標(biāo)題: Titlebook: Data Science and Computational Intelligence; Sixteenth Internatio K. R. Venugopal,P. Deepa Shenoy,Sitharama S. Iyeng Conference proceedings [打印本頁] 作者: 游牧 時(shí)間: 2025-3-21 19:13
書目名稱Data Science and Computational Intelligence影響因子(影響力)
書目名稱Data Science and Computational Intelligence影響因子(影響力)學(xué)科排名
書目名稱Data Science and Computational Intelligence網(wǎng)絡(luò)公開度
書目名稱Data Science and Computational Intelligence網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Science and Computational Intelligence被引頻次
書目名稱Data Science and Computational Intelligence被引頻次學(xué)科排名
書目名稱Data Science and Computational Intelligence年度引用
書目名稱Data Science and Computational Intelligence年度引用學(xué)科排名
書目名稱Data Science and Computational Intelligence讀者反饋
書目名稱Data Science and Computational Intelligence讀者反饋學(xué)科排名
作者: 炸壞 時(shí)間: 2025-3-21 22:06
Tracey Potts Carson,Robert C. Carsonentification will be the concrete platform for the several post-high level activities of surveillance (like recognition, analysis, tracking, tracing, monitoring, etc.). The re-identification includes, recognizing the pedestrian footprints over the frames of occluded video traces. The video traces, m作者: 發(fā)酵劑 時(shí)間: 2025-3-22 02:12
Comprehensive Handbook of Psychopathologybject detection, which plays a prominent role in computer vision applications. Restoration of hazy images is necessary for exact identification and location of objects. This paper proposes a new prior based dehazing algorithm named Color Correction Transform Dark Channel Prior (CCTDCP). The proposed作者: 容易做 時(shí)間: 2025-3-22 05:50 作者: fringe 時(shí)間: 2025-3-22 09:59
Brendan A. Maher,Patricia J. Deldinillustrates an intelligent code completion system using an LSTM based Seq2Seq model that can be used in concert with traditional methods (Such as static analysis, prefix filtering, and tries) to increase the effectiveness of auto complete suggestions and help accelerate coding.作者: 原來 時(shí)間: 2025-3-22 13:27 作者: 原來 時(shí)間: 2025-3-22 18:06
James F. T. Bugental,Richard I. Kleinerta. Earlier research in deduplication of encrypted files resulted in an idea of converging encryption, which generates identical cipher texts from identical plain text. While the use of converging encryption does not address security challenges since users can still determine the occurrence of dedup作者: Gourmet 時(shí)間: 2025-3-22 22:58 作者: IRATE 時(shí)間: 2025-3-23 02:16 作者: Alcove 時(shí)間: 2025-3-23 05:55 作者: 博識(shí) 時(shí)間: 2025-3-23 12:07 作者: 貝雷帽 時(shí)間: 2025-3-23 14:55 作者: hauteur 時(shí)間: 2025-3-23 21:24
Simulating ECMO: Rationale and Genesisles the IaaS provider to offer infinite resources based on the pay-per-use model. Although the workflow scheduling problem has been widely investigated, however, most of them are concerned with a single QoS constraint and ignores the consideration of multiple QoS constrained problems. Therefore, thi作者: 嘮叨 時(shí)間: 2025-3-23 22:34
Lillian Su,Seth Kaplan,Mary J. Waller current study focuses on predicting the direction of the cryptocurrency ‘Bitcoin’ for trading window of 3?days, 5?days, and 10?days ahead of the current day. The predictive model proposed is built using ensemble learning via random forest. The model uses feature matrix drawn on technical indicators作者: Accrue 時(shí)間: 2025-3-24 04:24
David L. Rodgers,Roberta L. Halesrom traditional networks in terms of separation of the control plane and forwarding functions. The forwarding decisions are sent by the controller to switches and routers. The switches are responsible only for logical forwarding of the packets. Hence performance of any SDN network depends on the per作者: diskitis 時(shí)間: 2025-3-24 09:20 作者: 放縱 時(shí)間: 2025-3-24 11:44 作者: 天氣 時(shí)間: 2025-3-24 18:07
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/263090.jpg作者: 食料 時(shí)間: 2025-3-24 22:44
https://doi.org/10.1007/978-3-030-91244-4artificial intelligence; communication systems; computer hardware; computer networks; computer security; 作者: 一起平行 時(shí)間: 2025-3-25 00:07 作者: 搜尋 時(shí)間: 2025-3-25 06:37
Data Science and Computational Intelligence978-3-030-91244-4Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: ethnology 時(shí)間: 2025-3-25 09:02 作者: defenses 時(shí)間: 2025-3-25 13:12
Intelligent Code Completionillustrates an intelligent code completion system using an LSTM based Seq2Seq model that can be used in concert with traditional methods (Such as static analysis, prefix filtering, and tries) to increase the effectiveness of auto complete suggestions and help accelerate coding.作者: OVER 時(shí)間: 2025-3-25 18:52
Conference proceedings 2021ru, India in October 2021.?.The 33 full and 9 short papers presented in this volume were carefully reviewed and selected from a total of 177 submissions. The papers are organized in the following thematic blocks:??Computing & Network Security; Data Science; Intelligence & IoT..作者: Constrain 時(shí)間: 2025-3-25 21:17
Intelligent Computer Vision System for Detection of Tomatoes in Real Timealuation of the design concepts resulted in selection of optimal design for real time implementation. Real time results show the efficacy of the proposed system. Moreover, the designed system resulted in an accuracy of 90%. The execution time taken for detection of a single tomato is 0.2?s.作者: 嬰兒 時(shí)間: 2025-3-26 02:14
1865-0929 submissions. The papers are organized in the following thematic blocks:??Computing & Network Security; Data Science; Intelligence & IoT..978-3-030-91243-7978-3-030-91244-4Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Nucleate 時(shí)間: 2025-3-26 06:02
Comprehensive Handbook of Psychopathology algorithm utilizes white balance color correction transform, dark channel prior and gamma correction for retaining the originality of the image. The experimental results on benchmark images exhibit superior performance of CCTDCP algorithm over the state-of-the-art methods.作者: Tincture 時(shí)間: 2025-3-26 09:13 作者: Migratory 時(shí)間: 2025-3-26 15:30 作者: insolence 時(shí)間: 2025-3-26 17:48
https://doi.org/10.1007/978-1-4615-6681-6aluation of the design concepts resulted in selection of optimal design for real time implementation. Real time results show the efficacy of the proposed system. Moreover, the designed system resulted in an accuracy of 90%. The execution time taken for detection of a single tomato is 0.2?s.作者: 或者發(fā)神韻 時(shí)間: 2025-3-27 01:01 作者: 休閑 時(shí)間: 2025-3-27 01:25
David A. Edwards,Samsun Lampotangr improvement. On the contrary, for Upload and Download speed experiences, both BSNL and Jio lag. For Video and Games, there is still scope for improvement, although both these players are reasonable in their performance. Thus, this analysis provides an accurate and optimal benchmark for each variable whose user experience has been evaluated.作者: 草本植物 時(shí)間: 2025-3-27 06:42
Faculty and Allied Health Providers and implemented, which provides energy efficient virtual machine management solution by handling over-utilized and under-utilized physical machines. The efficacy of algorithm is evaluated through simulation using cloudsim toolkit.作者: 語言學(xué) 時(shí)間: 2025-3-27 10:55 作者: NEG 時(shí)間: 2025-3-27 17:41
On Improving Quality of Experience of 4G Mobile Networks – A Slack Based Approachr improvement. On the contrary, for Upload and Download speed experiences, both BSNL and Jio lag. For Video and Games, there is still scope for improvement, although both these players are reasonable in their performance. Thus, this analysis provides an accurate and optimal benchmark for each variable whose user experience has been evaluated.作者: 食物 時(shí)間: 2025-3-27 19:34
STVM: Scattered Time Aware Energy Efficient Virtual Machine Migration in Cloud Computing and implemented, which provides energy efficient virtual machine management solution by handling over-utilized and under-utilized physical machines. The efficacy of algorithm is evaluated through simulation using cloudsim toolkit.作者: BARK 時(shí)間: 2025-3-28 00:42 作者: 形容詞 時(shí)間: 2025-3-28 02:43 作者: exercise 時(shí)間: 2025-3-28 09:52
David L. Rodgers,Roberta L. Hales with varying scales. We have used D-ITG for performance evaluation. Iperf is also used for measuring the maximum available bandwidth. RYU controller performs better in terms of average delay, jitter, bitrate and throughput. The selection of the controller depends on the application requirements.作者: 辯論 時(shí)間: 2025-3-28 10:25
Evaluating the Performance of POX and RYU SDN Controllers Using Mininet with varying scales. We have used D-ITG for performance evaluation. Iperf is also used for measuring the maximum available bandwidth. RYU controller performs better in terms of average delay, jitter, bitrate and throughput. The selection of the controller depends on the application requirements.作者: savage 時(shí)間: 2025-3-28 15:02
Conference proceedings 2021ru, India in October 2021.?.The 33 full and 9 short papers presented in this volume were carefully reviewed and selected from a total of 177 submissions. The papers are organized in the following thematic blocks:??Computing & Network Security; Data Science; Intelligence & IoT..作者: averse 時(shí)間: 2025-3-28 21:47 作者: Corporeal 時(shí)間: 2025-3-29 02:45 作者: GLEAN 時(shí)間: 2025-3-29 05:53 作者: ASSET 時(shí)間: 2025-3-29 07:16
Intelligent Computer Vision System for Detection of Tomatoes in Real Timeystem is fabricated in real time using a slider mechanism. Fabrication was carried out by arriving at two design concepts for the slider mechanism. Evaluation of the design concepts resulted in selection of optimal design for real time implementation. Real time results show the efficacy of the propo作者: CBC471 時(shí)間: 2025-3-29 14:46
Intelligent Code Completionillustrates an intelligent code completion system using an LSTM based Seq2Seq model that can be used in concert with traditional methods (Such as static analysis, prefix filtering, and tries) to increase the effectiveness of auto complete suggestions and help accelerate coding.作者: 漂浮 時(shí)間: 2025-3-29 17:40
(,, ,, ,)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operationsshares are viewed as meaningful images. When the number of participants increases the graying effect problem in deterministic VCS is caused due to high pixel expansion. This graying effect was resolved using ideal contrast constructions in VCS, but not in EVCS. In ideal contrast VCS; combinations of作者: 并入 時(shí)間: 2025-3-29 21:50
Improving Storage Efficiency with Multi-cluster Deduplication and Achieving High-Data Availability ita. Earlier research in deduplication of encrypted files resulted in an idea of converging encryption, which generates identical cipher texts from identical plain text. While the use of converging encryption does not address security challenges since users can still determine the occurrence of dedup作者: 抓住他投降 時(shí)間: 2025-3-30 01:34 作者: 潛伏期 時(shí)間: 2025-3-30 04:08
Enterprise Systems and Emerging Technologies - A Futuristic Perspective and Recommendations for a Pat development practices and process involvement, the significance of enterprise systems and various technology evolution that enhanced the dynamics of the enterprise computing systems, with an improved performance, scalability are discussed. The emergence of hypervisor and virtualization platform so作者: fulcrum 時(shí)間: 2025-3-30 10:41
Highly Accurate Optical Encryption for Image Security Applications Using FFT and Block Swappingsmission plays a major role in various applications such as biomedical engineering, Remote sensing, Robotics, and industrial automation, etc. Previously, various techniques have been proposed to perform the optical image encryption process with a high degree of security. The main issue of previous w作者: 譏笑 時(shí)間: 2025-3-30 16:19 作者: 騷擾 時(shí)間: 2025-3-30 18:06 作者: persistence 時(shí)間: 2025-3-30 23:28
DRP-DBAS: Dynamic Resource Provisioning for Deadline and Budget Aware Workflow Scheduling in IaaS Clles the IaaS provider to offer infinite resources based on the pay-per-use model. Although the workflow scheduling problem has been widely investigated, however, most of them are concerned with a single QoS constraint and ignores the consideration of multiple QoS constrained problems. Therefore, thi作者: 連累 時(shí)間: 2025-3-31 02:24
Predicting the Movement of Cryptocurrency “Bitcoin” Using Random Forest current study focuses on predicting the direction of the cryptocurrency ‘Bitcoin’ for trading window of 3?days, 5?days, and 10?days ahead of the current day. The predictive model proposed is built using ensemble learning via random forest. The model uses feature matrix drawn on technical indicators作者: Macronutrients 時(shí)間: 2025-3-31 07:22 作者: FLUSH 時(shí)間: 2025-3-31 10:23 作者: 血統(tǒng) 時(shí)間: 2025-3-31 14:00
Prediction of Essential Protein Using Machine Learning Techniqueand drug design. Essential proteins are predicted from many protein-protein interactions (PPI) networks that are developed using high-throughput techniques. Computational methods are used by many existing proposed techniques to identify essential proteins. Many of them considered topological feature作者: VAN 時(shí)間: 2025-3-31 18:00
Runtime Program Semantics Based Malware Detection in Virtual Machines of Cloud Computing applied to the anomaly detection module at hypervisor level, where an ensemble of Random forest, Extra trees and Kernel SVM with majority voting technique is used to detect any malware. The alerts generated by signature based technique and anomaly detection from all the VMs are analyzed to check an作者: 一起 時(shí)間: 2025-4-1 00:18
Topic Models for Re-Id from Curbed Video Tracess based on re-identification perspective. Several experiments were carried-out on well-known public re-identification datasets, and the superiority of the proposed novel re-identification technique is proved with the rigorous analysis on these datasets.作者: endocardium 時(shí)間: 2025-4-1 05:37
Improving Storage Efficiency with Multi-cluster Deduplication and Achieving High-Data Availability i keeping the encrypted files in multiple servers. The cloud server minimizes the storage space by deleting the unused files from the server. The implementation of RC4 (Rivest Cipher 4) symmetric encryption technique reduces the cipher text size over AES (Advanced Encryption Standard) and RC4 consume作者: 陳腐思想 時(shí)間: 2025-4-1 06:58
Handwritten Kannada Digit Recognition System Using CNN with Random Forest the feature extracted output of CNN model to predict better accuracy, by combining with CNN. Automatic Feature extractor is one the main function of the CNN with the Random Forest as prior classifier. The main aim of this research is to make the implementation by integrating both CNN and RF for hig