標(biāo)題: Titlebook: Congress on Smart Computing Technologies; Proceedings of CSCT Jagdish Chand Bansal,Harish Sharma,Antorweep Chakr Conference proceedings 20 [打印本頁(yè)] 作者: 拖累 時(shí)間: 2025-3-21 20:00
書目名稱Congress on Smart Computing Technologies影響因子(影響力)
書目名稱Congress on Smart Computing Technologies影響因子(影響力)學(xué)科排名
書目名稱Congress on Smart Computing Technologies網(wǎng)絡(luò)公開(kāi)度
書目名稱Congress on Smart Computing Technologies網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Congress on Smart Computing Technologies被引頻次
書目名稱Congress on Smart Computing Technologies被引頻次學(xué)科排名
書目名稱Congress on Smart Computing Technologies年度引用
書目名稱Congress on Smart Computing Technologies年度引用學(xué)科排名
書目名稱Congress on Smart Computing Technologies讀者反饋
書目名稱Congress on Smart Computing Technologies讀者反饋學(xué)科排名
作者: ENNUI 時(shí)間: 2025-3-21 21:49 作者: Clinch 時(shí)間: 2025-3-22 02:30 作者: Aggregate 時(shí)間: 2025-3-22 05:05
Smart Innovation, Systems and Technologieshttp://image.papertrans.cn/c/image/235531.jpg作者: mediocrity 時(shí)間: 2025-3-22 09:48
Congress on Smart Computing Technologies978-981-99-2468-4Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: TIGER 時(shí)間: 2025-3-22 13:58
Interest Groups and Transport Policys to the best choice of investment, but the equity market is highly volatile and risky. Algo-trading strategies using machine learning algorithms are being widely implemented for prediction and pattern identifications. Different strategies and different algorithms are still in its infancy for algo-t作者: TIGER 時(shí)間: 2025-3-22 19:22 作者: 火花 時(shí)間: 2025-3-23 01:10 作者: collateral 時(shí)間: 2025-3-23 03:07 作者: giggle 時(shí)間: 2025-3-23 06:05
Stephen Glaister,June Burnham,Tony Traversects aged between 19 and 22?years and eight healthy ageing subjects aged between 79 and 83?years to perform different motor tasks involving a change in grip. Over one billion people suffer from neurological disorders and find it difficult to perform the basic activities because appropriate signals f作者: 性上癮 時(shí)間: 2025-3-23 13:47 作者: STALL 時(shí)間: 2025-3-23 16:47
https://doi.org/10.1007/978-1-4757-3756-1c number plate recognition (ANPR) model by utilizing machine learning techniques. In our system, TensorFlow is used for license plate detection, while Tesseract is used for optical character recognition (OCR). The implemented model receives an image of a car as input data and recognizes the characte作者: Lacerate 時(shí)間: 2025-3-23 21:28
Ignacio J. Pérez-Arriaga,Yves Smeersteadily growing, and doctors have a significant burden in making an early diagnosis. The convolution neural network (CNN) is critical in diagnosing EC. In computer-aided diagnosis (CAD) and esophageal cancer categorization, practically all pre-trained networks function well. The ensembled CNN model 作者: circuit 時(shí)間: 2025-3-24 01:22 作者: 急性 時(shí)間: 2025-3-24 03:09
Transport Pricing of Electricity Networksntive measures has meant that the disease spread to a lot of people in a very short time. Efforts from the government have been effective for periods of time, but the next wave of cases had always seemed inevitable. Data availability and reliability are the challenges faced in forecasting new COVID-作者: Intellectual 時(shí)間: 2025-3-24 06:48
https://doi.org/10.1007/978-1-4757-3756-1ke them control their life as much as possible. There is an immense need to build a system that will help the visually impaired to let them know what is around them, to whom they are interacting, and lead life without the help of others. So, they are at a disadvantage as they need manual aid to urge作者: 閃光東本 時(shí)間: 2025-3-24 14:03 作者: 上坡 時(shí)間: 2025-3-24 16:57
Energy Balances in a Homogeneous Fluid,d occur in varying quantities, sizes, compositions, and morphology. The generated wear particles when examined and analyzed provide critical information about the machine’s condition. Analysis of wear particles is essential to identify wear failure modes of different components leading to malfunctio作者: 捐助 時(shí)間: 2025-3-24 20:59
J.M.P.Q. Delgado,A. G. Barbosa de Limace to machine intelligence. This research provides a conceptual framework to make a smart planning and scheduling system by applying intelligent systems for an Assemble-to-Order (ATO) production system. Intelligent manufacturing systems (IMS), knowledge-based intelligent systems (KBIS), and intellig作者: Water-Brash 時(shí)間: 2025-3-25 00:37 作者: AVANT 時(shí)間: 2025-3-25 03:39 作者: cunning 時(shí)間: 2025-3-25 10:50 作者: Lucubrate 時(shí)間: 2025-3-25 12:39 作者: 驚惶 時(shí)間: 2025-3-25 17:41
Transport Processes: Fundamentals ensures the privacy and confidentiality of the user‘s information. In cryptography, plain text is converted into ciphertext using an encryption algorithm, and a key is generated using a key generation algorithm. In the end, the ciphertext is decrypted back to its original plain text by using a decr作者: 背信 時(shí)間: 2025-3-25 22:25 作者: Heresy 時(shí)間: 2025-3-26 03:43
Transport Processes at Fluidic Interfacese results are compared with the different numerical problems. In this paper, we take five numerical methods and their convergence. The Newton-Raphson method is best among all the five discussed methods with rate of convergence 2, and Chebyshev method has a good rate of convergence?of 3 for all discussed numerical methods.作者: 小步走路 時(shí)間: 2025-3-26 08:12
Transport Processes at Fluidic Interfacese the traffic and analyze the performance of the modeled network. Mathematical distributions were used to evaluate the network and confirm the obtained results from the used monitoring tools through the mathematical apparatus. The used IP network modeling platform is GNS3. The passive method was used to monitor the network.作者: Servile 時(shí)間: 2025-3-26 09:37
https://doi.org/10.1007/978-3-319-56602-3y of classification for steel surface defects. We propose a bag of visual words technique with low computational complexity using BRISK detector and Support Vector Machines. Experiments conducted show that the proposed method outperforms many state-of-the-art approaches.作者: PATHY 時(shí)間: 2025-3-26 16:20 作者: 事情 時(shí)間: 2025-3-26 18:04 作者: Expediency 時(shí)間: 2025-3-26 21:46
,Steel Surface Defect Detection and?Classification Using Bag of?Visual Words with?BRISK,y of classification for steel surface defects. We propose a bag of visual words technique with low computational complexity using BRISK detector and Support Vector Machines. Experiments conducted show that the proposed method outperforms many state-of-the-art approaches.作者: 裝飾 時(shí)間: 2025-3-27 02:15
The Evolution of Transport Policywith convolution neural network mechanism. Experimental results were conducted on handwritten digit database of MNIST and error rate; classification accuracy was computed. A classification rate of 98.1% and 1.9% of error rate are observed on the subsamples of handwritten digit data of MNIST.作者: 推延 時(shí)間: 2025-3-27 08:00
Energy Balances in a Homogeneous Fluid,trusions. To assess our approach, we used an auto-encoder for feature reduction and two models for CNN and SVM evaluation. The experimental study on the dataset demonstrates that the suggested model can produce reliable results. On the UNSW-NB15 dataset, our model gets 99.58% and 99.66% accuracy for SVM and CNN, respectively.作者: 手銬 時(shí)間: 2025-3-27 13:20
Conference proceedings 2023h and Innovative Learning (SCRIL), South Asian University, India, from 3–4 December 2022. The book extensively covers recent research in algorithms for smart computing, AI and machine learning in smart computing, edge computing algorithms, adversarial networks and autoencoders, data visualization, d作者: 爭(zhēng)吵 時(shí)間: 2025-3-27 13:54
Making Transport Policy in Britainmodels, their types, and their application domains. The study?also covers the fundamental image fusion stages performed by any image fusion system. This work?can serve as a guide for scholars with a significant interest in the topic of image fusion.作者: capsule 時(shí)間: 2025-3-27 19:29 作者: 傷心 時(shí)間: 2025-3-27 23:40 作者: BYRE 時(shí)間: 2025-3-28 04:36
A Systematic Review of Image Fusion Approaches,models, their types, and their application domains. The study?also covers the fundamental image fusion stages performed by any image fusion system. This work?can serve as a guide for scholars with a significant interest in the topic of image fusion.作者: airborne 時(shí)間: 2025-3-28 09:03 作者: 云狀 時(shí)間: 2025-3-28 12:56
A Survey of Cryptographic Algorithms for Encryption and Key Transmission,resented in this work. Second, we carry out a literature review to showcase the previous research related to this paper. Next, we present a brief idea of all the algorithms used to find the best method by studying and comparing each algorithm. Our final point of a conclusion is that these algorithms are space-saving as well as secure.作者: Intact 時(shí)間: 2025-3-28 15:15 作者: 任命 時(shí)間: 2025-3-28 20:17 作者: 圓錐體 時(shí)間: 2025-3-28 23:55 作者: 填滿 時(shí)間: 2025-3-29 06:22 作者: infinite 時(shí)間: 2025-3-29 08:08
,Case Study: ANPR Utilized for?Smart Parking, processing. The model is trained on photos of car license plates of different countries, with a detection accuracy rate of 96.75%. This model can be utilized for any task which requires ANPR, e.g. smart parking [.].作者: misshapen 時(shí)間: 2025-3-29 12:08
A Convolution Neural Network Model to Classify Handwritten Digits from Skeletons,with convolution neural network mechanism. Experimental results were conducted on handwritten digit database of MNIST and error rate; classification accuracy was computed. A classification rate of 98.1% and 1.9% of error rate are observed on the subsamples of handwritten digit data of MNIST.作者: 朋黨派系 時(shí)間: 2025-3-29 15:33
Behavior Intrusion Detection System Using SVM and CNN,trusions. To assess our approach, we used an auto-encoder for feature reduction and two models for CNN and SVM evaluation. The experimental study on the dataset demonstrates that the suggested model can produce reliable results. On the UNSW-NB15 dataset, our model gets 99.58% and 99.66% accuracy for SVM and CNN, respectively.作者: 不知疲倦 時(shí)間: 2025-3-29 21:28 作者: Affluence 時(shí)間: 2025-3-30 03:28 作者: PRISE 時(shí)間: 2025-3-30 04:48
Stephen Glaister,June Burnham,Tony Traversthe same tasks. The paper made use of three classification algorithms which were random forest, decision tree and K-nearest neighbors (KNN). Data cleaning, preprocessing and feature extraction techniques were employed to enhance the overall performance of the system. Random forest gave a testing acc作者: 艦旗 時(shí)間: 2025-3-30 10:30 作者: Offstage 時(shí)間: 2025-3-30 15:44
Tariffs and Imperfect Competition(threshold) is selected in the feature subset which represents that star. The feature subsets associated with each star are then evaluated using a random forest classifier, while the rest of the algorithm follows the same steps as the Binary Black Hole algorithm. These two Black Hole algorithms are 作者: 摘要 時(shí)間: 2025-3-30 18:00
Transport Pricing of Electricity Networksing. It gives an accurate forecast to better understand and plan for the short term. The predictions would be presented along with recent accuracy statistics in absolute and in terms of percentage to get a better context of the predictions. The data are collected from official data endpoints of sour作者: 技術(shù) 時(shí)間: 2025-3-30 22:52
https://doi.org/10.1007/978-1-4757-3756-1 as age, gender, and emotion of the person will be given as a voice message to blind people. Due to the pandemic, the people are wearing clinical masks which makes the recognition process difficult as half of the face is covered, addressed by the system. Proposed system provides efficient communicat作者: 斑駁 時(shí)間: 2025-3-31 03:09 作者: deadlock 時(shí)間: 2025-3-31 07:52 作者: MANIA 時(shí)間: 2025-3-31 10:32 作者: 范圍廣 時(shí)間: 2025-3-31 13:51
A Wavelet Thresholding-Based Approach for Denoising the Color Image Affected by Gaussian Noise,he results confirm that the proposed method gives better results than existing algorithms. It is noticed that most of the noise affecting in the communication channel can be modeled as Gaussian noise. As per the central limit theorem, although the random variables are not normally distributed, they 作者: Assemble 時(shí)間: 2025-3-31 18:16 作者: 跟隨 時(shí)間: 2025-4-1 01:21
Classification of Esophageal Cancer Using Ensembled CNN with Generalized Normal Distribution Optimi an accuracy of 98.02%, sensitivity and .-score of 98.26, the proposed network combination of Xception, ResNet50, DarkNet53, and ShuffleNet with GNDO and M-SVM outperforms all existing techniques. The experimental research shows that the multi-CNN model is more efficient than those using individual