標題: Titlebook: Emerging Research in Electronics, Computer Science and Technology; Proceedings of Inter V. Sridhar,M.C. Padma,K.A. Radhakrishna Rao Confere [打印本頁] 作者: TEMPO 時間: 2025-3-21 16:24
書目名稱Emerging Research in Electronics, Computer Science and Technology影響因子(影響力)
書目名稱Emerging Research in Electronics, Computer Science and Technology影響因子(影響力)學科排名
書目名稱Emerging Research in Electronics, Computer Science and Technology網(wǎng)絡(luò)公開度
書目名稱Emerging Research in Electronics, Computer Science and Technology網(wǎng)絡(luò)公開度學科排名
書目名稱Emerging Research in Electronics, Computer Science and Technology被引頻次
書目名稱Emerging Research in Electronics, Computer Science and Technology被引頻次學科排名
書目名稱Emerging Research in Electronics, Computer Science and Technology年度引用
書目名稱Emerging Research in Electronics, Computer Science and Technology年度引用學科排名
書目名稱Emerging Research in Electronics, Computer Science and Technology讀者反饋
書目名稱Emerging Research in Electronics, Computer Science and Technology讀者反饋學科排名
作者: 小歌劇 時間: 2025-3-21 21:21 作者: Patrimony 時間: 2025-3-22 03:27 作者: 我們的面粉 時間: 2025-3-22 07:35 作者: Leisureliness 時間: 2025-3-22 12:40 作者: BALK 時間: 2025-3-22 14:13 作者: BALK 時間: 2025-3-22 18:42 作者: 呼吸 時間: 2025-3-22 21:34
Neuere Festigkeitsprobleme des Ingenieursrecalculation of the backup route during the path failure. In this paper, the path with the largest number of reliable links is considered as the best path. The link reliability is decided based on several parameters like packet delivery ratio, flow capacity, bandwidth, queue capacity of the link, d作者: 服從 時間: 2025-3-23 05:26
Neuere Gerbemethoden und Gerbetheorientraffic could indicate a possible intrusion on the network, increasing the need for a fast and reliable network intrusion detection system (NIDS). A novel method of using an artificial neural network (ANN) optimised with Cuckoo Search Optimizer (CSO) is developed in this research paper to act as net作者: 濃縮 時間: 2025-3-23 06:30
https://doi.org/10.1007/978-3-662-32776-0 commercial, military, and environment etc. The biggest privilege of using WSN is due to its low cost, maintenance, and other desirable features. One major application involved in WSN is animal health monitoring. By incorporating this, health status of the cattle can be observed and maintained based作者: chronology 時間: 2025-3-23 11:43
https://doi.org/10.1007/978-3-662-25268-0t. Creation of machines with the ability to understand natural language is the prime aim of natural language processing. A machine comprehension task is an extension of question answering technique which provides the machines an ability to answer questions. This task revolutionizes the way in which 作者: ARK 時間: 2025-3-23 17:43 作者: Hemiparesis 時間: 2025-3-23 21:45 作者: 心胸開闊 時間: 2025-3-24 00:11
Neuere Methoden zur Analyse von Tensidenonverting each class into multiple smaller subclasses. Further, each document is represented in a lower-dimensional space of size equal to the number of subclasses using term-class relevance (TCR) measure-based transformation technique. Then, each subclass is represented in the form of an interval-v作者: Ascendancy 時間: 2025-3-24 04:44
https://doi.org/10.1007/978-3-662-25267-3ore general framework with any kind of values and any number of projections. The line Mojette was derived to focus on the limited number of materials scene reconstructions. Meanwhile, the scene only contained limited number of materials. So projection line might contain a unique material value, and 作者: nuclear-tests 時間: 2025-3-24 09:01 作者: convulsion 時間: 2025-3-24 13:21
https://doi.org/10.1007/978-3-642-49834-3nal dataset may lower the performance of the decision tree in terms of classification rate and stability. Vertical partitioning is a novel paradigm to avoid these issues; it divides the features of a dataset into subsets and creates a subset-based classifier ensemble. In our previous work, we propos作者: 把…比做 時間: 2025-3-24 17:09
Wettbewerbssituation und Unternehmenserfolg,ity which is concerned with trust attributes decreases with many factors in upgraded trust at vendor’s end, and this leads to a lot of obstacles at vendor’s end for many of the deployments. A model which is really updated enough for executing the operations in trusted environment is required to redu作者: Kinetic 時間: 2025-3-24 22:48
https://doi.org/10.1007/978-3-642-99050-2n in military forces and border surveillance. BS which collects information from sensors has become the main target of attack for intruders. Anonymous intruder eavesdrops into network, analyzes the radio patterns to get contextual information, and can find where the BS location is. Attacker can dest作者: folliculitis 時間: 2025-3-25 00:48 作者: HUMP 時間: 2025-3-25 04:06 作者: compel 時間: 2025-3-25 09:54 作者: 蠟燭 時間: 2025-3-25 14:18 作者: Bricklayer 時間: 2025-3-25 16:03 作者: CLOT 時間: 2025-3-25 22:10
Elisabeth von Braunschweig-Wolfenbüttel (SIoT) is a step in this direction. The concept of SIoT presents social relationship aspect to network of IoT devices. It also represents real-world activities in the form of concrete model. Hence, SIoT may be termed as IoT network with social relationship affiliation. The nature of relationship am作者: Mediocre 時間: 2025-3-26 01:57 作者: FAWN 時間: 2025-3-26 07:28 作者: 食草 時間: 2025-3-26 12:20
,Medienwissenschaftliche Ans?tze,d2vec and GloVe, and pre-trained embeddings. These representations were further used in combination with various deep learning architectures such as convolutional neural network (CNN), bidirectional long short-term memory (Bi-LSTM). The results for various combinations are listed.作者: 殘廢的火焰 時間: 2025-3-26 14:13 作者: Factorable 時間: 2025-3-26 17:56
Elisabeth von Braunschweig-Wolfenbüttelns among members of the SIoT is found. In this paper, different trust management models for SIoT are reviewed. Trust model based on multiplicative attribute graph (MAG) model is considered as the basic concept of this survey. The different trust models are also compared using different metrics.作者: connoisseur 時間: 2025-3-26 21:39 作者: CANDY 時間: 2025-3-27 02:52 作者: poliosis 時間: 2025-3-27 06:32
Deep-Learning-Based Stance Detection for Indian Social Media Text,d2vec and GloVe, and pre-trained embeddings. These representations were further used in combination with various deep learning architectures such as convolutional neural network (CNN), bidirectional long short-term memory (Bi-LSTM). The results for various combinations are listed.作者: thalamus 時間: 2025-3-27 13:07 作者: chiropractor 時間: 2025-3-27 16:04 作者: 不規(guī)則的跳動 時間: 2025-3-27 20:02 作者: Chronological 時間: 2025-3-28 00:51 作者: 起波瀾 時間: 2025-3-28 02:07 作者: Outmoded 時間: 2025-3-28 10:03
Ernst-Walter Reiche,Felix Müllersources of noise. This paper compares LMS adaptive filter for FECG extraction with neural network-based adaptive filter. Twenty cases of clinical data were used. Experimental results showed superiority of later scheme in terms of SNR and MSE.作者: 無法取消 時間: 2025-3-28 10:38
Automatic English to Kannada Back-Transliteration Using Combination-Based Approach,words are segmented into phonemes by predefined rules. These phonemes are transliterated to Kannada script statistically based on probabilities. The paradigm is assessed with 3000 Romanized Kannada test words and obtained an accuracy of 85.4%.作者: Canopy 時間: 2025-3-28 18:11 作者: dura-mater 時間: 2025-3-28 22:23
Neuere Gerbemethoden und Gerbetheorienances and the other of 10,000 instances, along with the complete dataset of 61,593 instances and I have compared the result with the BCS-GA algorithm and the fuzzy K-means clustering algorithm optimised with PSO in terms of precision, recall and f1-score, and the training time for the model with the selected database instances.作者: Arresting 時間: 2025-3-28 23:11
https://doi.org/10.1007/978-3-662-32776-0tor the health status of cattle to erupt the ill health is presented in this paper. The disadvantages incurred in the existing system are overcome by the proposed system containing android application where all the cattle’s health-related data will be stored in a database.作者: custody 時間: 2025-3-29 04:04
Neuere Methoden zur Analyse von Tensidenof unlabeled text documents. Experiments are conducted on Reuters-21578 and TDT2 text datasets. The results reveal that the performance of the proposed method is better than the other existing methods.作者: Aspirin 時間: 2025-3-29 08:11 作者: 抵消 時間: 2025-3-29 13:30 作者: 注射器 時間: 2025-3-29 15:43 作者: 他日關(guān)稅重重 時間: 2025-3-29 20:40
A Reliable Routing Protocol with Backup Scheme in Wired Computer Networks, reliable path, thereby avoiding path failure to the maximum extent possible. If there is a failure in the path during packet transmission, the backup path is dynamically calculated by considering different scenarios. The effectiveness of the proposed protocol is proved by simulation results.作者: forecast 時間: 2025-3-30 00:15 作者: 掃興 時間: 2025-3-30 05:59 作者: Amplify 時間: 2025-3-30 09:50 作者: 美食家 時間: 2025-3-30 12:57
Limited Number of Materials Scene Reconstruct from Mojette Projections,te that it can always solve more than one pixel at a time. In this paper, we discussed the line Mojette algorithm performances for the 2, 3, and 4 materials images. After comparison of analysis, results show the line Mojette performance ought to be paramount in the 3 materials case.作者: conduct 時間: 2025-3-30 19:05 作者: 使混合 時間: 2025-3-30 23:35 作者: Certainty 時間: 2025-3-31 02:52
,A Comparison of Warnsdorff’s Rule and Backtracking for Knight’s Tour on Square Boards,med to showcase the differences in time complexity of each algorithm. We also point out that the starting position and dimensions of a board play a key role in determining whether a tour is possible. By doing this, we prove that a tour does not exist when the knight starts from odd squares on boards of odd dimensions.作者: 熱情贊揚 時間: 2025-3-31 08:23
Performance Evaluation of Fetal ECG Extraction Algorithms,sources of noise. This paper compares LMS adaptive filter for FECG extraction with neural network-based adaptive filter. Twenty cases of clinical data were used. Experimental results showed superiority of later scheme in terms of SNR and MSE.作者: Derogate 時間: 2025-3-31 10:50
1876-1100 and Technology (ICERECT) organized by PES College of Engineering in Mandya. Featuring cutting-edge, peer-reviewed articles from the field of electronics, computer science and technology, it is a valuable resource for members of the scientific research community...?..?.978-981-13-5802-9Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: Fulsome 時間: 2025-3-31 15:30
https://doi.org/10.1007/978-3-662-32775-3words are segmented into phonemes by predefined rules. These phonemes are transliterated to Kannada script statistically based on probabilities. The paradigm is assessed with 3000 Romanized Kannada test words and obtained an accuracy of 85.4%.作者: 慷慨援助 時間: 2025-3-31 17:32
An Approach for Estimation of Distance Information Between Two Persons from Single 2D Image, camera. Depth estimation from single 2D image is very difficult problem. Local and global features of the image are important for depth estimation. In this paper, human height feature is used as reference for distance estimation. First, the image is captured from the 2D camera and converted into gr作者: Bumptious 時間: 2025-3-31 23:04 作者: 新字 時間: 2025-4-1 05:12 作者: ABASH 時間: 2025-4-1 08:05
WSN-Based Electronic Livestock of Dairy Cattle and Physical Parameters Monitoring, commercial, military, and environment etc. The biggest privilege of using WSN is due to its low cost, maintenance, and other desirable features. One major application involved in WSN is animal health monitoring. By incorporating this, health status of the cattle can be observed and maintained based作者: 利用 時間: 2025-4-1 13:16
A Sequence-Based Machine Comprehension Modeling Using LSTM and GRU,t. Creation of machines with the ability to understand natural language is the prime aim of natural language processing. A machine comprehension task is an extension of question answering technique which provides the machines an ability to answer questions. This task revolutionizes the way in which 作者: 青石板 時間: 2025-4-1 18:08
Deep-Learning-Based Stance Detection for Indian Social Media Text,y is considered. The author’s stance could be in “favor” or “against” the topic under consideration. A myriad amount of data is being accumulated via various social media platforms. This work considers the Kannada–English code-mixed aspect of social media text. The corpus was collected based on vari