標題: Titlebook: Emerging Technologies in Computing; 4th EAI/IAER Interna Mahdi H. Miraz,Garfield Southall,Safeeullah Soomro Conference proceedings 2021 ICS [打印本頁] 作者: 相反 時間: 2025-3-21 20:09
書目名稱Emerging Technologies in Computing影響因子(影響力)
書目名稱Emerging Technologies in Computing影響因子(影響力)學科排名
書目名稱Emerging Technologies in Computing網(wǎng)絡公開度
書目名稱Emerging Technologies in Computing網(wǎng)絡公開度學科排名
書目名稱Emerging Technologies in Computing被引頻次
書目名稱Emerging Technologies in Computing被引頻次學科排名
書目名稱Emerging Technologies in Computing年度引用
書目名稱Emerging Technologies in Computing年度引用學科排名
書目名稱Emerging Technologies in Computing讀者反饋
書目名稱Emerging Technologies in Computing讀者反饋學科排名
作者: 燦爛 時間: 2025-3-21 21:05 作者: FLOAT 時間: 2025-3-22 04:10
Noise in Nanoscale Semiconductor Devices and the service providers. Personally identifiable information (PII) is mounting at an exponential rate and so does the associated manifold security risks. In fact, there are many state-of-the-art security and privacy-preserving mechanisms in practice, however, the least developed countries (LDC) a作者: Talkative 時間: 2025-3-22 08:31 作者: habile 時間: 2025-3-22 11:33 作者: 走調(diào) 時間: 2025-3-22 13:11 作者: 走調(diào) 時間: 2025-3-22 19:17
The Anti-Nomadic Bias of Political Theory,esource co-allocation techniques. The data integration is a process of collecting the data from various resources. The users are requesting the meteorological data to propose the smart city service. The proposed smart city service integrates the meteorological data from the meteorological towers. Th作者: Lineage 時間: 2025-3-22 22:37
Other Aspects of Nomic Inference,in every medical institute but it is least known to public. This paper gives an idea about security and satisfaction for patients ensuring the sterility of instruments used on them through cloud data management technology. Transparency in the sterilization is a necessity. Sterile Processing Departme作者: 低能兒 時間: 2025-3-23 02:55 作者: 補角 時間: 2025-3-23 05:37
Stefano Nava,Francesco Fanfullaty of the real-world event logs make it difficult to apply standard process mining techniques, thus process discovery results in spaghetti-like models which are difficult to analyse. Several event abstraction techniques are developed to group-up low-level activities into higher level activities, but作者: Jubilation 時間: 2025-3-23 11:49
Michela Balconi,Davide Crivellis are in general very harmful. However, in some specific situations, stress can be highly serious to the human health as it impacts the cardiovascular system in addition to other body sub systems. Timely Detection of stress through physiological sensors may help in arresting the disease. As the stre作者: Dedication 時間: 2025-3-23 14:41 作者: 保守 時間: 2025-3-23 20:56 作者: profligate 時間: 2025-3-24 02:00 作者: Directed 時間: 2025-3-24 05:55
Emerging Technologies in Computing978-3-030-90016-8Series ISSN 1867-8211 Series E-ISSN 1867-822X 作者: Monolithic 時間: 2025-3-24 07:30 作者: 裝勇敢地做 時間: 2025-3-24 11:48 作者: 不近人情 時間: 2025-3-24 18:03 作者: TRUST 時間: 2025-3-24 22:46
Liver Transplantation and NAFLD/NASH,ch investigates the application of ML algorithms on the growing data from the healthcare industry on the global diabetes epidemic. The performance of ML algorithms to predict diabetes is lacking. This paper provides an analysis of the challenges of machine learning in this field and covers this gap in the research.作者: 秘方藥 時間: 2025-3-25 02:17
Predicting Diabetes Using Diabetes Datasets and Machine Learning Algorithms: Comparison and Analysisch investigates the application of ML algorithms on the growing data from the healthcare industry on the global diabetes epidemic. The performance of ML algorithms to predict diabetes is lacking. This paper provides an analysis of the challenges of machine learning in this field and covers this gap in the research.作者: GRIEF 時間: 2025-3-25 03:39 作者: 虛構的東西 時間: 2025-3-25 09:06 作者: AFFIX 時間: 2025-3-25 13:02 作者: 鉗子 時間: 2025-3-25 15:51
1867-8211 2021, held in August 2021. Due to VOVID-19 pandemic the conference was helt virtually.. The 15 revised full papers were reviewed and selected from 44 submissions and are organized in topical sections covering Information and Network Security; Cloud, IoT and Distributed Computing; AI, Expert Systems 作者: REIGN 時間: 2025-3-25 20:33 作者: jabber 時間: 2025-3-26 00:35
Other Aspects of Nomic Inference,n the cloud with a well-established data structure. People can get access to view the information from the cloud stored data related to them through a website/mobile app. With this system the patients are assured that they get operated with germs free equipment and the data are stored in an efficiently accessible manner.作者: 巧辦法 時間: 2025-3-26 08:21 作者: Isometric 時間: 2025-3-26 12:27
Hardware Assisted Protocol for Attacks Prevention in Ad Hoc Networksencies in terms of signature signing and verification. In addition, this protocol offered non-repudiation, communication session unlinkability, mutual authentication, integrity, location privacy and anonymity. Moreover, it was resilient against message replays and impersonation attacks.作者: 全部 時間: 2025-3-26 15:22
Data Handling and Transparency Enhancement in Central Sterile Service Departmentn the cloud with a well-established data structure. People can get access to view the information from the cloud stored data related to them through a website/mobile app. With this system the patients are assured that they get operated with germs free equipment and the data are stored in an efficiently accessible manner.作者: VEN 時間: 2025-3-26 17:16 作者: LAST 時間: 2025-3-27 00:23 作者: Infinitesimal 時間: 2025-3-27 01:19 作者: Obvious 時間: 2025-3-27 09:10
Conference proceedings 2021 in August 2021. Due to VOVID-19 pandemic the conference was helt virtually.. The 15 revised full papers were reviewed and selected from 44 submissions and are organized in topical sections covering Information and Network Security; Cloud, IoT and Distributed Computing; AI, Expert Systems and Big Da作者: Sad570 時間: 2025-3-27 12:02
Prediction of Android Malicious Software Using Boosting Algorithms this paper is to classify malicious and benign Android applications by using Boosting algorithm. To attain the research objective, four widely defined boosting models viz. AdaBoost, CatBoost, XGBoost, and GradientBoost were developed whereas, it was found that CatBoost and GradientBoost had the hig作者: 指耕作 時間: 2025-3-27 14:19 作者: Daily-Value 時間: 2025-3-27 18:42 作者: 陳腐的人 時間: 2025-3-27 23:33
Integrating the Meteorological Data into a Smart City Service Using Cloud of Things (CoT)precipitation, wind speed and atmospheric pressure. These data are heterogeneous in nature which makes data integration through MapReduce technique and virtual machinery. This research work produces accurate and faultless forecast data for the user through CoT techniques. The proposed work experimen作者: 酷熱 時間: 2025-3-28 05:41
An Event-Level Clustering Framework for?Process Mining Using Common Sequential Ruless based upon the similarity of the sequences between events. Our technique provides clustering without abstraction of very large complex event logs. Proposed algorithm Common Events Identifier (CEI) is applied on a real-world telecommunication log and the results are compared with two well-known tra作者: Pantry 時間: 2025-3-28 06:58 作者: Pelago 時間: 2025-3-28 13:38 作者: Hyaluronic-Acid 時間: 2025-3-28 15:46
Noise and Vibration Control on Ships this paper is to classify malicious and benign Android applications by using Boosting algorithm. To attain the research objective, four widely defined boosting models viz. AdaBoost, CatBoost, XGBoost, and GradientBoost were developed whereas, it was found that CatBoost and GradientBoost had the hig作者: DEVIL 時間: 2025-3-28 20:09
Noise in Nanoscale Semiconductor Devices selected Bangladesh as a representative of the least developed countries and United States of America (USA) for the developed countries. After a detailed empirical analysis of 20 government and private websites of each of these two countries, this study found that the majority of the public website作者: 溫和女孩 時間: 2025-3-29 00:48
Cardiovascular Disease and Inflammation,ry, active types of low pass filters can resolve these limitations to some extent. Therefore, this research presents an active LPF design for 90?nm complementary metal oxide semiconductor (CMOS) technology in Cadence environment. The simulation results reveal that the proposed active low pass filter作者: transient-pain 時間: 2025-3-29 04:35
The Anti-Nomadic Bias of Political Theory,precipitation, wind speed and atmospheric pressure. These data are heterogeneous in nature which makes data integration through MapReduce technique and virtual machinery. This research work produces accurate and faultless forecast data for the user through CoT techniques. The proposed work experimen作者: Sleep-Paralysis 時間: 2025-3-29 10:17
Stefano Nava,Francesco Fanfullas based upon the similarity of the sequences between events. Our technique provides clustering without abstraction of very large complex event logs. Proposed algorithm Common Events Identifier (CEI) is applied on a real-world telecommunication log and the results are compared with two well-known tra作者: 保守黨 時間: 2025-3-29 13:13 作者: mosque 時間: 2025-3-29 17:28
PRIMOS 3D Digital Frame Projection of nonlinear differential equations, which are calculated in a relatively simple way. The transitional process is obtained as a result of the differentiation of state equations for given initial conditions. We obtain a steady-state process by the initial conditions that exclude transient response. 作者: irradicable 時間: 2025-3-29 19:57
Mahdi H. Miraz,Garfield Southall,Safeeullah Soomro作者: harbinger 時間: 2025-3-30 01:17
Hardware Assisted Protocol for Attacks Prevention in Ad Hoc Networksy schemes have been developed based on public key infrastructure, tamper proof devices, bilinear pairings or trusted authorities. However, these techniques still have a number of security and privacy challenges or are inefficient in terms of communication, computation or storage overheads. In this p作者: Diluge 時間: 2025-3-30 07:53
Prediction of Android Malicious Software Using Boosting Algorithmsystems or to access a network without authorization. With an inexorable shift in technology, Android has supplanted other Mobile platforms by being flexible and user-friendly to the users. As the number of Android apps continues to grow every day, the number of malwares aimed at attacking those user作者: 慢慢啃 時間: 2025-3-30 11:46 作者: 山崩 時間: 2025-3-30 16:11 作者: 揭穿真相 時間: 2025-3-30 16:39 作者: aqueduct 時間: 2025-3-30 20:41
LoRa IoT WSN for E-Agriculturemple. Utilisation of artificial intelligence, machine learning to aid agriculture are presented. For a primarily agricultural-based economy with rugged terrain, power availability is the biggest problem along with security. The research presents various technologies that may be applied to aid the fa作者: 暴發(fā)戶 時間: 2025-3-31 04:50 作者: 斷斷續(xù)續(xù) 時間: 2025-3-31 08:24 作者: 職業(yè)拳擊手 時間: 2025-3-31 13:07