派博傳思國際中心

標題: Titlebook: Communication and Intelligent Systems; Proceedings of ICCIS Jagdish Chand Bansal,Mukesh Kumar Gupta,Basant Aga Conference proceedings 2020 [打印本頁]

作者: hydroxyapatite    時間: 2025-3-21 16:44
書目名稱Communication and Intelligent Systems影響因子(影響力)




書目名稱Communication and Intelligent Systems影響因子(影響力)學(xué)科排名




書目名稱Communication and Intelligent Systems網(wǎng)絡(luò)公開度




書目名稱Communication and Intelligent Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Communication and Intelligent Systems被引頻次




書目名稱Communication and Intelligent Systems被引頻次學(xué)科排名




書目名稱Communication and Intelligent Systems年度引用




書目名稱Communication and Intelligent Systems年度引用學(xué)科排名




書目名稱Communication and Intelligent Systems讀者反饋




書目名稱Communication and Intelligent Systems讀者反饋學(xué)科排名





作者: 擴音器    時間: 2025-3-21 20:28
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/c/image/230456.jpg
作者: antipsychotic    時間: 2025-3-22 00:45

作者: Intersect    時間: 2025-3-22 05:47
978-981-15-3324-2Springer Nature Singapore Pte Ltd. 2020
作者: breadth    時間: 2025-3-22 11:54
Communication and Intelligent Systems978-981-15-3325-9Series ISSN 2367-3370 Series E-ISSN 2367-3389
作者: exhilaration    時間: 2025-3-22 15:42

作者: exhilaration    時間: 2025-3-22 18:12
Software Cost and Risk Estimationhand gestures is easily operable using natural languages. This way of controlling a device is much more intuitive and effortless as compared to using a touch screen, manipulating a mouse or remote control, tweaking a knob or pressing a switch. This paper presents a dynamic hand gesture-based passwor
作者: 職業(yè)拳擊手    時間: 2025-3-22 22:23
Steps in the Reengineering Effortchanism. We propose a smart parking system which helps drivers to choose a parking slot based on historical data showing various trends, the distance vector from the location of the vehicle to the parking area and insights from the Google Traffic API. We also attempt to predict the car park occupanc
作者: Painstaking    時間: 2025-3-23 02:09
The Established and the Reengineeredm access is used in multi-channel networks. The CRNs are more efficient than traditional networks in terms of bandwidth utilization. The CRN is symbolized by selecting a channel for each unlicensed user from the set of available channels at every point in the path. Routing is possible if at least on
作者: Endearing    時間: 2025-3-23 08:27
Bernard Duhamel,Gilles St-Amant,Alain Abranfailures and recovery operations. In addition, HPC is expected to meet large-scale computation needs in the future by minimizing the average failure time to almost negligible and by overcoming the growing challenge of handling fault tolerance. This paper proposes a novel distributed fault analysis (
作者: nephritis    時間: 2025-3-23 12:37

作者: 打火石    時間: 2025-3-23 15:30
Thomas Fetcke,Alain Abran,Tho-Hau Nguyenthe same time, the issues in this technology also need to be addressed while allocating and deploying resources. Regardless of rapid growth of cloud computing, plenty of issues are there which are necessary to be solved due to ingrained property of cloud computing such as location awareness, unrelia
作者: 規(guī)范就好    時間: 2025-3-23 18:39

作者: 得體    時間: 2025-3-23 22:24
Information Engineering und IV-Controllingneration, the format of data, storing natures, and their management. The common challenges of big data mining are related to the data volume, and data volume is indirectly related to the variety of data and data velocity. The volume-related challenges isolated by the big data analysis strategies are
作者: jet-lag    時間: 2025-3-24 05:24

作者: 出血    時間: 2025-3-24 08:33

作者: 事情    時間: 2025-3-24 11:15

作者: Banister    時間: 2025-3-24 16:04

作者: superfluous    時間: 2025-3-24 19:48

作者: Barter    時間: 2025-3-25 00:04

作者: cutlery    時間: 2025-3-25 03:55

作者: 袋鼠    時間: 2025-3-25 10:16
Software Process Automation in Perspective,n for the cyber security. Various kinds of malware such as virus, worm, ransomware, logic bomb, adware, and backdoors are there, which can intrude into the systems in various ways, after intruding into the systems, based on their functioning they infect the system. Today’s attackers are using variou
作者: macabre    時間: 2025-3-25 13:43
https://doi.org/10.1007/11754305te images. Image splicing, which posed a threat to image integrity and authenticity, is a very popular and easy image forgery trick. Therefore, detection of image splicing is one of the major problems in digital forensics. A new passive (non-intrusive) image tampering detection technique is proposed
作者: Hemodialysis    時間: 2025-3-25 19:14
Software Process Definition and Managementnce evaluation is important for theory and applications. The present work investigates a Geo/Geo/1 G-queue with second optional service (SOS) and unreliable server. We assume that in addition to normal (positive) arriving customers, negative customers also arrive in the system. A customer in service
作者: 神化怪物    時間: 2025-3-25 21:09

作者: indecipherable    時間: 2025-3-26 03:51

作者: 延期    時間: 2025-3-26 07:30
Ekkehard Baisch,Christoph Ebertniques. It is observed that improved linear extrapolation technique is more precise in detecting REP for plant health monitoring. Results are also verified by calculating hyperspectral vegetation indices of red edge region.
作者: indecipherable    時間: 2025-3-26 09:24
From the Stack Principle to ALGOL, can make a statement and, in the future, deny any relations with it. Although this is the main premise of OTR, there is a list of additional characteristics that we are addressed in this paper. We also address the differences between OTR and some of the most used protocols in Internet of things (IoT) sector and why should IoT network use it.
作者: Confound    時間: 2025-3-26 15:27
A Distributed Fault Analysis (DFA) Method for Fault Tolerance in High-Performance Computing Systemsgularly monitoring the nodes in fully connected systems and significantly reducing recovery time. The experiment analyzing a distributed system evaluates a variety of faults to accurately predict the faulty node and measures the sensitivity and specificity in comparison with the traditional mechanism to show the effectiveness of the proposal.
作者: 甜食    時間: 2025-3-26 16:54

作者: coagulate    時間: 2025-3-27 00:34

作者: 莎草    時間: 2025-3-27 01:19

作者: Ankylo-    時間: 2025-3-27 08:12

作者: llibretto    時間: 2025-3-27 13:06

作者: 星球的光亮度    時間: 2025-3-27 13:41
B-Trees and Databases, Past and Future,of fertility. The aim of this paper is in twofold. The first objective is to analyze the use of methods of contraception among all the women and the factors or attributes which influence the use of methods, second to predict contraceptive method which is best suitable for women.
作者: 禁止,切斷    時間: 2025-3-27 18:44
Software Process Automation in Perspective,llenge and time-consuming task for the detectors. In this research, multilevel ensemble classification approach is introduced to detect malware using the concept of API Calls usage frequency. The results show that the proposed multilevel ensemble approach achieves 94.67% accuracy.
作者: ORBIT    時間: 2025-3-27 22:23

作者: 和平主義    時間: 2025-3-28 05:14

作者: 熔巖    時間: 2025-3-28 09:26

作者: Ceramic    時間: 2025-3-28 11:42
Prediction of Rise in Violence Inclined Opinions: Utility of Sentiment Analysis in the Modern Worlde been further analyzed to understand the utility of sentiment analysis in the modern world, and from the findings of the analysis, it is evident that there is indeed a reflection of increased inclination of tweets or expressions tendered by Twitter users on social platform of Twitter toward violence-oriented opinions.
作者: 入伍儀式    時間: 2025-3-28 17:18

作者: 小母馬    時間: 2025-3-28 18:57
Malware Detection Using Multilevel Ensemble Supervised Learning,llenge and time-consuming task for the detectors. In this research, multilevel ensemble classification approach is introduced to detect malware using the concept of API Calls usage frequency. The results show that the proposed multilevel ensemble approach achieves 94.67% accuracy.
作者: Annotate    時間: 2025-3-29 01:04

作者: 冷淡周邊    時間: 2025-3-29 04:37

作者: hermitage    時間: 2025-3-29 08:36
B-Trees and Databases, Past and Future,ags appear over the faces present in the picture so as to utilize this name functionality to tag them. The experimental results show that the proposed method performs better in terms of tagging as well as recognition in small duration of time.
作者: Mercantile    時間: 2025-3-29 12:47

作者: 欺騙世家    時間: 2025-3-29 15:54

作者: Exaggerate    時間: 2025-3-29 23:08

作者: Fibrillation    時間: 2025-3-30 01:01
A Dynamic Hand Gesture-Based Password Recognition System,hand gestures is easily operable using natural languages. This way of controlling a device is much more intuitive and effortless as compared to using a touch screen, manipulating a mouse or remote control, tweaking a knob or pressing a switch. This paper presents a dynamic hand gesture-based passwor
作者: hemoglobin    時間: 2025-3-30 05:06

作者: 親愛    時間: 2025-3-30 10:56
A Distributed Algorithm to Create a Minimum Spanning Tree in a Multi-channel Cognitive Radio Networm access is used in multi-channel networks. The CRNs are more efficient than traditional networks in terms of bandwidth utilization. The CRN is symbolized by selecting a channel for each unlicensed user from the set of available channels at every point in the path. Routing is possible if at least on
作者: 大氣層    時間: 2025-3-30 14:39
A Distributed Fault Analysis (DFA) Method for Fault Tolerance in High-Performance Computing Systemsfailures and recovery operations. In addition, HPC is expected to meet large-scale computation needs in the future by minimizing the average failure time to almost negligible and by overcoming the growing challenge of handling fault tolerance. This paper proposes a novel distributed fault analysis (
作者: Surgeon    時間: 2025-3-30 19:42
Ontology-Driven Framework to Automatically Generate University Timetable,sities make timetables manually, which are inefficient and consume a lot of time. Also, a large number of backtracks are required if some inconsistency is encountered. To generate a university timetable automatically, we present an ontology-driven approach that is much more efficient than the existi
作者: Omnipotent    時間: 2025-3-30 22:47
A Survey on Task Scheduling and Resource Allocation Methods in Fog Based IoT Applications,the same time, the issues in this technology also need to be addressed while allocating and deploying resources. Regardless of rapid growth of cloud computing, plenty of issues are there which are necessary to be solved due to ingrained property of cloud computing such as location awareness, unrelia
作者: 不可比擬    時間: 2025-3-31 02:13

作者: 微塵    時間: 2025-3-31 06:52
Stratified Sampling-Based Data Reduction and Categorization Model for Big Data Mining,neration, the format of data, storing natures, and their management. The common challenges of big data mining are related to the data volume, and data volume is indirectly related to the variety of data and data velocity. The volume-related challenges isolated by the big data analysis strategies are
作者: Lethargic    時間: 2025-3-31 09:19
Product Sentiment Analysis Using Natural Language Understanding,me. Growth of any business depends upon catering to customers’ needs as quickly as possible. The branch of computer science, which helps people to achieve their goals, is known as artificial intelligence and machine learning. This paper proposed one such mechanism to ease out sentiment analysis proc
作者: sultry    時間: 2025-3-31 14:35
Software Cost Estimation for Python Projects Using Genetic Algorithm,development encompasses a software project’s effort and development time. One popular model of software cost estimation is constructive cost model (COCOMO) model, which is a mathematical model proposed by Boehm, used for estimate the software effort and development time. The objective of this paper
作者: Juvenile    時間: 2025-3-31 18:59
Prediction of Rise in Violence Inclined Opinions: Utility of Sentiment Analysis in the Modern World use to the concerned organizations. Acquiring such knowledge from the analysis of the data available over the Internet has facilitated their decisions whether to improve, modify or reorganize the product. As a prototype, Python Program has been used in this article to understand the operation of se
作者: eustachian-tube    時間: 2025-3-31 22:26

作者: 鋸齒狀    時間: 2025-4-1 04:58





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
峨眉山市| 临澧县| 运城市| 芒康县| 屏东市| 隆林| 金阳县| 西和县| 友谊县| 洱源县| 广平县| 清苑县| 湖南省| 延津县| 兴宁市| 永川市| 永兴县| 郓城县| 沁阳市| 健康| 华池县| 安岳县| 东莞市| 海城市| 甘洛县| 怀远县| 财经| 霞浦县| 阿拉尔市| 平塘县| 阳曲县| 商水县| 玉屏| 汉寿县| 息烽县| 班戈县| 元朗区| 桓台县| 沾化县| 延长县| 台中县|