標(biāo)題: Titlebook: Artificial Intelligence of Things; First International Rama Krishna Challa,Gagangeet Singh Aujla,Kanika S Conference proceedings 2024 The [打印本頁(yè)] 作者: External-Otitis 時(shí)間: 2025-3-21 19:58
書(shū)目名稱Artificial Intelligence of Things影響因子(影響力)
書(shū)目名稱Artificial Intelligence of Things影響因子(影響力)學(xué)科排名
書(shū)目名稱Artificial Intelligence of Things網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Artificial Intelligence of Things網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Artificial Intelligence of Things被引頻次
書(shū)目名稱Artificial Intelligence of Things被引頻次學(xué)科排名
書(shū)目名稱Artificial Intelligence of Things年度引用
書(shū)目名稱Artificial Intelligence of Things年度引用學(xué)科排名
書(shū)目名稱Artificial Intelligence of Things讀者反饋
書(shū)目名稱Artificial Intelligence of Things讀者反饋學(xué)科排名
作者: Innovative 時(shí)間: 2025-3-22 00:11
Overview of FD and FTC Technology,IoT is Distributed Denial of Service attack(DDoS) and many research works have been carried out to circumvent the DDoS attack; however, they failed to attain the accurate classification of DDoS and normal traffic. In context with this, we propose a novel Deep Neural Network (DNN) based Crystal Searc作者: amnesia 時(shí)間: 2025-3-22 02:51 作者: alleviate 時(shí)間: 2025-3-22 05:35
Fault Detection and Isolation (FDI),n beings through artificial machines have always been interesting thing to note and that has been getting updated from all over the world as the time has passed by. The research article presents an attribute selection mechanism by using enhanced Cuckoo Search algorithm which is known as meta-heurist作者: 領(lǐng)巾 時(shí)間: 2025-3-22 12:14 作者: 玩笑 時(shí)間: 2025-3-22 16:23
Nader Meskin,Khashayar Khorasani have disturbing ramifications on the mental and physical health of human beings. A proper analysis of these sounds is essential for medical professionals, especially ENT specialists to study the noise effects on patients. Though AI (Artificial Intelligence) and ML (Machine Learning) technologies ha作者: 單調(diào)女 時(shí)間: 2025-3-22 17:32 作者: Harass 時(shí)間: 2025-3-22 23:07 作者: precede 時(shí)間: 2025-3-23 03:05
Models in the Diagnostics of Processesl benefits/services for daily life. Services that IoD offers are monitoring, FANET (Flying Ad-Hoc Networks), management of any infrastructure, and IoT (Internet of Things). These services can be deployed in the smart city environment. Still, communication among drones is a significant concern. For c作者: Emasculate 時(shí)間: 2025-3-23 05:59
https://doi.org/10.1007/978-3-319-89978-7, which ensures the strength of security in key distribution. However, if the process for distributing secret keys is inaccurate, it will be unsuccessful. As a recent solution to the key distribution problem, Quantum Key Distribution (QKD) has recently attracted a lot of research interest. QKD is a 作者: OMIT 時(shí)間: 2025-3-23 11:39 作者: 猜忌 時(shí)間: 2025-3-23 15:39 作者: Initiative 時(shí)間: 2025-3-23 22:01 作者: Flat-Feet 時(shí)間: 2025-3-23 23:20 作者: INCH 時(shí)間: 2025-3-24 04:28
Conclusion and Future Research Directions,rs are used to solve the constraint set produced during the Symbolic Execution process. Various popular constraint solvers (Z3, mathsat, CVC4, Yices, boolector) are available. On average, constraint solver takes 90–98% of the total time symbolic execution. Constraint solver might get stuck in solvin作者: urethritis 時(shí)間: 2025-3-24 07:19
Unknown Input Observers and Filtersre dynamically scalable on the “pay as you go” model. Over the past years, Amazon has started providing a new service called EC2 Spot Instances which provides their idle machines on rent in the spot market at a lower cost. Spot instances are the unused virtual machines which are accessible at almost作者: 看法等 時(shí)間: 2025-3-24 13:43
Conclusions and Future Research Directionsan province of China in November 2019, it has been recognized as a global threat. However, over the next two years, it has been witnessed that the novel corona virus tends to evolve rapidly. In this paper, we leverage our time-series data collected since the initial spread of COVID-19, mainly in Ind作者: GLIDE 時(shí)間: 2025-3-24 15:43 作者: OVERT 時(shí)間: 2025-3-24 22:10
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/162529.jpg作者: ARCHE 時(shí)間: 2025-3-24 23:29
https://doi.org/10.1007/978-3-031-48774-3artificial intelligence; machine learning; deep learning; internet of things; cloud computing; fog comput作者: 不透氣 時(shí)間: 2025-3-25 05:18 作者: 貴族 時(shí)間: 2025-3-25 08:16 作者: Exposition 時(shí)間: 2025-3-25 13:11
Conference proceedings 2024, 2023..The 47 full papers and the 10 short papers included in this volume were carefully reviewed and selected from 401 submissions.?.The two books focus on research issues, opportunities and challenges of AI and IoT applications. They present the most recent innovations, trends, and concerns as we作者: 歹徒 時(shí)間: 2025-3-25 19:38 作者: 休戰(zhàn) 時(shí)間: 2025-3-25 20:04
Fault Detection and Isolation (FDI),been considered as a main objective. The detailed result and analysis have shown that integration of neural network have demonstrated distinguishing results in terms of performance parameters, namely, precision, recall, f-measure, and accuracy of polarity classification.作者: 致命 時(shí)間: 2025-3-26 03:30 作者: 組成 時(shí)間: 2025-3-26 05:16 作者: Entrancing 時(shí)間: 2025-3-26 12:24
An Attribute Selection Using Propagation-Based Neural Networks with an Improved Cuckoo-Search Algoribeen considered as a main objective. The detailed result and analysis have shown that integration of neural network have demonstrated distinguishing results in terms of performance parameters, namely, precision, recall, f-measure, and accuracy of polarity classification.作者: Inoperable 時(shí)間: 2025-3-26 14:53 作者: Devastate 時(shí)間: 2025-3-26 20:42
1865-0929 arch 30–31, 2023..The 47 full papers and the 10 short papers included in this volume were carefully reviewed and selected from 401 submissions.?.The two books focus on research issues, opportunities and challenges of AI and IoT applications. They present the most recent innovations, trends, and conc作者: GEON 時(shí)間: 2025-3-26 22:48 作者: Loathe 時(shí)間: 2025-3-27 02:57 作者: fulmination 時(shí)間: 2025-3-27 09:05
Fault Detection and Flight Data Measurementthe demand basis. Cloud Computing carry amendments, and the revolution of the Information Technology industries emerged with its popularization and applications. Balancing is one of the best solutions for efficient utilization of resources and is extensively considered to be the most important metho作者: dictator 時(shí)間: 2025-3-27 11:30
Nader Meskin,Khashayar Khorasaniocurrency. This allows users to pay a mediator when the allocated decoding is successfully completed. After defining the paradoxical model of the . design, the asymmetric structure of the . design is introduced. It also measures the overall performance of the proposal by executing a specific . schem作者: 黃油沒(méi)有 時(shí)間: 2025-3-27 14:40
Nader Meskin,Khashayar Khorasanintered by a person on a day-to-day basis. A portable sound logging device is developed using Raspberry Pi 3B+ and INMP441 MEMS microphone breakout board. I2Smic, PyAudio, Librosa, and several python libraries are used in system development. Labeling or annotation of the collected dataset is done man作者: fender 時(shí)間: 2025-3-27 21:48 作者: Glower 時(shí)間: 2025-3-28 00:22
Andrzej Marciniak,Józef Korbiczurce demands. To solve this issue, the load monitoring component is used. For this purpose, a hybrid algorithm that combines ant colony optimiza tion (ACO) with an artificial bee colony (ABC) algorithm is used. The proposed algorithms are implemented using CloudSim Simulator and evaluated using seve作者: 小母馬 時(shí)間: 2025-3-28 03:13 作者: REP 時(shí)間: 2025-3-28 06:26
Metaheuristics for Optimization Problems,e the overall system reward and reduce energy consumption in industrial applications. The problem of state-action-reward is formulated as a Markov Decision Process (MDP) and optimized using a popular DRL technique. Simulated results indicate that the proposed strategy decreases energy consumption ra作者: 歪曲道理 時(shí)間: 2025-3-28 11:12
Fault Diagnosis and Fault Tolerancef this, forthcoming work will make use of an integrated fog-based strategy for improving the security of the cloud. Because existing security mechanisms suffer from some drawbacks, there is a pressing need for such a system.作者: Harridan 時(shí)間: 2025-3-28 18:30 作者: Ankylo- 時(shí)間: 2025-3-28 22:41 作者: 鎮(zhèn)痛劑 時(shí)間: 2025-3-29 01:33
Conclusion and Future Research Directions,sed the Mathsat Constraint Solver to collect the data by running the GNU Coreutils program and Busybox utilities. The performance comparison of the different solvers was done over three constraint datasets.作者: Hyperlipidemia 時(shí)間: 2025-3-29 05:37 作者: connoisseur 時(shí)間: 2025-3-29 09:54
Conclusions and Future Research Directionschine learning algorithms on various factors and their trade-off for prediction. The experimental results indicate that Orthogonal Matching Pursuit is the best algorithm for this problem. We make our dataset available for further research.作者: Phenothiazines 時(shí)間: 2025-3-29 11:57
Securing IoT Using Supervised Machine Learningmising approach for IoT security due to their ability to detect and classify malicious data. This paper provides a comprehensive overview of supervised machine learning methods used for IoT security, including various classifiers and data engineering techniques. We have further demonstrated how effe作者: Insufficient 時(shí)間: 2025-3-29 15:42
Prediction Based Load Balancing in Cloud Computing Using Conservative Q-Learning Algorithmthe demand basis. Cloud Computing carry amendments, and the revolution of the Information Technology industries emerged with its popularization and applications. Balancing is one of the best solutions for efficient utilization of resources and is extensively considered to be the most important metho作者: 節(jié)省 時(shí)間: 2025-3-29 23:00 作者: 演繹 時(shí)間: 2025-3-30 02:34 作者: 不知疲倦 時(shí)間: 2025-3-30 07:53
A Comparative Analysis of Android Malware Detection Using Deep Learningf the proposed models on different data types is compared in terms of accuracy and loss. This experiment achieved a higher accuracy of 99.66% with dynamic features and a lower accuracy of 85.74% with combined features. Similarly, we achieved a minimal loss of 0.06 with dynamic analysis and a higher 作者: 無(wú)辜 時(shí)間: 2025-3-30 08:24 作者: 動(dòng)作謎 時(shí)間: 2025-3-30 13:35
A Construction of?Secure and?Efficient Authenticated Key Exchange Protocol for?Deploying Internet ofe internet of drones is also analyzed in this article. Therefore, this article presents a lightweight authentication protocol that is reliable to the users and meets their demands. The performance analysis ensures the efficiency of the proposed protocol.作者: 清真寺 時(shí)間: 2025-3-30 19:21
Fog Intelligence for?Energy Optimized Computation in?Industry 4.0e the overall system reward and reduce energy consumption in industrial applications. The problem of state-action-reward is formulated as a Markov Decision Process (MDP) and optimized using a popular DRL technique. Simulated results indicate that the proposed strategy decreases energy consumption ra作者: Counteract 時(shí)間: 2025-3-30 21:14 作者: 一再困擾 時(shí)間: 2025-3-31 03:35
Local Database Connectivity and?UI Design for?the?Smart Automated Cookerining python flexibility. Highly reliable MySQL is used to store user authentication and recipe data locally on the system. Using PyQt5 and Mysql, Graphical User Interface (GUI) is successfully developed which is used to record user credentials via the login framework.作者: opalescence 時(shí)間: 2025-3-31 05:43 作者: white-matter 時(shí)間: 2025-3-31 09:40 作者: 卡死偷電 時(shí)間: 2025-3-31 16:42
Cost-Deadline Constrained Robust Scheduling of Workflows Using Hybrid Instances in IaaS Cloudritical path before its latest finish time. The work presented in this paper proposes a workflow scheduling algorithm, IaaS Cloud Partial Critical Paths with robustness(IC-PCPR) uses both on-demand and spot instances to reduce the cost of workflow execution while satisfying a user-defined deadline a作者: 一小塊 時(shí)間: 2025-3-31 18:36 作者: 苦笑 時(shí)間: 2025-3-31 23:33