標(biāo)題: Titlebook: Artificial Intelligence and Sustainable Computing; Proceedings of ICSIS Manjaree Pandit,M. K. Gaur,Akhilesh Tiwari Conference proceedings 2 [打印本頁(yè)] 作者: 使固定 時(shí)間: 2025-3-21 19:41
書目名稱Artificial Intelligence and Sustainable Computing影響因子(影響力)
書目名稱Artificial Intelligence and Sustainable Computing影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence and Sustainable Computing網(wǎng)絡(luò)公開(kāi)度
書目名稱Artificial Intelligence and Sustainable Computing網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Artificial Intelligence and Sustainable Computing被引頻次
書目名稱Artificial Intelligence and Sustainable Computing被引頻次學(xué)科排名
書目名稱Artificial Intelligence and Sustainable Computing年度引用
書目名稱Artificial Intelligence and Sustainable Computing年度引用學(xué)科排名
書目名稱Artificial Intelligence and Sustainable Computing讀者反饋
書目名稱Artificial Intelligence and Sustainable Computing讀者反饋學(xué)科排名
作者: 一加就噴出 時(shí)間: 2025-3-21 23:43 作者: 簡(jiǎn)略 時(shí)間: 2025-3-22 02:33 作者: flaunt 時(shí)間: 2025-3-22 05:54
https://doi.org/10.1007/978-3-662-07164-9eneration can be easily determined. Most appropriate ML algorithm with the best performance is identified and fine-tuned for further optimization and improved performance. A graphical user interface application is proposed for easy wind power forecasting and in extended applications.作者: 尾巴 時(shí)間: 2025-3-22 10:48 作者: 系列 時(shí)間: 2025-3-22 13:51 作者: 敵手 時(shí)間: 2025-3-22 20:58 作者: conference 時(shí)間: 2025-3-22 23:51
Performance Improvement of CTNR Protocol in Wireless Sensor Network Using Machine Learning,one level hierarchy is increased. For the path establishment, artificial bee colony is used. The improved CTNR protocol is called modified cluster head to normal ratio (M-CTNR). The M-CTNR protocol is implemented in MATLAB, and results are compared with various parameters.作者: 財(cái)主 時(shí)間: 2025-3-23 03:55
Asthma Detection System: Machine and Deep Learning-Based Techniques,dio data using the ConvNet model with Adam optimizer with 99.8% Accuracy, 100% Sensitivity, 100% Specificity, and 99% F-Score. Conclusion: The developed IA-based application is capable of diagnosing Asthma accurately and can be easily and efficiently utilised in clinical decision-making.作者: WAIL 時(shí)間: 2025-3-23 05:38
Conference proceedings 2022 are intelligent, efficient, cost-effective, and fast. The book provides a friendly and informative treatment of the topics which makes this book an ideal reference for both beginners and experienced researchers.作者: BUOY 時(shí)間: 2025-3-23 12:04
https://doi.org/10.1007/978-3-662-07164-9all the more therapeutic. In this paper, an attempt has been made to propose a model which takes a real-time captured image of the user, his favorite genre, and artists as inputs, detects the emotion of the subject, and outputs a recommended playlist of songs that is in accordance with the user‘s current emotion.作者: faddish 時(shí)間: 2025-3-23 16:35 作者: Plaque 時(shí)間: 2025-3-23 21:02
Music Recommendation System Based on Emotion Detection,all the more therapeutic. In this paper, an attempt has been made to propose a model which takes a real-time captured image of the user, his favorite genre, and artists as inputs, detects the emotion of the subject, and outputs a recommended playlist of songs that is in accordance with the user‘s current emotion.作者: BRAWL 時(shí)間: 2025-3-23 22:39 作者: 過(guò)度 時(shí)間: 2025-3-24 03:41
2524-7565 held in Gwalior, India.Serves as a reference for researcherThis book presents high-quality research papers presented at 3rd International Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2021) held at Madhav Institute of Technology & 作者: appall 時(shí)間: 2025-3-24 09:01
,Dokumentation des Geb?udebestands,core designed. The designed core is tested on industry standard target FPGA board. Pipeline hazards are avoided by adding stalls in the stages. The resource utilization report is produced. Operating frequency is found to be 138?MHz, and the power estimated is 124?mW. The designed core can be used for embedded applications.作者: triptans 時(shí)間: 2025-3-24 12:34
Implementation of 32-bit ISA Five-Stage Pipeline RISC-V Processor Core,core designed. The designed core is tested on industry standard target FPGA board. Pipeline hazards are avoided by adding stalls in the stages. The resource utilization report is produced. Operating frequency is found to be 138?MHz, and the power estimated is 124?mW. The designed core can be used for embedded applications.作者: 盲信者 時(shí)間: 2025-3-24 18:44
https://doi.org/10.1007/978-3-662-07167-0sing linear regression techniques. The performance of the land suitability model is evaluated using the R-squared value, and it has been proved that the proposed land suitability prediction model is more effective and accurate.作者: 分貝 時(shí)間: 2025-3-24 21:07 作者: boisterous 時(shí)間: 2025-3-25 02:11
Demand-Based Land Suitability Prediction Model for Sustainable Agriculture,ul transportation, and a lack of cold storage infrastructure. The land suitability prediction model is necessary to control food waste and for maintaining a sustainable agricultural system in India. The present study was designed to predict the suitable land area for production according to demand u作者: Tinea-Capitis 時(shí)間: 2025-3-25 06:08 作者: Notorious 時(shí)間: 2025-3-25 08:53
Music Recommendation System Based on Emotion Detection,a person, which in turn is affected by numerous factors and situations happening with or around them all day. This paper demonstrates the deep learning models for the detection of human emotions, based on which a music recommendation system is built. This would save the user‘s time of manually searc作者: Prologue 時(shí)間: 2025-3-25 12:17
Service Analytics on ITSM Processes Using Time Series,liver and support and continually improve and manage the IT services through its life cycle. ITSM plays a major role in aligning IT with the business and meeting the needs of the business. Service analytics has emerged in recent years as a new domain of IT service, with great potential for customer 作者: Exhilarate 時(shí)間: 2025-3-25 18:27
Comparative Analysis of Color-Based Segmentation Methods Used for Smartphone Camera Captured Fingerigh usability, acceptability, and requirement of a less-constraint environment for finger acquisition, touchless fingerprint technology is increasingly used in smartphone authentication. However, touchless fingerprint recognition is coping with various factors such as low ridge valley contrast, moti作者: 生命層 時(shí)間: 2025-3-25 21:03
Prediction of Heart Disease Through KNN, Random Forest, and Decision Tree Classifier Using K-Fold C several risk factors, creating an immediate need for precise and practical methods for making an early diagnosis and achieving prompt treatment of the illness. In the healthcare industry, machine learning is a popular technique for processing large amounts of data. Researchers use a variety of mach作者: 鋼盔 時(shí)間: 2025-3-26 02:25
Distance Matrix Generation for Dynamic Vehicle Routing Optimization in Transport Fleets Management, case of a frequent changing of points number and location, a continuous and effective update of the data is required, e.g., from more and more popular services such as Mapping APIs. The time-consuming nature of this process, which may extend the planning process, was emphasized. The article discuss作者: Merited 時(shí)間: 2025-3-26 08:05
Optimized Hysteresis Region Authenticated Handover for 5G HetNets,ties. However, security, efficiency and privacy are major issues affecting these deployments. Although a myriad of intelligent target cell section protocols has been developed, their main focus is on efficiency and quality of service improvements. As such, security and privacy are missing in these p作者: 厚顏無(wú)恥 時(shí)間: 2025-3-26 12:30 作者: muster 時(shí)間: 2025-3-26 14:27 作者: 彩色 時(shí)間: 2025-3-26 16:57 作者: Canary 時(shí)間: 2025-3-26 22:53 作者: 異端邪說(shuō)2 時(shí)間: 2025-3-27 03:35 作者: Locale 時(shí)間: 2025-3-27 06:14
Effective Diagnosis of Cervical Cancer Using Balanced Random Forest Classifier,f the most successfully treatable forms of cancer. Consequently, rapid early detection can greatly impact the survival of patients. In this regard, we have developed a decision support system for the diagnosis of cervical cancer using the clinical features of patients. We utilized a dataset original作者: 披肩 時(shí)間: 2025-3-27 10:25 作者: 來(lái)這真柔軟 時(shí)間: 2025-3-27 16:34 作者: synovial-joint 時(shí)間: 2025-3-27 17:54 作者: 刺激 時(shí)間: 2025-3-27 22:49 作者: 暴發(fā)戶 時(shí)間: 2025-3-28 04:21 作者: 透明 時(shí)間: 2025-3-28 09:58 作者: 前兆 時(shí)間: 2025-3-28 10:44 作者: 嚴(yán)重傷害 時(shí)間: 2025-3-28 18:39 作者: 面包屑 時(shí)間: 2025-3-28 21:25 作者: 培養(yǎng) 時(shí)間: 2025-3-28 23:20 作者: kidney 時(shí)間: 2025-3-29 04:44
https://doi.org/10.1007/978-3-662-07164-9a person, which in turn is affected by numerous factors and situations happening with or around them all day. This paper demonstrates the deep learning models for the detection of human emotions, based on which a music recommendation system is built. This would save the user‘s time of manually searc作者: 洞察力 時(shí)間: 2025-3-29 09:41
https://doi.org/10.1007/978-3-662-07164-9liver and support and continually improve and manage the IT services through its life cycle. ITSM plays a major role in aligning IT with the business and meeting the needs of the business. Service analytics has emerged in recent years as a new domain of IT service, with great potential for customer 作者: 辯論的終結(jié) 時(shí)間: 2025-3-29 13:57
,Dokumentation des Geb?udebestands,igh usability, acceptability, and requirement of a less-constraint environment for finger acquisition, touchless fingerprint technology is increasingly used in smartphone authentication. However, touchless fingerprint recognition is coping with various factors such as low ridge valley contrast, moti作者: obstinate 時(shí)間: 2025-3-29 19:03 作者: 有發(fā)明天才 時(shí)間: 2025-3-29 23:48
,Dokumentation des Geb?udebestands, case of a frequent changing of points number and location, a continuous and effective update of the data is required, e.g., from more and more popular services such as Mapping APIs. The time-consuming nature of this process, which may extend the planning process, was emphasized. The article discuss作者: 閃光東本 時(shí)間: 2025-3-30 00:08 作者: 蹣跚 時(shí)間: 2025-3-30 07:57
https://doi.org/10.1007/978-3-662-07173-1ption, which is caused by the small size of the sensor nodes (SNs) and their long deployment. The clustering is the most efficient technique which reduces energy consumption of the network. The data, whose collection is done from the aimed environment, is transmitted directly to the main station due作者: 新手 時(shí)間: 2025-3-30 10:39 作者: Talkative 時(shí)間: 2025-3-30 15:37 作者: 小鹿 時(shí)間: 2025-3-30 18:12
,Dokumentation des Geb?udebestands,tric systems from vulnerabilities or attacks. In this paper, we present an improvement to a very popular biometric template protection technique known as Bio-hashing for fingerprint, which has a major drawback when the token or secret key gets stolen or compromised. Earlier, many researchers have pr作者: CAPE 時(shí)間: 2025-3-30 22:44 作者: Genteel 時(shí)間: 2025-3-31 04:52 作者: 違法事實(shí) 時(shí)間: 2025-3-31 05:21 作者: Peak-Bone-Mass 時(shí)間: 2025-3-31 09:35
,Dokumentation des Geb?udebestands, has been made by doctors, in the fields of breast cancer diagnosis and therapy at an early stage to reduce the amount of deaths from the disease. Before, detection of breast cancer intended removal of the entire breast; however, due to the vast spectrum of therapies available today, these surgeries作者: Incorruptible 時(shí)間: 2025-3-31 15:29
,Dokumentation des Geb?udebestands,em. Literature has shown that conventional mathematical/statistical tools fail to take into account the complexity of different human responses to the energy problem. This weakness is attempted to be overcome with the use of artificial neural networks (ANNs), through the case of Greece. For the purp作者: 猜忌 時(shí)間: 2025-3-31 19:28 作者: RENIN 時(shí)間: 2025-4-1 01:15
,Dokumentation des Geb?udebestands,s. These access control techniques are also not adaptive in nature according to different environmental factors and unanticipated situations. Since Internet is core communication part of IoT, so security becomes a prime concern in such an environment. In such dynamic communication systems, we need a作者: bypass 時(shí)間: 2025-4-1 02:20 作者: 妨礙 時(shí)間: 2025-4-1 06:23
Algorithms for Intelligent Systemshttp://image.papertrans.cn/b/image/162323.jpg作者: 親密 時(shí)間: 2025-4-1 12:13 作者: Forehead-Lift 時(shí)間: 2025-4-1 14:53
https://doi.org/10.1007/978-3-662-07164-9ed for the ARIMA c (3,0,4) and TSLM methods, respectively. Overall, the results demonstrated here indicate that the proposed method TSLM can provide better performance than ARIMA method for real data.作者: Obituary 時(shí)間: 2025-4-1 18:40