派博傳思國際中心

標題: Titlebook: Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc; Suresh Chandra Satapathy,A. Govardha [打印本頁]

作者: 烏鴉    時間: 2025-3-21 19:57
書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc影響因子(影響力)




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc影響因子(影響力)學科排名




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc網(wǎng)絡公開度




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc網(wǎng)絡公開度學科排名




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc被引頻次




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc被引頻次學科排名




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc年度引用




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc年度引用學科排名




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc讀者反饋




書目名稱Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc讀者反饋學科排名





作者: 傀儡    時間: 2025-3-21 20:33
Performance Analysis of PBlock Algorithm Implemented Using SIMD Model to Attain Parallelism,sh algorithm using Single Instruction Multiple Data model which is named as PBlock and its implementation on a Symmetric Multi Processor machine along with the results of performance gains that we have obtained on a number of benchmark examples.
作者: PATRI    時間: 2025-3-22 04:12
User Aided Approach for Shadow and Ghost Removal in Robust Video Analytics,lying local group intensity spline fittings around the shadow boundary area. Bad intensity samples are substituted by their nearest intensities based on a log-normal probability distribution of fitting errors. Finally, it uses a gradual colour transfer to correct post-processing anomalies such as ga
作者: 車床    時間: 2025-3-22 07:35
Natural Language Query Refinement Scheme for Indic Literature Information System on Mobiles,by users..In this paper we describe the development of the information system for transliterated documents and share our experimental results of relevance feedback mechanism. We have designed a probability relevance model for rank management customization. The performance improvement of the system i
作者: 完成才會征服    時間: 2025-3-22 09:22

作者: Guileless    時間: 2025-3-22 15:16
Bibiana Rius Ph.D.,Joan Clària Ph.D.lying local group intensity spline fittings around the shadow boundary area. Bad intensity samples are substituted by their nearest intensities based on a log-normal probability distribution of fitting errors. Finally, it uses a gradual colour transfer to correct post-processing anomalies such as ga
作者: Guileless    時間: 2025-3-22 19:24

作者: arabesque    時間: 2025-3-23 01:07

作者: Seizure    時間: 2025-3-23 02:52
G. Marius Clore,Angela M. Gronenborn(in terms of removal of fine structures) upon restoration. In context of magnitude Magnetic Resonance Images (MRI), where noise is approximated as Rician instead of additive Gaussian; denoising algorithms fail to produce satisfactory results. This paper presents a Non-Local Means (NLM) based filteri
作者: 擔憂    時間: 2025-3-23 09:15

作者: 圓柱    時間: 2025-3-23 12:03
Alberta Ferrarini,Giorgio J. Moroethod for Offline Malayalam Character Recognition using multiple classifier combination technique. From the preprocessed character images, we have extracted two features: Chain Code Histogram and Fourier Descriptors. These features are fed as input to two feedforward neural networks. Finally, the re
作者: Diaphragm    時間: 2025-3-23 17:15
Terence N. Mitchell,Burkhard Costisellaon classification, music categorization, semantic scene classification, etc., It in-turn uses different evaluation metrics like hamming loss and subset loss for solving multi-label classification but which are deterministic in nature. In this paper, we concentrate on probabilistic models and develop
作者: 落葉劑    時間: 2025-3-23 20:24
NMR - From Spectra to Structures-frequency to reduce the human efforts. Based on supervise autonomy, tractor is able to plough the field with defined pressure on the soil. A simple desktop computer can operate this radio controlled tractor through arrow keys by viewing the scene from camera headed over front of it. This is a proto
作者: 暫時別動    時間: 2025-3-23 23:23
Line shape of M?ssbauer relaxation spectraonment. Different interference levels are encountered across a packet transmission, creating the interference diversity that mitigates the multiple access interference effects. It also improves the spectral efficiency. The information efficiency of the network is evaluated in terms of the product of
作者: 名義上    時間: 2025-3-24 06:10
Aufgaben zur NMR Spektroskopie,ich must support the classifier to classify similar objects into one category and the distinct objects into separate category. In this paper, we present a method based on HOG (Histogram of Oriented Gradients) for the recognition of handwritten kannada numerals. HOG descriptors are proved to be invar
作者: 文件夾    時間: 2025-3-24 09:08
Grundlagen der NMR-Spektroskopie,frames. The main endeavor of this paper is to use an object bounding box concept to detect the human blob and human activity detection using a system. The images are captured by using single static camera to make the system cost effective. The bounding box that bounds each object in the image frames
作者: 強制性    時間: 2025-3-24 12:51
NMR-Tomography and -Spectroscopy in Medicineuting applications. The security of data is ensured through the use of various types of encryption algorithms. In the current cloud computing era we are witnessing the use of multi core processors which has enabled us to run security applications, simultaneously at both client and the server end. Th
作者: Keratectomy    時間: 2025-3-24 17:29
NMR-Tomography of the Normal Braine available techniques.We are embedding blockwise watermark against the noise, filtering and cropping attack. Before embedding the watermark for any host image we must calculate the gain factor. According to our approach gain factor will vary for two different host images . The experimental results
作者: carotenoids    時間: 2025-3-24 20:51

作者: 開始沒有    時間: 2025-3-24 23:09
https://doi.org/10.1007/978-3-322-99618-3ugh produces promising results, has the disadvantage of the tabu size being fixed. The tabu size is fixed by the user and it determines the capacity of the memory. A preset parameter does not yield appropriate results in a heuristic algorithm and so there must be mechanisms to make the tabu list siz
作者: 聲音刺耳    時間: 2025-3-25 03:33
Dirk Langer,Martin Burkert,Heinrich Koeppents over the many science fields, such as medical and industrial applications. Hence, it was necessary to find ways for studying and working to develop control systems. This paper proposes study of an aircraft as control object in longitudinal channel during the landing phase, and study altitude due
作者: Misgiving    時間: 2025-3-25 11:24

作者: Anticoagulant    時間: 2025-3-25 12:50

作者: 背心    時間: 2025-3-25 15:49

作者: 枕墊    時間: 2025-3-25 22:32

作者: 窩轉(zhuǎn)脊椎動物    時間: 2025-3-26 01:14
https://doi.org/10.1007/978-1-4842-2412-0al time application with popularity of mobile phones always tests scheduler performance of broadband wireless systems like WiMAX. Distribution of resources in such networks has always been a challenging phenomenon. This problem can be solved if scheduling decision is based on traffic conditions of i
作者: Communicate    時間: 2025-3-26 06:55

作者: 都相信我的話    時間: 2025-3-26 12:24

作者: 膽小懦夫    時間: 2025-3-26 16:03
Suresh Chandra Satapathy,A. Govardhan,J. K. MandalLatest research on ICT and critical infrastructure.Results of the 49th Annual Convention of the Computer Society of India, held 11-15 Dec 2014 in Hyderabad, India.Written by experts in the field
作者: 奴才    時間: 2025-3-26 20:46

作者: bizarre    時間: 2025-3-27 00:38

作者: ABIDE    時間: 2025-3-27 04:31
Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Soc978-3-319-13731-5Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: regale    時間: 2025-3-27 07:15

作者: 單調(diào)女    時間: 2025-3-27 12:38

作者: 議程    時間: 2025-3-27 14:58

作者: packet    時間: 2025-3-27 20:41

作者: Gourmet    時間: 2025-3-27 23:45

作者: forebear    時間: 2025-3-28 02:38
Evaluation of Pheromone Update in Min-Max Ant System Algorithm to Optimizing QoS for Multimedia SerAS) algorithm with a pheromone updating scheme to solve it. We compared effective of MMAS to SMMAS (.), MLAS (.) and 3-LAS (.). The computational results showed that our approach is currently among the best performing algorithms for this problem.
作者: Alcove    時間: 2025-3-28 10:17
A Probabilistic Based Multi-label Classification Method Using Partial Information,ea of grouping related labels. This method trains one classifier for each group and the corresponding label is called as group representative. Predict other labels based on the predicted labels of group representative. The relations between the labels are found using the concept of association rule mining.
作者: LIKEN    時間: 2025-3-28 11:39

作者: 問到了燒瓶    時間: 2025-3-28 16:48
Playlist Generation Using Reactive Tabu Search,tions. This proposed method for the playlist generation problem yields better results than the conventional tabu search. The concrete implementation of the method has been described, which is supported by experimental analysis.
作者: 公共汽車    時間: 2025-3-28 19:52
Quality of Service Analysis of Fuzzy Based Resource Allocator for Wimax Networks,ined. The system works as adaptive approach in granting bandwidth to those traffic classes that has relatively higher share of incoming traffic in its queues. The results demonstrate significance of the proposed method.
作者: 損壞    時間: 2025-3-28 23:07

作者: 具體    時間: 2025-3-29 05:32

作者: Liability    時間: 2025-3-29 08:29

作者: Corroborate    時間: 2025-3-29 13:00

作者: Mucosa    時間: 2025-3-29 16:42

作者: AVOW    時間: 2025-3-29 20:35
Analysis of Performance of MIMO Ad Hoc Network in Terms of Information Efficiency, spectral efficiency and distance. In this paper, different path losses are considered to optimize the transmission range and to enhance information efficiency. The performance of the framework is evaluated for real time channel model.
作者: 鴕鳥    時間: 2025-3-30 03:02

作者: Bombast    時間: 2025-3-30 04:55
Design and Utilization of Bounding Box in Human Detection and Activity Identification, can be utilized to track and detect activities of the moving objects in further frames. These bounding boxes can be utilized to detect human and human activities like crowd and the estimation of crowd. This paper gives the implementation results of bounding box for activity detection.
作者: 大方一點    時間: 2025-3-30 09:24
Design of Fuzzy Logic Controller to Drive Autopilot Altitude in Landing Phase,to its importance during this phase. This paper introduces the possibility of implementing automated control process using fuzzy controllers. Finally, comparing the results of fuzzy and traditional controllers has been discussed.
作者: alabaster    時間: 2025-3-30 13:46
Video Shot Boundary Detection: A Review,the works that has been done previously. In this paper we have discussed few algorithms that were proposed previously which also includes histogram based, DCT based and motion vector based algorithms as well as their advantages and their limitations.
作者: Foolproof    時間: 2025-3-30 16:46

作者: 華而不實    時間: 2025-3-30 22:38
2194-5357 ndia. This volume contains papers mainly focused on Machine Learning & Computational Intelligence, Ad hoc Wireless Sensor Networks and Networks Security, Data Mining, Data Engineering and Soft Computing..978-3-319-13730-8978-3-319-13731-5Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: optional    時間: 2025-3-31 03:02
Blind Watermarking Technique for Grey Scale Image Using Block Level Discrete Cosine Transform (DCT)ost image we must calculate the gain factor. According to our approach gain factor will vary for two different host images . The experimental results show that in addition the invisibility and security, the scheme is also robust against signal processing.
作者: 無脊椎    時間: 2025-3-31 06:22

作者: 容易懂得    時間: 2025-3-31 11:54
Alberta Ferrarini,Giorgio J. Morosults of both neural networks are combined using a weighted majority technique. The proposed system is tested using two schemes- Writer independant and Writer dependant schemes. It is observed that the system achieves an accuracy of 92.84% and 96.24% respectively for the writer independant and writer dependant scheme considering top 3 choices.
作者: 埋伏    時間: 2025-3-31 14:26

作者: heirloom    時間: 2025-3-31 18:20

作者: 階層    時間: 2025-3-31 22:49

作者: Diskectomy    時間: 2025-4-1 04:18
Grundlagen der NMR-Spektroskopie, can be utilized to track and detect activities of the moving objects in further frames. These bounding boxes can be utilized to detect human and human activities like crowd and the estimation of crowd. This paper gives the implementation results of bounding box for activity detection.
作者: MINT    時間: 2025-4-1 09:53





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
肃北| 皋兰县| 广昌县| 名山县| 贺州市| 平果县| 双桥区| 临沂市| 鲁山县| 建阳市| 乌兰察布市| 峨眉山市| 哈密市| 宕昌县| 合水县| 元谋县| 勐海县| 阜阳市| 九江县| 新源县| 美姑县| 红安县| 突泉县| 永寿县| 奉节县| 泉州市| 乌恰县| 夏津县| 高陵县| 井冈山市| 息烽县| 新绛县| 彭州市| 华阴市| 蒲城县| 潞西市| 裕民县| 富川| 哈巴河县| 成安县| 永顺县|