標(biāo)題: Titlebook: Emerging Research in Computing, Information, Communication and Applications; ERCICA 2020, Volume N. R. Shetty,L. M. Patnaik,N. Nalini Conf [打印本頁] 作者: Julienne 時(shí)間: 2025-3-21 19:02
書目名稱Emerging Research in Computing, Information, Communication and Applications影響因子(影響力)
書目名稱Emerging Research in Computing, Information, Communication and Applications影響因子(影響力)學(xué)科排名
書目名稱Emerging Research in Computing, Information, Communication and Applications網(wǎng)絡(luò)公開度
書目名稱Emerging Research in Computing, Information, Communication and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Emerging Research in Computing, Information, Communication and Applications被引頻次
書目名稱Emerging Research in Computing, Information, Communication and Applications被引頻次學(xué)科排名
書目名稱Emerging Research in Computing, Information, Communication and Applications年度引用
書目名稱Emerging Research in Computing, Information, Communication and Applications年度引用學(xué)科排名
書目名稱Emerging Research in Computing, Information, Communication and Applications讀者反饋
書目名稱Emerging Research in Computing, Information, Communication and Applications讀者反饋學(xué)科排名
作者: 奇怪 時(shí)間: 2025-3-21 22:51 作者: 因無茶而冷淡 時(shí)間: 2025-3-22 03:40
https://doi.org/10.1007/978-981-16-1338-8Computational Intelligence; Information Theory and Management; Communication; Networks; ERCICA20作者: 試驗(yàn) 時(shí)間: 2025-3-22 05:19 作者: Bravura 時(shí)間: 2025-3-22 10:51 作者: commute 時(shí)間: 2025-3-22 16:45 作者: commute 時(shí)間: 2025-3-22 17:50
,Das südmandschurische Pachtgebiet,esent a different characteristic of the Glioblastoma. Although, a single imaging modality is not enough to confirm the presence the tumor. Experts analyze each of the images independently and then make decisions on the location of the tumor. Early detection and accuracy of diagnosis depends on exper作者: 漂白 時(shí)間: 2025-3-22 23:18 作者: critic 時(shí)間: 2025-3-23 01:41 作者: 創(chuàng)造性 時(shí)間: 2025-3-23 08:52 作者: kindred 時(shí)間: 2025-3-23 12:40 作者: 劇毒 時(shí)間: 2025-3-23 13:57
https://doi.org/10.1007/978-3-322-95090-1 potholes in real time. The system collects live sensor data from a detection hardware module which comprises a Raspberry Pi, GPS module and a 3-axis accelerometer. This sensor data collected simultaneously from multiple users is then pushed on to the Cloud. It is then pre-processed to get the requi作者: FLIC 時(shí)間: 2025-3-23 19:49 作者: 疾馳 時(shí)間: 2025-3-23 23:07
,The Onslaught and Resistance, 1934–1935,thms. These values can be ignored if there are large number of instances in the dataset. However, deleting the records containing missing values in smaller sized datasets can lead to improper classification or predictions by the data mining algorithms. Several methods for finding missing values are 作者: 疏忽 時(shí)間: 2025-3-24 03:38
,The Onslaught and Resistance, 1934–1935,d flexibly adaptable security mechanisms has become more critical in today‘s network. The traditionally existing security mechanisms including NAT, firewall, user authentication, and information encryption, etc., are not enough insufficiently covering today‘s network. In this research, proposed the 作者: 坦白 時(shí)間: 2025-3-24 08:16
Neue Algorithmen für praktische Problemeerging technology for its special features. Secured data transmissions in MANET can be established by dynamic Node clustering algorithm. Selecting an efficient Cluster Head (CH) node is a challenging issue in MANET due to finite battery power supply. Cluster generation is a precious task in terms of作者: 使習(xí)慣于 時(shí)間: 2025-3-24 13:40 作者: flex336 時(shí)間: 2025-3-24 17:59
,Handlungsempfehlungen für die Praxis,ig data can handle huge quantity of information with thousands of computers in clusters. Through the condition of compute of different possessions in public cloud, people and institute are clever to outsource their statistics storage and services. Conversely, the information owners are disturbed wit作者: 單調(diào)女 時(shí)間: 2025-3-24 19:19
,K?rper mit nicht einheitlicher Wirkung,p plantations are being destroyed because of the two main reasons: (i) The natural destructions such as drought, flood, famine, and earthquake. (ii) Pest and pathogens. About 98% of the destruction in crops are caused by pathogens and pests. The remaining 2% of the destruction is due to natural disa作者: Accomplish 時(shí)間: 2025-3-25 00:14 作者: 共和國 時(shí)間: 2025-3-25 04:22
https://doi.org/10.1007/978-3-662-25277-2owever, the growing popularity of social networks leads to a surge of concerns on the quality of the shared data. Initially, bots are created with good intentions. Nowadays, bad bots are created and powered by AI to perform malicious activities in social network sites. Statistics say that 94.2% of t作者: deforestation 時(shí)間: 2025-3-25 10:48 作者: 類似思想 時(shí)間: 2025-3-25 15:03
https://doi.org/10.1007/978-3-662-28386-8art Health, Security and Ambient Assisted Living, etc. In today’s ubiquitous computing, HAR can be accomplished by espousing deep learning techniques that replace traditional analytical techniques that depend on the extraction of handcrafted features and classification methods. This work employed th作者: 愚笨 時(shí)間: 2025-3-25 18:13
https://doi.org/10.1007/978-3-663-00199-7 used for a daily well-being. An agile approach was used for its development and deployed on a platform such that all types of users can communicate with it. This virtual assistant makes our life easier and saves time via automated user query replies. Responding to user queries regarding home remedi作者: antedate 時(shí)間: 2025-3-26 00:01
Health Assistant Bot,ith it. This virtual assistant makes our life easier and saves time via automated user query replies. Responding to user queries regarding home remedies as well as the recent pandemic COVID-19, the bot is well-equipped and reliable.作者: gastritis 時(shí)間: 2025-3-26 00:23
Conference proceedings 2022ss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.? ??..?.作者: 哀悼 時(shí)間: 2025-3-26 05:03 作者: cancer 時(shí)間: 2025-3-26 08:35 作者: 設(shè)想 時(shí)間: 2025-3-26 14:11 作者: 減弱不好 時(shí)間: 2025-3-26 16:50 作者: 松果 時(shí)間: 2025-3-26 23:23 作者: Hallmark 時(shí)間: 2025-3-27 04:40
,The Onslaught and Resistance, 1934–1935,of precision, recall, F-score, and false-positive rate. With minimum cost function and training epoch can get better results compared to existing methods. In this research best result obtained through random forest method with a less false positive rate compared to other classifiers.作者: 飛行員 時(shí)間: 2025-3-27 09:04 作者: 遠(yuǎn)地點(diǎn) 時(shí)間: 2025-3-27 11:49
Research on Security Awareness to Protect Data Through Ontology and Cloud Computing,s paper presents a model whereby the data can be securely stored for the longer duration in the distributed environments. Ultimately the proposed security scheme has achieved better performance and outperformed the conventional technique.作者: Congregate 時(shí)間: 2025-3-27 17:19 作者: ALB 時(shí)間: 2025-3-27 19:58
An Improved Stacked Sparse Auto-Encoder Method for Network Intrusion Detection,of precision, recall, F-score, and false-positive rate. With minimum cost function and training epoch can get better results compared to existing methods. In this research best result obtained through random forest method with a less false positive rate compared to other classifiers.作者: 宇宙你 時(shí)間: 2025-3-28 01:44
Water Table Analysis Using Machine Learning,ficient (R), Mean Square Error (MSE), accuracy, precision, recall, f1 score, and support were used to assess the performance of these models. These evaluation measures emphasize the capability of these models to keep up with the shift in groundwater levels.作者: 微生物 時(shí)間: 2025-3-28 04:54 作者: ingrate 時(shí)間: 2025-3-28 06:29 作者: 刺穿 時(shí)間: 2025-3-28 14:07 作者: 成份 時(shí)間: 2025-3-28 15:10
https://doi.org/10.1007/978-3-476-02863-1lders by increasing their profits. This work deals with the prediction of soybean yield as high yield or low yield using ID3 algorithm. The result of ID3 was compared with na?ve Bayes (NB) classifier. Results demonstrated that the ID3 algorithm performed with improvements of 7% when compared to the NB classifier.作者: Fibrillation 時(shí)間: 2025-3-28 22:24
https://doi.org/10.1007/978-3-322-80548-5zation, and particle swarm optimization (PSO) is performed on the data. This proceeds in J48 yielding the best result in classifying patients and non-patients of the dataset. Further, an etiological survey depicting the effect of various attributes on the dataset is presented.作者: entrance 時(shí)間: 2025-3-28 23:46
,Recent Advances and Future Directions of Assistive Technologies for Alzheimer’s Patients,on etc. is also needed. This paper mainly reviews various existing IAT for medication aids, brushing and fall detection. Thus, this provides new research challenges and future directions for other researchers working in this area.作者: fibula 時(shí)間: 2025-3-29 06:07 作者: asthma 時(shí)間: 2025-3-29 08:12 作者: orthopedist 時(shí)間: 2025-3-29 15:24
Decision Tree Based Crop Yield Prediction Using Agro-climatic Parameters,lders by increasing their profits. This work deals with the prediction of soybean yield as high yield or low yield using ID3 algorithm. The result of ID3 was compared with na?ve Bayes (NB) classifier. Results demonstrated that the ID3 algorithm performed with improvements of 7% when compared to the NB classifier.作者: Enliven 時(shí)間: 2025-3-29 16:28 作者: MAPLE 時(shí)間: 2025-3-29 22:46
1876-1100 ories and applications in the field.This?book?presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020.?The conference?provides an interdisciplinary forum for researchers, professional engineers and scientists, e作者: 脫離 時(shí)間: 2025-3-30 01:15 作者: immunity 時(shí)間: 2025-3-30 07:44 作者: 不成比例 時(shí)間: 2025-3-30 08:46 作者: Infirm 時(shí)間: 2025-3-30 12:33
A Nature Inspired Algorithm for Enhancement of Fused MRI and CT Brain Images,esent a different characteristic of the Glioblastoma. Although, a single imaging modality is not enough to confirm the presence the tumor. Experts analyze each of the images independently and then make decisions on the location of the tumor. Early detection and accuracy of diagnosis depends on exper作者: Muscularis 時(shí)間: 2025-3-30 19:14
,Recent Advances and Future Directions of Assistive Technologies for Alzheimer’s Patients, been developed to mitigate the burden of caretakers and patients of Alzheimer’s. A wide variety of IAT has been developed. Caretakers and patients of Alzheimer’s will be much relieved if there are tools that assist them in performing their daily activities like bathing, cooking, hand wash, brushing作者: instate 時(shí)間: 2025-3-30 21:19
Research on Security Awareness to Protect Data Through Ontology and Cloud Computing,eveloped to improve the security using ontology concepts in the cloud storage most of the existing servers used in the networks are used for storing and accessing the data, but these servers are built in a centralized manner, providing security for the data is a key requirement for the servers. The 作者: ADJ 時(shí)間: 2025-3-31 01:43 作者: MINT 時(shí)間: 2025-3-31 06:20 作者: contradict 時(shí)間: 2025-3-31 10:10 作者: affinity 時(shí)間: 2025-3-31 16:50 作者: 壁畫 時(shí)間: 2025-3-31 18:13 作者: 蛙鳴聲 時(shí)間: 2025-4-1 01:36
An Improved Stacked Sparse Auto-Encoder Method for Network Intrusion Detection,d flexibly adaptable security mechanisms has become more critical in today‘s network. The traditionally existing security mechanisms including NAT, firewall, user authentication, and information encryption, etc., are not enough insufficiently covering today‘s network. In this research, proposed the