標題: Titlebook: Computer and Communication Engineering; Third International Filippo Neri,Ke-Lin Du,Zhiyu Jiang Conference proceedings 2023 The Editor(s) ( [打印本頁] 作者: 底的根除 時間: 2025-3-21 16:40
書目名稱Computer and Communication Engineering影響因子(影響力)
書目名稱Computer and Communication Engineering影響因子(影響力)學科排名
書目名稱Computer and Communication Engineering網(wǎng)絡公開度
書目名稱Computer and Communication Engineering網(wǎng)絡公開度學科排名
書目名稱Computer and Communication Engineering被引頻次
書目名稱Computer and Communication Engineering被引頻次學科排名
書目名稱Computer and Communication Engineering年度引用
書目名稱Computer and Communication Engineering年度引用學科排名
書目名稱Computer and Communication Engineering讀者反饋
書目名稱Computer and Communication Engineering讀者反饋學科排名
作者: INERT 時間: 2025-3-21 21:32 作者: 棲息地 時間: 2025-3-22 01:13 作者: Anecdote 時間: 2025-3-22 04:35 作者: 組成 時間: 2025-3-22 11:53 作者: Anticlimax 時間: 2025-3-22 14:28
https://doi.org/10.1057/978-1-137-50624-5mography uses the electromagnetic spectrum’s infrared region to detect heat that has been emitted. FLIR ONE thermal camera was used to acquire images of the sample. In order to represent each sample, a thermal index was generated using the average value of the pixels in the thermal image. In this st作者: Anticlimax 時間: 2025-3-22 18:17 作者: Constituent 時間: 2025-3-22 22:35
https://doi.org/10.1007/978-3-642-30684-6o provide seamless connection and high data rate to a pair of proximity users. However, such high data rate can be achieved, only if the concerned device pair resides in close proximity and a direct line of sight (LoS) link exists between them. The proximity and the LoS link is necessary because of 作者: anniversary 時間: 2025-3-23 05:22 作者: 男生戴手銬 時間: 2025-3-23 08:35 作者: 初次登臺 時間: 2025-3-23 09:46
Alfred Lord Tennyson and Matthew Arnoldis considered. RIS can bypass the blocked D2D pairs since mmWaves are highly susceptible to blockages. However, the RIS is composed of passive elements which cannot accurately measure the state of the given channel and may suffer outages from moving obstacles (blockages) or due to moving devices (co作者: 自然環(huán)境 時間: 2025-3-23 17:15 作者: 補助 時間: 2025-3-23 19:12
Samuel Taylor Coleridge and John Claree not allowed to go to these places, people have settled on online gambling. Like any other application, gambling apps require users to log in and input their information, such as credit card numbers, bank accounts, etc., to add money to their online gambling accounts. Some people also try to downlo作者: Corporeal 時間: 2025-3-24 02:16
https://doi.org/10.1007/978-1-349-02875-7heir own devices has caused the trend to become more prevalent. They are more likely to use their own laptops, tablets, and smart phones for work and personal use. With the number of tools that are available to communicate with different people, organizations data will be stored on various devices. 作者: Obliterate 時間: 2025-3-24 02:59
,Trollope’s ‘Political’ Novels: , to , study aims to design and develop a home-bot’s accident-sensory system to monitor flame, smoke, and earthquake detection through the use of IoT; and develop an android application to monitor the transmitted data from the device (hubs) and even control the home-bot using Bluetooth. The real-time read作者: 犬儒主義者 時間: 2025-3-24 09:41
The English Novel at Mid-Centuryves to analyze the relationship between crime location and crime types from huge crime datasets, which are tedious and overwhelming. Hence, subject the criminal prediction results to errors. While many researchers make use of static crime dataset features for prediction which affects the prediction 作者: THROB 時間: 2025-3-24 11:53 作者: 美麗的寫 時間: 2025-3-24 18:06 作者: NOT 時間: 2025-3-24 22:09 作者: 構(gòu)想 時間: 2025-3-25 00:38 作者: 連鎖,連串 時間: 2025-3-25 06:36 作者: 離開真充足 時間: 2025-3-25 07:43 作者: cunning 時間: 2025-3-25 11:43 作者: Adrenal-Glands 時間: 2025-3-25 19:10
An Analysis of the Performance Changes of the Model by Reducing the Input Feature Dimension in Stockrefore, in this paper, the number of input features used in previous studies was reduced by using the dimension reduction method, and the performance change was analyzed. As a result of the experiment, it was confirmed that the models to which the PCA is applied have improved training speed and performance compared to the model without the PCA.作者: INTER 時間: 2025-3-25 21:18
A Hybrid Algorithm by Incorporating Neural Network and Metaheuristic Algorithms for Function Approxi the optimal training expression among corresponding algorithms in this study. Additionally, method appraisal consequences for two benchmark nonlinear test functions illustrate that the proposed HSIA algorithm surpasses corresponding algorithms in accuracy of function approximation issue and the industrial computer (IC) demand prediction exercise.作者: JUST 時間: 2025-3-26 04:03
1865-0929 in Stockholm, Sweden, in March 2023..The 18 full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in the following topical sections: image analysis and method; network model and function analysis of mobile network; system security estimation and ana作者: podiatrist 時間: 2025-3-26 07:06
Conference proceedings 2023lm, Sweden, in March 2023..The 18 full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in the following topical sections: image analysis and method; network model and function analysis of mobile network; system security estimation and analysis of d作者: Virtues 時間: 2025-3-26 10:44
Samuel Taylor Coleridge and John Clareic as well as dynamic obstacles. This requires some knowledge about the blockage probabilities due to the obstacles. We then present a way of learning these blockage probabilities using the Dempster-Shafer evidential theory framework. We show the effectiveness of our proposed scheme over an existing approach through extensive simulations.作者: sperse 時間: 2025-3-26 15:10
Obstacle Aware Link Selection for?Stable Multicast D2D Communicationsic as well as dynamic obstacles. This requires some knowledge about the blockage probabilities due to the obstacles. We then present a way of learning these blockage probabilities using the Dempster-Shafer evidential theory framework. We show the effectiveness of our proposed scheme over an existing approach through extensive simulations.作者: Boycott 時間: 2025-3-26 18:31 作者: 有惡意 時間: 2025-3-26 21:40 作者: Vsd168 時間: 2025-3-27 02:46
1865-0929 n the following topical sections: image analysis and method; network model and function analysis of mobile network; system security estimation and analysis of data network; and AI-based system model and algorithm..978-3-031-35298-0978-3-031-35299-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 認識 時間: 2025-3-27 06:00
Samuel Taylor Coleridge and John Claread these applications unofficially, thinking they might be able to gain an advantage that puts them at risk. In this study, the researchers aim to address the issues of downloading gambling applications from unofficial sources.作者: tendinitis 時間: 2025-3-27 12:17 作者: ARCHE 時間: 2025-3-27 17:23 作者: Costume 時間: 2025-3-27 19:35 作者: cluster 時間: 2025-3-27 23:39
Louis MacNeice and Dylan Thomasdo not always select the best link based on instantaneous system parameters; rather, we can counter-intuitively choose slower, but more stable links. To achieve this, we consider user mobility, and obstacles which may cause links to fail prematurely. We demonstrate the accuracy with which dynamic ob作者: Reservation 時間: 2025-3-28 05:16 作者: 騷動 時間: 2025-3-28 10:20 作者: MOAN 時間: 2025-3-28 14:23
https://doi.org/10.1007/978-1-349-02875-7 of the personal devices are connected to company network and that devices are using too much bandwidth. This study identifies the factors that influence an employee‘s decision to comply with the security policies of an organization and how the organizations implement the security policy and conduct作者: 扔掉掐死你 時間: 2025-3-28 15:14
,Trollope’s ‘Political’ Novels: , to ,r with a voting algorithm to avoid false alarms. The data gathered from the functionality tests was statistically analyzed using the confusion matrix method and resulted a 95.5% sensor accuracy for flame detection, 90.0% sensor accuracy for both the smoke and earthquake detection, and a successful t作者: 集中營 時間: 2025-3-28 20:25 作者: Paleontology 時間: 2025-3-29 01:03 作者: 臨時抱佛腳 時間: 2025-3-29 05:08
Enhanced Acoustic Noise Reduction Techniques for Magnetic Resonance Imaging System noise level reduction by employing multiple microphones with this modified ANC system. The sound pressure level (SPL) is measured with and without ANC system. From the result analysis, it is found that the ANC system performance is enhanced to significant level of 24?dB noise reduction with glasswo作者: 有花 時間: 2025-3-29 07:54
An Interpretable Hybrid Recommender Based on Graph Convolution to Address Serendipity users’ trust in the model and is an attempt at understanding the features and their relevance. The results of the hybrid recommender are explained using post hoc interpretability techniques. Additionally, serendipity is used to capture user satisfaction and the factor of “pleasant surprise” with th作者: TERRA 時間: 2025-3-29 12:31
A Geometry-Based Strategic Placement of?RISs in?Millimeter Wave Device to?Device Communicationthose device pairs who do not have any direct LoS links. In order to provide an indirect LoS link for a requesting device pair, we first use some basic ideas from computational geometry to find out the candidate zones for placing RISs. Next we find the candidate zones for all such requesting device 作者: 我就不公正 時間: 2025-3-29 16:23
Mobility Aware Path Selection for?Millimeterwave 5G Networks in?the?Presence of?Obstaclesdo not always select the best link based on instantaneous system parameters; rather, we can counter-intuitively choose slower, but more stable links. To achieve this, we consider user mobility, and obstacles which may cause links to fail prematurely. We demonstrate the accuracy with which dynamic ob作者: aristocracy 時間: 2025-3-29 21:30 作者: 真實的你 時間: 2025-3-30 03:42 作者: Entreaty 時間: 2025-3-30 06:20
A Compliance Based and Security Assessment of Bring Your Own Device (BYOD) in Organizations of the personal devices are connected to company network and that devices are using too much bandwidth. This study identifies the factors that influence an employee‘s decision to comply with the security policies of an organization and how the organizations implement the security policy and conduct作者: 浮雕 時間: 2025-3-30 10:26
Development of Home-Bot with Accident-Sensory System Using IOT and Android Application for Controlr with a voting algorithm to avoid false alarms. The data gathered from the functionality tests was statistically analyzed using the confusion matrix method and resulted a 95.5% sensor accuracy for flame detection, 90.0% sensor accuracy for both the smoke and earthquake detection, and a successful t作者: Crayon 時間: 2025-3-30 14:30 作者: 停止償付 時間: 2025-3-30 20:19 作者: 徹底明白 時間: 2025-3-30 21:17 作者: notice 時間: 2025-3-31 02:19
Rough Rice Grading in the Philippines Using Infrared Thermographymography uses the electromagnetic spectrum’s infrared region to detect heat that has been emitted. FLIR ONE thermal camera was used to acquire images of the sample. In order to represent each sample, a thermal index was generated using the average value of the pixels in the thermal image. In this st作者: conifer 時間: 2025-3-31 08:32
An Interpretable Hybrid Recommender Based on Graph Convolution to Address Serendipityalances contrasting metrics. The individual com-ponents are a content-based and collaborative filtering-based model, a neural network model, and a graph convolutional network model. The individual models used in today’s scientific landscape focus entirely on a single metric to be tuned and optimized