標(biāo)題: Titlebook: Computational Intelligence in Communications and Business Analytics; 5th International Co Kousik Dasgupta,Somnath Mukhopadhyay,Paramartha D [打印本頁(yè)] 作者: 遠(yuǎn)見(jiàn) 時(shí)間: 2025-3-21 16:24
書目名稱Computational Intelligence in Communications and Business Analytics影響因子(影響力)
書目名稱Computational Intelligence in Communications and Business Analytics影響因子(影響力)學(xué)科排名
書目名稱Computational Intelligence in Communications and Business Analytics網(wǎng)絡(luò)公開(kāi)度
書目名稱Computational Intelligence in Communications and Business Analytics網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Computational Intelligence in Communications and Business Analytics被引頻次
書目名稱Computational Intelligence in Communications and Business Analytics被引頻次學(xué)科排名
書目名稱Computational Intelligence in Communications and Business Analytics年度引用
書目名稱Computational Intelligence in Communications and Business Analytics年度引用學(xué)科排名
書目名稱Computational Intelligence in Communications and Business Analytics讀者反饋
書目名稱Computational Intelligence in Communications and Business Analytics讀者反饋學(xué)科排名
作者: engagement 時(shí)間: 2025-3-21 21:46
1865-0929 viewed and selected from?187?submissions. The papers present recent research on intersection of computational intelligence, communications, and business analytics, fostering international collaboration and the dissemination of cutting-edge research..978-3-031-48878-8978-3-031-48879-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: figment 時(shí)間: 2025-3-22 04:03 作者: Mendicant 時(shí)間: 2025-3-22 08:19
https://doi.org/10.1007/978-3-8350-5427-1h, generalized Petersen graphs, . grid graph, Desargues graph, Windmill graphs etc. In this article, we have presented that there does not exist any spanning cactus when the considered graph is a Flower Snark Graph.作者: 格言 時(shí)間: 2025-3-22 08:58 作者: 影響 時(shí)間: 2025-3-22 15:01 作者: 影響 時(shí)間: 2025-3-22 17:10
https://doi.org/10.1007/978-981-15-9430-4e in the image pixels. It captures the boundary present in some images, so edges are the most suitable place to hide the data in an image. In this paper, we will do some qualitative and quantitative analysis of various edge-based steganography methods, and we will compare this with the existing steganography methods available.作者: 馬籠頭 時(shí)間: 2025-3-23 00:40 作者: 現(xiàn)實(shí) 時(shí)間: 2025-3-23 05:26 作者: Homocystinuria 時(shí)間: 2025-3-23 08:41 作者: DAMN 時(shí)間: 2025-3-23 12:14 作者: 聲音刺耳 時(shí)間: 2025-3-23 16:08
A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Reviews has complicated the task of community detection. In this review work, the authors have illustrated a few community detection algorithms that discover communities within dynamic social networks. An analysis of the discussed algorithms with a focus on the further research work has been done and a real life examples have been cited in the paper.作者: harbinger 時(shí)間: 2025-3-23 21:28 作者: foodstuff 時(shí)間: 2025-3-24 01:42
https://doi.org/10.1007/978-3-642-21960-3 not robust enough to keep up with security requirements of modern world. This paper analyses the different modifications proposed to one such cipher i.e., Playfair Cipher and how these modifications enhance it’s performance thus making it usable in modern world.作者: 彎曲的人 時(shí)間: 2025-3-24 04:35
Qualitative and?Quantitative Analysis of?Modifications in?Playfair Cipher not robust enough to keep up with security requirements of modern world. This paper analyses the different modifications proposed to one such cipher i.e., Playfair Cipher and how these modifications enhance it’s performance thus making it usable in modern world.作者: fertilizer 時(shí)間: 2025-3-24 08:48 作者: 高興一回 時(shí)間: 2025-3-24 13:01 作者: 閑聊 時(shí)間: 2025-3-24 15:41
A Machine Learning Based Video Summarization Framework for?Yoga-Posture Video key postures in a yoga session video by tracking a few key-posture points corresponding to vital parts of the human body. Compared to the widely used FFMPEG tool, the proposed method appears to have a higher proportion of matched keyframes but a lower proportion of missing key-frames and redundant 作者: endocardium 時(shí)間: 2025-3-24 19:56 作者: choroid 時(shí)間: 2025-3-25 01:50
Design of a Vehicle Overspeed Management System Using Blockchain-Assisted IoVs features like traceability, thus people can be confident that the system is secure and reliable. This paper highlights the problem that road transport in India is very unsafe, and put forward a proposed model of blockchain-assisted IoVs as a solution to tackle this issue.作者: 嚙齒動(dòng)物 時(shí)間: 2025-3-25 06:53
Analysis of Quantum Cryptology and the RSA Algorithms Defense Against Attacks Using Shor’s AlgorithmBM quantum environment are utilised. The amount of qubit capacity now available is the primary determinant of how simple it is to break the RSA algorithm. One can draw the conclusion that the capacity of any quantum computer to decode RSA codes is directly dependent on the number of bits used in tho作者: 現(xiàn)暈光 時(shí)間: 2025-3-25 10:27
Blockchain-Enabled IoV Framework for?Establishing Automated Communication Using Smart Contractered IoV architecture is proposed, with each layer’s functionality and representation is taken into account. This paper presents a blockchain-enabled IoV framework to enable trusted and disseminated communications among vehicles. In this framework, each vehicle act as a blockchain node and should be作者: Defiance 時(shí)間: 2025-3-25 13:39
Load Balancing in a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategy overall completion time of all jobs unquestionably contributes significantly to raising system throughput. This is accomplished by assigning a specific task to a particular virtual machine so that all machine loads are nearly equal and all tasks have nearly equal priority. Finally, we compare our t作者: 教唆 時(shí)間: 2025-3-25 19:20
Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computingity to the mobile user to execute an application outside the mobile device based on various parameters for different applications. The simulation work is carried out in the university laboratory with the mobile, desktop and laptop devices.作者: 不易燃 時(shí)間: 2025-3-25 20:33 作者: 忍受 時(shí)間: 2025-3-26 02:27 作者: Anthropoid 時(shí)間: 2025-3-26 04:19
Single Electron Tunneling Based Threshold Logic Unitrcuit are provided in the chapter 13. An electron bears the charge adequate to keep an information in a Single Electron tunneling based device (SED). Energy needed for execution of an operation in the SED based circuits is very low when compared with CMOS-based circuits. TLG would be a best and fine作者: Longitude 時(shí)間: 2025-3-26 10:12 作者: 一再困擾 時(shí)間: 2025-3-26 14:35
Strategic International Marketing key postures in a yoga session video by tracking a few key-posture points corresponding to vital parts of the human body. Compared to the widely used FFMPEG tool, the proposed method appears to have a higher proportion of matched keyframes but a lower proportion of missing key-frames and redundant 作者: burnish 時(shí)間: 2025-3-26 19:53 作者: overbearing 時(shí)間: 2025-3-26 22:08
https://doi.org/10.1007/978-3-8350-5427-1s features like traceability, thus people can be confident that the system is secure and reliable. This paper highlights the problem that road transport in India is very unsafe, and put forward a proposed model of blockchain-assisted IoVs as a solution to tackle this issue.作者: BRAVE 時(shí)間: 2025-3-27 03:05 作者: Obstruction 時(shí)間: 2025-3-27 08:04
https://doi.org/10.1007/978-3-8350-5427-1ered IoV architecture is proposed, with each layer’s functionality and representation is taken into account. This paper presents a blockchain-enabled IoV framework to enable trusted and disseminated communications among vehicles. In this framework, each vehicle act as a blockchain node and should be作者: 束以馬具 時(shí)間: 2025-3-27 09:26
https://doi.org/10.1007/978-3-8350-5427-1 overall completion time of all jobs unquestionably contributes significantly to raising system throughput. This is accomplished by assigning a specific task to a particular virtual machine so that all machine loads are nearly equal and all tasks have nearly equal priority. Finally, we compare our t作者: 朋黨派系 時(shí)間: 2025-3-27 13:49
https://doi.org/10.1007/978-3-8350-5427-1ity to the mobile user to execute an application outside the mobile device based on various parameters for different applications. The simulation work is carried out in the university laboratory with the mobile, desktop and laptop devices.作者: 去才蔑視 時(shí)間: 2025-3-27 20:56 作者: Relinquish 時(shí)間: 2025-3-28 01:58 作者: SPALL 時(shí)間: 2025-3-28 02:20 作者: Ganglion-Cyst 時(shí)間: 2025-3-28 06:42
Computational Intelligence in Communications and Business Analytics5th International Co作者: amnesia 時(shí)間: 2025-3-28 13:43 作者: CAB 時(shí)間: 2025-3-28 14:47
A Novel Approach of?Fragile Watermarking for?Authentication and?Tamper Detection Exploiting Local Bi it is essential to preserve multimedia data from outlawed access. Here, a novel approach of fragile watermarking for authentication and tamper detection has been suggested. Firstly, an input image is split up into non-overlapping blocks of sized .. A reference block has been chosen randomly to get 作者: Creatinine-Test 時(shí)間: 2025-3-28 20:41
A Machine Learning Based Video Summarization Framework for?Yoga-Posture Video without loss of interpretability. Given the abundance of video content and its complex nature, there has always been a huge demand for an effective video summarization technique to analyze various dynamic posture centric videos. Yoga session video summarization is one of the interesting application作者: 幸福愉悅感 時(shí)間: 2025-3-29 00:13 作者: 同來(lái)核對(duì) 時(shí)間: 2025-3-29 05:03
Design of a Vehicle Overspeed Management System Using Blockchain-Assisted IoVover the Internet according to predetermined standards. Traditional vehicular ad-hoc networks (VANET) have evolved into the Internet of Vehicles as a result of recent significant breakthroughs in the new but promising paradigm of the Internet of Things (IoT) and its fusion with cutting-edge wireless作者: Parabola 時(shí)間: 2025-3-29 07:27
A Study on Algorithms for Detection of Communities in Dynamic Social Networks: A Reviews exterior to the community. The problem of community detection is a key topic of research and has gained enough attention over last two decades. Considering the case of Dynamic Social Networks those changes with time community detection is an important issue. The existence of overlapping communitie作者: 得意人 時(shí)間: 2025-3-29 13:28 作者: definition 時(shí)間: 2025-3-29 18:08 作者: 得罪人 時(shí)間: 2025-3-29 23:05
Blockchain-Enabled IoV Framework for?Establishing Automated Communication Using Smart Contract refers to the IoT-on-Wheels, wherein moving objects exchange information that could mean the difference between life and death to one another and the nearby environment to ensure highly dependable and efficient traffic flows. IoV is a method used in intelligent transportation systems to enable vehi作者: glucagon 時(shí)間: 2025-3-30 00:58
Load Balancing in a Heterogeneous Cloud Environment with a New Cloudlet Scheduling Strategyncluding software (Software as a Service), platforms (Platform as a Service), and infrastructure (Infrastructure as a Service). Pay-as-you-go is the primary business model used by cloud service providers (CSP). Services are offered that are in demand. Therefore, it is the only obligation of the clou作者: 克制 時(shí)間: 2025-3-30 06:58
Protocol for?Dynamic Load Distributed Low Latency Web-Based Augmented Reality and?Virtual Reality in computational demands on mobile devices. To address this challenge, this paper proposes a software solution that offloads the workload from mobile devices to powerful rendering servers in the cloud. However, this introduces the problem of latency, which can adversely affect the user experience. 作者: 充滿裝飾 時(shí)間: 2025-3-30 11:39
Dynamic Priority Based Application Offloading Strategy in Mobile Cloud Computing. In paper [.], the cloudlets were selected based on the execution time. Execution time of the applications is a fixed parameter and therefore it was a static priority algorithm. In this paper, we are going to introduce the dynamic priority algorithm for the selection of the cloudlets to offload an 作者: nonsensical 時(shí)間: 2025-3-30 15:02 作者: 善辯 時(shí)間: 2025-3-30 20:28
Authentication and Access Control by Face Recognition and Intrusion Detection System, however none of them function completely error-free. This study uses face detection and recognition by Haar cascade classifier and LBPH for authentication initially, and then an intrusion detection system (IDS) using machine learning algorithm like FNT and KNN can identify fraudulent behavior. The作者: atrophy 時(shí)間: 2025-3-31 00:20 作者: Type-1-Diabetes 時(shí)間: 2025-3-31 03:36
Qualitative and?Quantitative Analysis of?Modifications in?Playfair Cipher Multiple encryption techniques are used to ensure the same. Certain famous classical ciphers which were in prevalent use during ancient times are now not robust enough to keep up with security requirements of modern world. This paper analyses the different modifications proposed to one such cipher 作者: 狂亂 時(shí)間: 2025-3-31 09:03 作者: Aspirin 時(shí)間: 2025-3-31 11:02