even the new concept of networking known as SDN.作者: OVER 時(shí)間: 2025-3-24 17:18 作者: COMMA 時(shí)間: 2025-3-24 22:49 作者: 寵愛 時(shí)間: 2025-3-25 02:23
Conference proceedings 20210), held at the SRM Institute of Science and Technology, Chennai, India, on 23–24 January 2020.? It covers the areas of computational intelligence, artificial intelligence, machine learning, deep learning, big data, and applications of artificial intelligence in networking, IoT and bioinformatics.作者: integral 時(shí)間: 2025-3-25 05:54
,Introduction: Children’s Suffrage Studies, that households should attempt to stick to on a monthly basis and provides reminders for the same. The users can regulate the flow of water from water faucets directly using the application and data about the water used by the people can be stored in a database.作者: 微塵 時(shí)間: 2025-3-25 08:20 作者: 邊緣帶來墨水 時(shí)間: 2025-3-25 13:02 作者: Palpate 時(shí)間: 2025-3-25 16:49 作者: Ornament 時(shí)間: 2025-3-25 21:32
Methods for Epileptic Seizure Prediction Using EEG Signals: A Survey,nals and electroencephalogram (EEG). This paper focuses on the different methods and models used to predict seizure from EEG signals to lessen the burden on patients because of the unpredictable nature of seizures. Furthermore, it also gives insights about deep learning approaches used to predict epilepsy using the EEG signals.作者: 受辱 時(shí)間: 2025-3-26 02:08
Feature Selection Strategy for Academic Datasets Using Correlation Analysis, are many techniques for selecting the right features in data mining. A new methodology for selecting features based on correlation is proposed in this paper. Results prove that the features selected by correlation analysis increase the accuracy of the data mining models built.作者: 暴露他抗議 時(shí)間: 2025-3-26 06:43 作者: 勤勉 時(shí)間: 2025-3-26 09:39
https://doi.org/10.1007/978-1-4302-0352-0ulate the kernel in the operating system and classifies the different attacks based on their types. It also discusses the currently existing techniques to prevent kernel attacks and their characteristics.作者: 虛假 時(shí)間: 2025-3-26 16:13
https://doi.org/10.1007/978-1-4302-0352-0ystem will be implemented using Ethereum protocol. It uses elliptic curve cryptography to provide authentication and non-repudiation, immutability of vote records through hashing algorithms, transparency, and accessibility due to its decentralized nature as well as voter anonymity.作者: Living-Will 時(shí)間: 2025-3-26 17:00
https://doi.org/10.1007/978-1-4302-0352-0ecision tree algorithm, Baum–Welch algorithm, unsupervised word segmentation algorithm, etc., none of these studies consider memory optimization technique. Therefore, in this study, we propose and endeavor to implement our own rule-based parts of speech tagging mechanism with an intent to achieve higher accuracy by optimizing memory overhead.作者: Emmenagogue 時(shí)間: 2025-3-26 23:49
https://doi.org/10.1007/978-1-4842-5961-0s, the issue can be settled with insignificant error. This paper proposes a critical convolutional neural network (CNN) for Alzheimer’s Disease finding utilizing mind MRI information appraisal. The tally was organized and tried utilizing the MRI information from Alzheimer’s Disease Brain image.作者: 來就得意 時(shí)間: 2025-3-27 04:57
A Study on the Prevention Mechanisms for Kernel Attacks,ulate the kernel in the operating system and classifies the different attacks based on their types. It also discusses the currently existing techniques to prevent kernel attacks and their characteristics.作者: hemorrhage 時(shí)間: 2025-3-27 08:27
Anonymous Block Chain, Electronic Voting Using Linkable Ring Signatures,ystem will be implemented using Ethereum protocol. It uses elliptic curve cryptography to provide authentication and non-repudiation, immutability of vote records through hashing algorithms, transparency, and accessibility due to its decentralized nature as well as voter anonymity.作者: 去掉 時(shí)間: 2025-3-27 12:52
A Memory-Efficient Tool for Bengali Parts of Speech Tagging,ecision tree algorithm, Baum–Welch algorithm, unsupervised word segmentation algorithm, etc., none of these studies consider memory optimization technique. Therefore, in this study, we propose and endeavor to implement our own rule-based parts of speech tagging mechanism with an intent to achieve higher accuracy by optimizing memory overhead.作者: bonnet 時(shí)間: 2025-3-27 15:08
,Exploration of Magnetic Resonance Imaging for Prognosis of Alzheimer’s Disease Using Convolutional s, the issue can be settled with insignificant error. This paper proposes a critical convolutional neural network (CNN) for Alzheimer’s Disease finding utilizing mind MRI information appraisal. The tally was organized and tried utilizing the MRI information from Alzheimer’s Disease Brain image.作者: Culmination 時(shí)間: 2025-3-27 19:45
https://doi.org/10.1007/978-1-4302-0352-0be analysed using DexMonitor and the countermeasures for packed or obfuscated malware have to be found. A decision support system is then constructed and the guidelines and countermeasures for packed malware are provided.作者: CHAFE 時(shí)間: 2025-3-27 23:24 作者: faddish 時(shí)間: 2025-3-28 04:09 作者: 來就得意 時(shí)間: 2025-3-28 08:40 作者: 無表情 時(shí)間: 2025-3-28 11:02
2367-3370 d at SRM Institute of Science and Technology, Chennai, India.This book features a collection of high-quality research papers presented at the International Conference on Advanced Computing Technology (ICACT 2020), held at the SRM Institute of Science and Technology, Chennai, India, on 23–24 January 作者: 即席演說 時(shí)間: 2025-3-28 16:41 作者: 小臼 時(shí)間: 2025-3-28 19:50
,A Comprehensive Survey on RF Module at 433?MHz for Different Applications,The RF that is discussed in this paper works on 433?MHz frequency, and various applications using the same are mentioned. RF technology is widely used in many situations to ease the difficulty. The RF has a transmitter section and a receiver section. The data is analysed differently based on the application.作者: 格言 時(shí)間: 2025-3-29 00:04
A Novel Approach for Analysing and Detection of Obfuscated Malware Payloads in Android Platform Usithey develop from being repackaged and analysed. These tools and techniques obfuscate and encrypt the strings and classes, API calls and control flows in the Dalvik bytecode. The obfuscated and encrypted Android applications which are obtained from sources such as Koodous, Virus Total, etc. need to 作者: 代替 時(shí)間: 2025-3-29 05:32 作者: 最初 時(shí)間: 2025-3-29 09:34 作者: Resign 時(shí)間: 2025-3-29 13:33
Stable Multi-agent Clustering Method to Improve the Security in VANET,ty, traffic information, performance, data splitting, etc. Clustering is an effective method for dealing with the regular shift in vehicular ad hoc network topology by regional coordination. We present stable clustering based on multi-agent to give stable, which in convert combination the life of th作者: 話 時(shí)間: 2025-3-29 19:28
Anonymous Block Chain, Electronic Voting Using Linkable Ring Signatures,egrity, and availability of votes. The application of block chain in electronic voting seems to match the above qualities of an electronic voting system. However, recent researches have shown that block chain technology lacks anonymity. Transactions are pseudonymous and not anonymous. For this cause作者: 說明 時(shí)間: 2025-3-29 23:03
A Comprehensive Study on Ransomware Attacks in Online Pharmacy Community,mprised of a ransomware Petya malicious virus. Online pharmacy communities are doing their best for delivering care and treatment with Internet support, but the attackers exploit vulnerabilities in operating systems to identify software flaws. The attackers access patient summary records and threate作者: prolate 時(shí)間: 2025-3-30 02:17
,A Comprehensive Survey on RF Module at 433?MHz for Different Applications,ison of those applications. This paper has also a glimpse of various components in RF. It also talks about the significance of various modules of RF. The RF that is discussed in this paper works on 433?MHz frequency, and various applications using the same are mentioned. RF technology is widely used作者: 缺陷 時(shí)間: 2025-3-30 05:20
A Memory-Efficient Tool for Bengali Parts of Speech Tagging, detect the parts of speech of words in a Bengali sentence with higher accuracy and memory optimization. In this study, we develop such a parts of speech tagging tool specifically for those people who want to learn or research on Bengali grammar. Besides, it has an impact on the quality of education作者: 泥沼 時(shí)間: 2025-3-30 08:28
,Long-Term Wind Speed Forecasting—A Review,design of wind farms, energy management, and restructured electricity markets has always been a popular spot for research. A reliable wind speed forecast can mitigate the errors in scheduling and, in effect, improve the stability of the electrical grid power and reduce the ancillary service costs of作者: 使成核 時(shí)間: 2025-3-30 15:51
Methods for Epileptic Seizure Prediction Using EEG Signals: A Survey, of occurrence of recurrent seizures is known as epilepsy. This condition is unpredictable, and the patient can suffer at any moment of time. This may lead to permanent nervous system breakdown or death. Several researchers have focused on predicting seizure activity from electrocardiogram (ECG) sig作者: Junction 時(shí)間: 2025-3-30 17:19 作者: 艦旗 時(shí)間: 2025-3-30 21:35
An Interactive Virtual E-Learning Framework Using Crowdsourced Analytics,ter technology. Presently, YouTube is the world-wide method for video sharing. It is having sure constraints such as, having idleness in Web-based learning. In online investigation learners anticipating some additional rules from given assets. This work first investigation dependent on dynamic learn作者: Aesthete 時(shí)間: 2025-3-31 02:43 作者: 施舍 時(shí)間: 2025-3-31 08:32
Feature Selection Strategy for Academic Datasets Using Correlation Analysis,ic datasets. Increase in the number of data mining works on academic datasets brings the need to build mining models which are more accurate and precise. To build a good data mining model with high accuracy, the right subset of features must be selected on which the mining models can be built. There作者: VEIL 時(shí)間: 2025-3-31 10:43 作者: 藝術(shù) 時(shí)間: 2025-3-31 17:03 作者: 慷慨不好 時(shí)間: 2025-3-31 19:48 作者: 永久 時(shí)間: 2025-4-1 00:18 作者: subordinate 時(shí)間: 2025-4-1 05:19
Design of E-Water Application to Maintain the Flow of Water from Common Faucets by Enabling GSM,water in the wisest possible way. This happens because people do not receive direct data and reminders about the amount of water that is being utilised. Thus this proposed work aims at providing a solution to the above mentioned problem. It creates awareness allowing the users to about the amount of作者: seruting 時(shí)間: 2025-4-1 09:58
https://doi.org/10.1007/978-981-15-5329-5Machine Learning; Algorithms; Artificial Intelligence; Big Data; IoT; Big Data Security; ICACT Proceedings作者: 云狀 時(shí)間: 2025-4-1 13:41
978-981-15-5331-8Springer Nature Singapore Pte Ltd. 2021