標(biāo)題: Titlebook: Evolving Technologies for Computing, Communication and Smart World; Proceedings of ETCCS Pradeep Kumar Singh,Arti Noor,Shaweta Khanna Confe [打印本頁] 作者: Weber-test 時(shí)間: 2025-3-21 17:22
書目名稱Evolving Technologies for Computing, Communication and Smart World影響因子(影響力)
書目名稱Evolving Technologies for Computing, Communication and Smart World影響因子(影響力)學(xué)科排名
書目名稱Evolving Technologies for Computing, Communication and Smart World網(wǎng)絡(luò)公開度
書目名稱Evolving Technologies for Computing, Communication and Smart World網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Evolving Technologies for Computing, Communication and Smart World被引頻次
書目名稱Evolving Technologies for Computing, Communication and Smart World被引頻次學(xué)科排名
書目名稱Evolving Technologies for Computing, Communication and Smart World年度引用
書目名稱Evolving Technologies for Computing, Communication and Smart World年度引用學(xué)科排名
書目名稱Evolving Technologies for Computing, Communication and Smart World讀者反饋
書目名稱Evolving Technologies for Computing, Communication and Smart World讀者反饋學(xué)科排名
作者: Coordinate 時(shí)間: 2025-3-21 23:15 作者: Cursory 時(shí)間: 2025-3-22 03:44 作者: Biofeedback 時(shí)間: 2025-3-22 06:56
https://doi.org/10.1057/978-1-137-59753-3e reusability. It is found that machine learning techniques are competitive in nature with other reusability estimation techniques and can be used for estimation of reusability. This study will help software developers and information industry to elucidate that how software reusability can assist them in selecting advanced quality of software.作者: Rotator-Cuff 時(shí)間: 2025-3-22 11:36
https://doi.org/10.1007/978-3-642-74179-1considerations to achieve better performance as compared to competitive baselines. On a real-world dataset of only a few hundred patients, we show the effectiveness of these design choices and report an accuracy of 75% in determining whether a patient suffers from hypertension.作者: 不斷的變動 時(shí)間: 2025-3-22 14:17 作者: 不斷的變動 時(shí)間: 2025-3-22 17:32
Injecting Power Attacks with Voltage Glitching and Generation of Clock Attacks for Testing Fault In and sequential circuits so that countermeasures can be built in future in order to have attack-resistant devices. The paper emphasizes the perspective from the attacker, rather than the perspective of countermeasure development.作者: Project 時(shí)間: 2025-3-23 00:51 作者: Intersect 時(shí)間: 2025-3-23 05:27
Questionnaire-Based Prediction of Hypertension Using Machine Learning,considerations to achieve better performance as compared to competitive baselines. On a real-world dataset of only a few hundred patients, we show the effectiveness of these design choices and report an accuracy of 75% in determining whether a patient suffers from hypertension.作者: 思想上升 時(shí)間: 2025-3-23 05:44 作者: 嚴(yán)厲批評 時(shí)間: 2025-3-23 11:14
Hate Speech in the Information Age,n system using IoV. This paper presents the architecture of the IoV with five layers and simple network model of IoV. Recent trends of IoV have been identified in this paper and are discussed to present state-of-the-art advancements and future trends in IoV.作者: 相信 時(shí)間: 2025-3-23 14:12
,A Review: Efficient Transportation—Future Aspects of IoV,n system using IoV. This paper presents the architecture of the IoV with five layers and simple network model of IoV. Recent trends of IoV have been identified in this paper and are discussed to present state-of-the-art advancements and future trends in IoV.作者: 大方一點(diǎn) 時(shí)間: 2025-3-23 19:50
The Significance of Fanshan Archaeology,hnology with a supply voltage of 1.4?V and power consumption of 50.08 uW. The novel design has been employed by tuning control voltage in the range of 1.5–1.8?V as this range shows the best linear characteristics. A phase noise of ?154.3?dBc/Hz at 1?MHz offset frequency with the tuning range of 5.25–4.0?GHz has been validated for proposed VCO.作者: diathermy 時(shí)間: 2025-3-23 22:43 作者: ALERT 時(shí)間: 2025-3-24 02:55
Conference proceedings 2021 through EasyChair, Turnitin, MailChimp and IAC Education. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.作者: indenture 時(shí)間: 2025-3-24 08:17 作者: 內(nèi)行 時(shí)間: 2025-3-24 14:22
Automatic Leaf Species Recognition Using Deep Neural Network,CI machine library Web site and have succeeded in achieving an accuracy of 95.56% with fine-tuning of hyperparameters. The accuracy is also checked with other parameters like by changing the volume of images and hyperparameters like L2Regularization, minibatch sizes that exhibits high performance de作者: osteopath 時(shí)間: 2025-3-24 18:03 作者: 馬具 時(shí)間: 2025-3-24 20:54
,Unsupervised Learning-Based Sentiment Analysis with Reviewer’s Emotion,domains with the change in information rather than changing the entire model structure. The clustering algorithms are used for segregating the different types of groups related to viral sharing of ads. Various factors can be analysed to decide whether the ad is shared by a user or not.作者: Psa617 時(shí)間: 2025-3-25 02:56 作者: transplantation 時(shí)間: 2025-3-25 05:21
,Compact High Gain 28?GHz Concentric Circular Director Low-Cost Antenna for 5G Millimeter-Wave Commu and a dual polarization. The parameters such as surface current of the radiating structure, polar gain plot, normalized gain are also discussed. The better performance of the presented antenna in connection with return loss, peak gain, impedance matching, radiation pattern, directivity, and impedan作者: Institution 時(shí)間: 2025-3-25 08:18
Nature-Inspired Computing Behaviour of Cellular Automata,Game of Life developed by John Conway explained the biological processes, like birth, death, population, etc., of various living organisms such as fishes in the sea, bacteria in food or animal body, and growth of infected blood cells in the human body. This close correlation between nature and theor作者: Medicare 時(shí)間: 2025-3-25 14:43
A Survey on Transport Layer Protocols for Reliable and Secure Wireless Sensor Networks,ayer protocols has been done on the basis of certain parameters under reliability and congestion control. The present paper represents a detailed review on the transport layer protocols, their functionalities, attributes and research issues associated with it.作者: alleviate 時(shí)間: 2025-3-25 18:09
A Lightweight Exchangeable Encryption Scheme for IoT Devices Based on Vigenere Cipher and MLS Keystn and any rounds of permutation and substitution operations. The encryption scheme has been applied for encryption of text, speech, and image. Experimental results based on correlation coefficient measures show that the proposed encryption is secure.作者: 斗爭 時(shí)間: 2025-3-25 22:17
Improving Steepest Descent Method by Learning Rate Annealing and Momentum in Neural Network,f learning. This research proposed solution for the slow learning convergence velocity by implementing learning rate annealing which implements anneal the learning rate (decline as time progresses) rather than constant learning rate throughout the training. The problem of local minima can be address作者: Vsd168 時(shí)間: 2025-3-26 00:27
Fingerprint and Face-Based Secure Biometric Authentication System Using Optimized Robust Features,ameters, precision, TDR, f-measure and detection accuracy. Simulation results have established that the systems demonstrated an average recognition accuracy of 91.25% (FPRS) and 92.28% (FRS). Moreover, it has also been established that by increasing a sample size from 10 to 500 images, the recogniti作者: FLOUR 時(shí)間: 2025-3-26 04:27 作者: 百科全書 時(shí)間: 2025-3-26 10:53
Optimized Route Discovery and Node Registration for FANET,(LI). The performance of the proposed architecture is validated using three parameters, namely throughput, packet delivery ratio (PDR), and Jitter in different UAVs. The results are compared with existing techniques to show the effectiveness of the proposed work in terms of throughput rate and Jitte作者: 商議 時(shí)間: 2025-3-26 13:23
1876-1100 rch works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.978-981-15-7806-9978-981-15-7804-5Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: Throttle 時(shí)間: 2025-3-26 18:20 作者: FEIGN 時(shí)間: 2025-3-26 22:45
https://doi.org/10.1007/978-3-319-54337-6CI machine library Web site and have succeeded in achieving an accuracy of 95.56% with fine-tuning of hyperparameters. The accuracy is also checked with other parameters like by changing the volume of images and hyperparameters like L2Regularization, minibatch sizes that exhibits high performance de作者: 廢墟 時(shí)間: 2025-3-27 02:43 作者: 粘土 時(shí)間: 2025-3-27 07:46 作者: 案發(fā)地點(diǎn) 時(shí)間: 2025-3-27 09:39 作者: GREG 時(shí)間: 2025-3-27 15:39
https://doi.org/10.1007/978-3-658-24487-3 and a dual polarization. The parameters such as surface current of the radiating structure, polar gain plot, normalized gain are also discussed. The better performance of the presented antenna in connection with return loss, peak gain, impedance matching, radiation pattern, directivity, and impedan作者: 諷刺 時(shí)間: 2025-3-27 18:03 作者: Pander 時(shí)間: 2025-3-28 01:58
Fandom, Authenticity, and Operaayer protocols has been done on the basis of certain parameters under reliability and congestion control. The present paper represents a detailed review on the transport layer protocols, their functionalities, attributes and research issues associated with it.作者: filial 時(shí)間: 2025-3-28 03:54
https://doi.org/10.1057/9781137393531n and any rounds of permutation and substitution operations. The encryption scheme has been applied for encryption of text, speech, and image. Experimental results based on correlation coefficient measures show that the proposed encryption is secure.作者: eardrum 時(shí)間: 2025-3-28 09:37 作者: ostrish 時(shí)間: 2025-3-28 13:30
Z. Liu,S. Y. Yang,J. J. Li,C. Z. Guameters, precision, TDR, f-measure and detection accuracy. Simulation results have established that the systems demonstrated an average recognition accuracy of 91.25% (FPRS) and 92.28% (FRS). Moreover, it has also been established that by increasing a sample size from 10 to 500 images, the recogniti作者: 細(xì)胞膜 時(shí)間: 2025-3-28 18:10
Fans, Followers and Brand Advocates,per, the author discusses the recent trends and some challenges in the software industry to incorporate security and artificial intelligence into the various stages of the DevOps life cycle to deliver efficient, reliable, and secured software.作者: 褲子 時(shí)間: 2025-3-28 21:40 作者: WAG 時(shí)間: 2025-3-29 02:01
Evolving Technologies for Computing, Communication and Smart WorldProceedings of ETCCS作者: Talkative 時(shí)間: 2025-3-29 04:11 作者: inflame 時(shí)間: 2025-3-29 08:53 作者: Arthropathy 時(shí)間: 2025-3-29 12:52 作者: 混合,攙雜 時(shí)間: 2025-3-29 15:42 作者: HPA533 時(shí)間: 2025-3-29 21:32
,Software Reusability Estimation Using Machine Learning Techniques—A Systematic Literature Review,order to produce good quality, error free, and less maintainable software. Software reusability is an attribute of quality which helps in selecting beforehand acquired notions in new statuses. Software reusability not only advances productivity, but it also provides a good quality software and has a作者: FRAUD 時(shí)間: 2025-3-30 00:32
,Unsupervised Learning-Based Sentiment Analysis with Reviewer’s Emotion,hey all are mainly content-centric methodologies. The aspect of the user’s mindset and sentiment for writing the reviews is never considered and the emotions of the writer. In this paper, we are proposing the consideration of these aspects and their impact. They are accommodated on the basis of the 作者: tariff 時(shí)間: 2025-3-30 06:56
Event-Triggered Share Price Prediction,cks for a particular company based on the economy. This stock market price analysis/prediction problem has attracted researchers from various fields like statistics, machine learning (ML), deep learning (DL), etc. The analysis or prediction of the stock prices will help the individuals/customers to 作者: Receive 時(shí)間: 2025-3-30 10:52
,A Review: Efficient Transportation—Future Aspects of IoV,omes, smart transport and smart home appliances, which has been realized due to Internet of Things (IoT). With the invent of smart cars and emerging communication technologies among vehicles, IoV has become the field of research and thereby attracted several vehicle industries and researchers. Inter作者: 倔強(qiáng)不能 時(shí)間: 2025-3-30 13:12 作者: 使無效 時(shí)間: 2025-3-30 17:58
Questionnaire-Based Prediction of Hypertension Using Machine Learning,lerts or vitals monitoring. However, their application in real world is limited by availability of data. In this paper, we show that simple machine learning algorithms especially neural networks, if designed carefully, are extremely effective even with limited amount of data. Specifically with exhau作者: CAMEO 時(shí)間: 2025-3-30 23:12 作者: admission 時(shí)間: 2025-3-31 02:42 作者: 乞討 時(shí)間: 2025-3-31 05:49
A Lightweight Exchangeable Encryption Scheme for IoT Devices Based on Vigenere Cipher and MLS Keysty based on random keystream generated from the Meitei lock sequence (MLS). The encryption scheme is lightweight in the sense that it does not require any memory buffer during its execution and also, it does not involve any complex mathematical operations. It is also size preserving, i.e., plaintext 作者: Kidnap 時(shí)間: 2025-3-31 13:07 作者: accordance 時(shí)間: 2025-3-31 15:29
Fingerprint and Face-Based Secure Biometric Authentication System Using Optimized Robust Features,pects. In this pape, the authors have proposed two biometric recognition systems to deal with the security and authentication systems. Fingerprint recognition system (FPRS) is based on minutiae feature extraction of fingerprint image and in face recognition system (FRS). Viola–Jones algorithm (VJA) 作者: 伸展 時(shí)間: 2025-3-31 20:45
DevOps, DevSecOps, AIOPS- Paradigms to IT Operations,are development and IT operations to build and deliver software in a repeatable and automated manner. Because of widespread breach of personal and confidential data, the software industry is increasingly taking steps to build security in to the various stages of DevOps lifecycle. This process of int