標(biāo)題: Titlebook: Artificial Intelligence for Cloud and Edge Computing; Sanjay Misra,Amit Kumar Tyagi,Lalit Garg Book 2022 The Editor(s) (if applicable) and [打印本頁] 作者: Corticosteroids 時間: 2025-3-21 18:25
書目名稱Artificial Intelligence for Cloud and Edge Computing影響因子(影響力)
書目名稱Artificial Intelligence for Cloud and Edge Computing影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence for Cloud and Edge Computing網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence for Cloud and Edge Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence for Cloud and Edge Computing被引頻次
書目名稱Artificial Intelligence for Cloud and Edge Computing被引頻次學(xué)科排名
書目名稱Artificial Intelligence for Cloud and Edge Computing年度引用
書目名稱Artificial Intelligence for Cloud and Edge Computing年度引用學(xué)科排名
書目名稱Artificial Intelligence for Cloud and Edge Computing讀者反饋
書目名稱Artificial Intelligence for Cloud and Edge Computing讀者反饋學(xué)科排名
作者: 豎琴 時間: 2025-3-22 00:19 作者: PIZZA 時間: 2025-3-22 01:44 作者: neologism 時間: 2025-3-22 06:05 作者: 轎車 時間: 2025-3-22 09:18
https://doi.org/10.1007/978-3-8348-9151-8onic health record (EHR) ends. Also, an artificial intelligence (AI) approach, which is referred to as subjective logic-based belief or reasoning model, was used towards measuring the trustworthiness of the medical personnel. Metrics such as the average system computation time otherwise referred to 作者: WAG 時間: 2025-3-22 12:54
https://doi.org/10.1007/978-3-8348-9151-8lligence in a distributed environment. The proposed model seeks to improve resource utilization to fulfill grid users’ demands. The resources’ costs can change during the auction based on their processing capabilities, helping the proposed model to increase resource usage. Also, resources can increa作者: Lipoma 時間: 2025-3-22 17:17 作者: Cabinet 時間: 2025-3-22 22:26
https://doi.org/10.1007/978-3-8348-9151-8 matrix in terms of accuracy was used to evaluate the system. The result of the experiment shows an 85% accuracy which outperformed other methods that have been suggested and compared within the literature. However, this study proves to be relevant and can be adopted for better efficiency in IoT and作者: IST 時間: 2025-3-23 04:58
https://doi.org/10.1007/978-3-8348-9493-9ility of the framework is tested in real-time analysis of healthcare monitoring of patients’ data for automatic managing of body temperature, blood glucose, and blood pressure. The integration of the system shows improvement in patients’ health monitoring situations. The system alerts the physicians作者: FER 時間: 2025-3-23 07:46
https://doi.org/10.1007/978-3-8348-9493-9length by the able utilization of the genetic algorithm. We have carried out various statistical tests to uphold the strength of the generated key sequences. Amongst them, hybrid model generated a higher range of 13,425 subsequences, a chi-square value of 2.862 which is way better than a critical st作者: BUMP 時間: 2025-3-23 10:08 作者: Entirety 時間: 2025-3-23 17:12
https://doi.org/10.1007/978-3-8348-9493-9ses challenges and complexities associated with the knowledge domain (gap analysis) of contemporary IoT architectures and proposes a system-wide view of the IoT stack which has been developed following a classical structured approach in system engineering requirement and needs analysis and model eng作者: pus840 時間: 2025-3-23 20:19 作者: investigate 時間: 2025-3-24 01:44
https://doi.org/10.1007/978-3-8348-9493-9T. In order to protect EoT and IoT appliances and devices, an improved IDSs-IoT is proposed by implementing ten different machine learning models. In the first line of this research, normalization technique was performed using the minimum-maximum (min-max) method. Subsequently, dimensionality reduct作者: nutrition 時間: 2025-3-24 02:51 作者: 管理員 時間: 2025-3-24 07:10
Artificial Intelligence for Cloud and Edge Computing作者: insipid 時間: 2025-3-24 13:53 作者: Coronary-Spasm 時間: 2025-3-24 18:51 作者: Heresy 時間: 2025-3-24 22:14 作者: 女上癮 時間: 2025-3-25 00:10
Classification of Swine Disease Using K-Nearest Neighbor Algorithm on Cloud-Based Framework,wine diseases in pigs. MySQL was used for the cloud-based database which is at the backend of the website developed. PHP was used for the coding aspect of the system; the KNN algorithm was embedded into the PHP version 7.1.30. The developed system was able to predict disease that detects the likely 作者: MOAN 時間: 2025-3-25 04:46
Privacy and Trust Models for Cloud-Based EHRs Using Multilevel Cryptography and Artificial Intelligonic health record (EHR) ends. Also, an artificial intelligence (AI) approach, which is referred to as subjective logic-based belief or reasoning model, was used towards measuring the trustworthiness of the medical personnel. Metrics such as the average system computation time otherwise referred to 作者: 鑒賞家 時間: 2025-3-25 08:33 作者: 神化怪物 時間: 2025-3-25 13:51
Optimization Model of Smartphone and Smart Watch Based on Multi Level of Elitism (OMSPW-MLE),y being complex as there are more than one relationship linking each node with other nodes. These relationships have 18 activities that can be accomplished by each person using a smartphone and a smart watch. (3) The DSA algorithm was proposed as a tool to find the most influential nodes in complex 作者: 刺穿 時間: 2025-3-25 18:30
K-Nearest Neighbour Algorithm for Classification of IoT-Based Edge Computing Device, matrix in terms of accuracy was used to evaluate the system. The result of the experiment shows an 85% accuracy which outperformed other methods that have been suggested and compared within the literature. However, this study proves to be relevant and can be adopted for better efficiency in IoT and作者: Devastate 時間: 2025-3-25 22:34 作者: 胰島素 時間: 2025-3-26 00:54
Genetic Algorithm-Based Pseudo Random Number Generation for Cloud Security,length by the able utilization of the genetic algorithm. We have carried out various statistical tests to uphold the strength of the generated key sequences. Amongst them, hybrid model generated a higher range of 13,425 subsequences, a chi-square value of 2.862 which is way better than a critical st作者: Nefarious 時間: 2025-3-26 06:27 作者: Corporeal 時間: 2025-3-26 11:32
System Level Knowledge Representation for Edge Intelligence,ses challenges and complexities associated with the knowledge domain (gap analysis) of contemporary IoT architectures and proposes a system-wide view of the IoT stack which has been developed following a classical structured approach in system engineering requirement and needs analysis and model eng作者: Locale 時間: 2025-3-26 14:37
AI-JasCon: An Artificial Intelligent Containerization System for Bayesian Fraud Determination in Corchitecture is introduced for deterministic data mining while creating Bayesian computation to determine fraud potentials through prior, posterior, and joint probability distributions. AI-JasCon framework achieves predictive fraud detection with containerization and modularization using class models作者: EVICT 時間: 2025-3-26 19:30 作者: V洗浴 時間: 2025-3-27 00:33 作者: 好色 時間: 2025-3-27 02:41
https://doi.org/10.1007/978-3-8348-9493-9 their completion times are more than the calculated minimum completion times for the given resource. CloudSim-based results show that our algorithms minimize completion time better than other popular algorithms, in addition to reducing costs. The modeling for costs satisfies the criteria of earliest completion time.作者: 輕率看法 時間: 2025-3-27 08:15 作者: GRAIN 時間: 2025-3-27 11:08 作者: ODIUM 時間: 2025-3-27 16:34 作者: amorphous 時間: 2025-3-27 17:55 作者: 一罵死割除 時間: 2025-3-28 00:39 作者: enfeeble 時間: 2025-3-28 04:20
Deep Learning-Based Facial Recognition on Hybrid Architecture for Financial Services,or personalized service and to robust the compliance processes, especially, prevention of financial fraud and money laundering because sales of financial products and services use more frequently digital channels. Financial institutions need to deploy artificial intelligence technologies to evolve f作者: 合適 時間: 2025-3-28 09:08 作者: 滋養(yǎng) 時間: 2025-3-28 13:18
Privacy and Trust Models for Cloud-Based EHRs Using Multilevel Cryptography and Artificial IntelligRecords Management solutions in today’s modern world. However, there are rapidly growing concerns for security/privacy and trustworthiness of such cloud-based systems/services. The dynamics of electronic health records (EHR) management system makes privacy preservation and trust, non-negotiable feat作者: incubus 時間: 2025-3-28 15:11 作者: 遍及 時間: 2025-3-28 20:13
Optimization Model of Smartphone and Smart Watch Based on Multi Level of Elitism (OMSPW-MLE),any activities that can be managed by these electronic devices. Therefore, in this study, the authors deal with building a model based on two artificial intelligent techniques: deterministic selection and ant colony optimization. This model is called a multilevel optimization model in order to perfo作者: 開始沒有 時間: 2025-3-29 01:01 作者: 擁護(hù)者 時間: 2025-3-29 03:23
Big Data Analytics of IoT-Based Cloud System Framework: Smart Healthcare Monitoring Systems,ve increased in recent years by providing opportunities into new domains for automation and integration of real-world objects. IoT-based cloud systems have been used, and there is a growing interest in IoT-enabled smart devices to generate big volumes of data, as mass production. Hence, there is a n作者: inundate 時間: 2025-3-29 11:10 作者: 藥物 時間: 2025-3-29 12:25
Anomaly Detection in IoT Using Machine Learning,icate with each other. However, alongside IoT’s growth, a daunting topic has risen: the security of the IoT. With the numerous devices connected . Therefore, the network security should be able to identify such malignant packets. Therefore, an Intrusion Detection System (IDS) is very much needed. Su作者: intention 時間: 2025-3-29 19:38
System Level Knowledge Representation for Edge Intelligence,parency and risks for IoT networks. Novel intelligent capabilities are being pushed towards the edge of the network, contributing novel risk factors such as privacy and limiting the ability of users to interact with the network components... This paper considers the IoT (Internet of Things), edge co作者: 楓樹 時間: 2025-3-29 21:00
AI-Based Enhanced Time Cost-Effective Cloud Workflow Scheduling,-sensitive workflows at the lowest cost and versatile time-cost algorithm (VTCA) which consider both time and cost constraints; these algorithms considerably enhance the earlier algorithms. TECA schedules activities to be completed as soon as possible and optimizes the costs in resource provisioning作者: 不可救藥 時間: 2025-3-30 00:28
AI-JasCon: An Artificial Intelligent Containerization System for Bayesian Fraud Determination in Co at the edge and cloud domains. Most transactional systems from the edge-to-cloud layers lack the robust platform integration (such as application program interface (API) microservices) needed for fraud mitigation in networks and systems. This paper presents an AI containerization API system based o