標題: Titlebook: Communication and Intelligent Systems; Proceedings of ICCIS Jagdish Chand Bansal,Mukesh Kumar Gupta,Basant Aga Conference proceedings 2020 [打印本頁] 作者: hydroxyapatite 時間: 2025-3-21 16:44
書目名稱Communication and Intelligent Systems影響因子(影響力)
書目名稱Communication and Intelligent Systems影響因子(影響力)學(xué)科排名
書目名稱Communication and Intelligent Systems網(wǎng)絡(luò)公開度
書目名稱Communication and Intelligent Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Communication and Intelligent Systems被引頻次
書目名稱Communication and Intelligent Systems被引頻次學(xué)科排名
書目名稱Communication and Intelligent Systems年度引用
書目名稱Communication and Intelligent Systems年度引用學(xué)科排名
書目名稱Communication and Intelligent Systems讀者反饋
書目名稱Communication and Intelligent Systems讀者反饋學(xué)科排名
作者: 擴音器 時間: 2025-3-21 20:28
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/c/image/230456.jpg作者: antipsychotic 時間: 2025-3-22 00:45 作者: Intersect 時間: 2025-3-22 05:47
978-981-15-3324-2Springer Nature Singapore Pte Ltd. 2020作者: breadth 時間: 2025-3-22 11:54
Communication and Intelligent Systems978-981-15-3325-9Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: exhilaration 時間: 2025-3-22 15:42 作者: exhilaration 時間: 2025-3-22 18:12
Software Cost and Risk Estimationhand gestures is easily operable using natural languages. This way of controlling a device is much more intuitive and effortless as compared to using a touch screen, manipulating a mouse or remote control, tweaking a knob or pressing a switch. This paper presents a dynamic hand gesture-based passwor作者: 職業(yè)拳擊手 時間: 2025-3-22 22:23
Steps in the Reengineering Effortchanism. We propose a smart parking system which helps drivers to choose a parking slot based on historical data showing various trends, the distance vector from the location of the vehicle to the parking area and insights from the Google Traffic API. We also attempt to predict the car park occupanc作者: Painstaking 時間: 2025-3-23 02:09
The Established and the Reengineeredm access is used in multi-channel networks. The CRNs are more efficient than traditional networks in terms of bandwidth utilization. The CRN is symbolized by selecting a channel for each unlicensed user from the set of available channels at every point in the path. Routing is possible if at least on作者: Endearing 時間: 2025-3-23 08:27
Bernard Duhamel,Gilles St-Amant,Alain Abranfailures and recovery operations. In addition, HPC is expected to meet large-scale computation needs in the future by minimizing the average failure time to almost negligible and by overcoming the growing challenge of handling fault tolerance. This paper proposes a novel distributed fault analysis (作者: nephritis 時間: 2025-3-23 12:37 作者: 打火石 時間: 2025-3-23 15:30
Thomas Fetcke,Alain Abran,Tho-Hau Nguyenthe same time, the issues in this technology also need to be addressed while allocating and deploying resources. Regardless of rapid growth of cloud computing, plenty of issues are there which are necessary to be solved due to ingrained property of cloud computing such as location awareness, unrelia作者: 規(guī)范就好 時間: 2025-3-23 18:39 作者: 得體 時間: 2025-3-23 22:24
Information Engineering und IV-Controllingneration, the format of data, storing natures, and their management. The common challenges of big data mining are related to the data volume, and data volume is indirectly related to the variety of data and data velocity. The volume-related challenges isolated by the big data analysis strategies are作者: jet-lag 時間: 2025-3-24 05:24 作者: 出血 時間: 2025-3-24 08:33 作者: 事情 時間: 2025-3-24 11:15 作者: Banister 時間: 2025-3-24 16:04 作者: superfluous 時間: 2025-3-24 19:48 作者: Barter 時間: 2025-3-25 00:04 作者: cutlery 時間: 2025-3-25 03:55 作者: 袋鼠 時間: 2025-3-25 10:16
Software Process Automation in Perspective,n for the cyber security. Various kinds of malware such as virus, worm, ransomware, logic bomb, adware, and backdoors are there, which can intrude into the systems in various ways, after intruding into the systems, based on their functioning they infect the system. Today’s attackers are using variou作者: macabre 時間: 2025-3-25 13:43
https://doi.org/10.1007/11754305te images. Image splicing, which posed a threat to image integrity and authenticity, is a very popular and easy image forgery trick. Therefore, detection of image splicing is one of the major problems in digital forensics. A new passive (non-intrusive) image tampering detection technique is proposed作者: Hemodialysis 時間: 2025-3-25 19:14
Software Process Definition and Managementnce evaluation is important for theory and applications. The present work investigates a Geo/Geo/1 G-queue with second optional service (SOS) and unreliable server. We assume that in addition to normal (positive) arriving customers, negative customers also arrive in the system. A customer in service作者: 神化怪物 時間: 2025-3-25 21:09 作者: indecipherable 時間: 2025-3-26 03:51 作者: 延期 時間: 2025-3-26 07:30
Ekkehard Baisch,Christoph Ebertniques. It is observed that improved linear extrapolation technique is more precise in detecting REP for plant health monitoring. Results are also verified by calculating hyperspectral vegetation indices of red edge region.作者: indecipherable 時間: 2025-3-26 09:24
From the Stack Principle to ALGOL, can make a statement and, in the future, deny any relations with it. Although this is the main premise of OTR, there is a list of additional characteristics that we are addressed in this paper. We also address the differences between OTR and some of the most used protocols in Internet of things (IoT) sector and why should IoT network use it.作者: Confound 時間: 2025-3-26 15:27
A Distributed Fault Analysis (DFA) Method for Fault Tolerance in High-Performance Computing Systemsgularly monitoring the nodes in fully connected systems and significantly reducing recovery time. The experiment analyzing a distributed system evaluates a variety of faults to accurately predict the faulty node and measures the sensitivity and specificity in comparison with the traditional mechanism to show the effectiveness of the proposal.作者: 甜食 時間: 2025-3-26 16:54 作者: coagulate 時間: 2025-3-27 00:34 作者: 莎草 時間: 2025-3-27 01:19 作者: Ankylo- 時間: 2025-3-27 08:12 作者: llibretto 時間: 2025-3-27 13:06 作者: 星球的光亮度 時間: 2025-3-27 13:41
B-Trees and Databases, Past and Future,of fertility. The aim of this paper is in twofold. The first objective is to analyze the use of methods of contraception among all the women and the factors or attributes which influence the use of methods, second to predict contraceptive method which is best suitable for women.作者: 禁止,切斷 時間: 2025-3-27 18:44
Software Process Automation in Perspective,llenge and time-consuming task for the detectors. In this research, multilevel ensemble classification approach is introduced to detect malware using the concept of API Calls usage frequency. The results show that the proposed multilevel ensemble approach achieves 94.67% accuracy.作者: ORBIT 時間: 2025-3-27 22:23 作者: 和平主義 時間: 2025-3-28 05:14 作者: 熔巖 時間: 2025-3-28 09:26 作者: Ceramic 時間: 2025-3-28 11:42
Prediction of Rise in Violence Inclined Opinions: Utility of Sentiment Analysis in the Modern Worlde been further analyzed to understand the utility of sentiment analysis in the modern world, and from the findings of the analysis, it is evident that there is indeed a reflection of increased inclination of tweets or expressions tendered by Twitter users on social platform of Twitter toward violence-oriented opinions.作者: 入伍儀式 時間: 2025-3-28 17:18 作者: 小母馬 時間: 2025-3-28 18:57
Malware Detection Using Multilevel Ensemble Supervised Learning,llenge and time-consuming task for the detectors. In this research, multilevel ensemble classification approach is introduced to detect malware using the concept of API Calls usage frequency. The results show that the proposed multilevel ensemble approach achieves 94.67% accuracy.作者: Annotate 時間: 2025-3-29 01:04 作者: 冷淡周邊 時間: 2025-3-29 04:37 作者: hermitage 時間: 2025-3-29 08:36
B-Trees and Databases, Past and Future,ags appear over the faces present in the picture so as to utilize this name functionality to tag them. The experimental results show that the proposed method performs better in terms of tagging as well as recognition in small duration of time.作者: Mercantile 時間: 2025-3-29 12:47 作者: 欺騙世家 時間: 2025-3-29 15:54 作者: Exaggerate 時間: 2025-3-29 23:08 作者: Fibrillation 時間: 2025-3-30 01:01
A Dynamic Hand Gesture-Based Password Recognition System,hand gestures is easily operable using natural languages. This way of controlling a device is much more intuitive and effortless as compared to using a touch screen, manipulating a mouse or remote control, tweaking a knob or pressing a switch. This paper presents a dynamic hand gesture-based passwor作者: hemoglobin 時間: 2025-3-30 05:06 作者: 親愛 時間: 2025-3-30 10:56
A Distributed Algorithm to Create a Minimum Spanning Tree in a Multi-channel Cognitive Radio Networm access is used in multi-channel networks. The CRNs are more efficient than traditional networks in terms of bandwidth utilization. The CRN is symbolized by selecting a channel for each unlicensed user from the set of available channels at every point in the path. Routing is possible if at least on作者: 大氣層 時間: 2025-3-30 14:39
A Distributed Fault Analysis (DFA) Method for Fault Tolerance in High-Performance Computing Systemsfailures and recovery operations. In addition, HPC is expected to meet large-scale computation needs in the future by minimizing the average failure time to almost negligible and by overcoming the growing challenge of handling fault tolerance. This paper proposes a novel distributed fault analysis (作者: Surgeon 時間: 2025-3-30 19:42
Ontology-Driven Framework to Automatically Generate University Timetable,sities make timetables manually, which are inefficient and consume a lot of time. Also, a large number of backtracks are required if some inconsistency is encountered. To generate a university timetable automatically, we present an ontology-driven approach that is much more efficient than the existi作者: Omnipotent 時間: 2025-3-30 22:47
A Survey on Task Scheduling and Resource Allocation Methods in Fog Based IoT Applications,the same time, the issues in this technology also need to be addressed while allocating and deploying resources. Regardless of rapid growth of cloud computing, plenty of issues are there which are necessary to be solved due to ingrained property of cloud computing such as location awareness, unrelia作者: 不可比擬 時間: 2025-3-31 02:13 作者: 微塵 時間: 2025-3-31 06:52
Stratified Sampling-Based Data Reduction and Categorization Model for Big Data Mining,neration, the format of data, storing natures, and their management. The common challenges of big data mining are related to the data volume, and data volume is indirectly related to the variety of data and data velocity. The volume-related challenges isolated by the big data analysis strategies are作者: Lethargic 時間: 2025-3-31 09:19
Product Sentiment Analysis Using Natural Language Understanding,me. Growth of any business depends upon catering to customers’ needs as quickly as possible. The branch of computer science, which helps people to achieve their goals, is known as artificial intelligence and machine learning. This paper proposed one such mechanism to ease out sentiment analysis proc作者: sultry 時間: 2025-3-31 14:35
Software Cost Estimation for Python Projects Using Genetic Algorithm,development encompasses a software project’s effort and development time. One popular model of software cost estimation is constructive cost model (COCOMO) model, which is a mathematical model proposed by Boehm, used for estimate the software effort and development time. The objective of this paper 作者: Juvenile 時間: 2025-3-31 18:59
Prediction of Rise in Violence Inclined Opinions: Utility of Sentiment Analysis in the Modern World use to the concerned organizations. Acquiring such knowledge from the analysis of the data available over the Internet has facilitated their decisions whether to improve, modify or reorganize the product. As a prototype, Python Program has been used in this article to understand the operation of se作者: eustachian-tube 時間: 2025-3-31 22:26 作者: 鋸齒狀 時間: 2025-4-1 04:58