派博傳思國際中心

標(biāo)題: Titlebook: Evolving Technologies for Computing, Communication and Smart World; Proceedings of ETCCS Pradeep Kumar Singh,Arti Noor,Shaweta Khanna Confe [打印本頁]

作者: Weber-test    時(shí)間: 2025-3-21 17:22
書目名稱Evolving Technologies for Computing, Communication and Smart World影響因子(影響力)




書目名稱Evolving Technologies for Computing, Communication and Smart World影響因子(影響力)學(xué)科排名




書目名稱Evolving Technologies for Computing, Communication and Smart World網(wǎng)絡(luò)公開度




書目名稱Evolving Technologies for Computing, Communication and Smart World網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Evolving Technologies for Computing, Communication and Smart World被引頻次




書目名稱Evolving Technologies for Computing, Communication and Smart World被引頻次學(xué)科排名




書目名稱Evolving Technologies for Computing, Communication and Smart World年度引用




書目名稱Evolving Technologies for Computing, Communication and Smart World年度引用學(xué)科排名




書目名稱Evolving Technologies for Computing, Communication and Smart World讀者反饋




書目名稱Evolving Technologies for Computing, Communication and Smart World讀者反饋學(xué)科排名





作者: Coordinate    時(shí)間: 2025-3-21 23:15

作者: Cursory    時(shí)間: 2025-3-22 03:44

作者: Biofeedback    時(shí)間: 2025-3-22 06:56
https://doi.org/10.1057/978-1-137-59753-3e reusability. It is found that machine learning techniques are competitive in nature with other reusability estimation techniques and can be used for estimation of reusability. This study will help software developers and information industry to elucidate that how software reusability can assist them in selecting advanced quality of software.
作者: Rotator-Cuff    時(shí)間: 2025-3-22 11:36
https://doi.org/10.1007/978-3-642-74179-1considerations to achieve better performance as compared to competitive baselines. On a real-world dataset of only a few hundred patients, we show the effectiveness of these design choices and report an accuracy of 75% in determining whether a patient suffers from hypertension.
作者: 不斷的變動    時(shí)間: 2025-3-22 14:17

作者: 不斷的變動    時(shí)間: 2025-3-22 17:32
Injecting Power Attacks with Voltage Glitching and Generation of Clock Attacks for Testing Fault In and sequential circuits so that countermeasures can be built in future in order to have attack-resistant devices. The paper emphasizes the perspective from the attacker, rather than the perspective of countermeasure development.
作者: Project    時(shí)間: 2025-3-23 00:51

作者: Intersect    時(shí)間: 2025-3-23 05:27
Questionnaire-Based Prediction of Hypertension Using Machine Learning,considerations to achieve better performance as compared to competitive baselines. On a real-world dataset of only a few hundred patients, we show the effectiveness of these design choices and report an accuracy of 75% in determining whether a patient suffers from hypertension.
作者: 思想上升    時(shí)間: 2025-3-23 05:44

作者: 嚴(yán)厲批評    時(shí)間: 2025-3-23 11:14
Hate Speech in the Information Age,n system using IoV. This paper presents the architecture of the IoV with five layers and simple network model of IoV. Recent trends of IoV have been identified in this paper and are discussed to present state-of-the-art advancements and future trends in IoV.
作者: 相信    時(shí)間: 2025-3-23 14:12
,A Review: Efficient Transportation—Future Aspects of IoV,n system using IoV. This paper presents the architecture of the IoV with five layers and simple network model of IoV. Recent trends of IoV have been identified in this paper and are discussed to present state-of-the-art advancements and future trends in IoV.
作者: 大方一點(diǎn)    時(shí)間: 2025-3-23 19:50
The Significance of Fanshan Archaeology,hnology with a supply voltage of 1.4?V and power consumption of 50.08 uW. The novel design has been employed by tuning control voltage in the range of 1.5–1.8?V as this range shows the best linear characteristics. A phase noise of ?154.3?dBc/Hz at 1?MHz offset frequency with the tuning range of 5.25–4.0?GHz has been validated for proposed VCO.
作者: diathermy    時(shí)間: 2025-3-23 22:43

作者: ALERT    時(shí)間: 2025-3-24 02:55
Conference proceedings 2021 through EasyChair, Turnitin, MailChimp and IAC Education. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.
作者: indenture    時(shí)間: 2025-3-24 08:17

作者: 內(nèi)行    時(shí)間: 2025-3-24 14:22
Automatic Leaf Species Recognition Using Deep Neural Network,CI machine library Web site and have succeeded in achieving an accuracy of 95.56% with fine-tuning of hyperparameters. The accuracy is also checked with other parameters like by changing the volume of images and hyperparameters like L2Regularization, minibatch sizes that exhibits high performance de
作者: osteopath    時(shí)間: 2025-3-24 18:03

作者: 馬具    時(shí)間: 2025-3-24 20:54
,Unsupervised Learning-Based Sentiment Analysis with Reviewer’s Emotion,domains with the change in information rather than changing the entire model structure. The clustering algorithms are used for segregating the different types of groups related to viral sharing of ads. Various factors can be analysed to decide whether the ad is shared by a user or not.
作者: Psa617    時(shí)間: 2025-3-25 02:56

作者: transplantation    時(shí)間: 2025-3-25 05:21
,Compact High Gain 28?GHz Concentric Circular Director Low-Cost Antenna for 5G Millimeter-Wave Commu and a dual polarization. The parameters such as surface current of the radiating structure, polar gain plot, normalized gain are also discussed. The better performance of the presented antenna in connection with return loss, peak gain, impedance matching, radiation pattern, directivity, and impedan
作者: Institution    時(shí)間: 2025-3-25 08:18
Nature-Inspired Computing Behaviour of Cellular Automata,Game of Life developed by John Conway explained the biological processes, like birth, death, population, etc., of various living organisms such as fishes in the sea, bacteria in food or animal body, and growth of infected blood cells in the human body. This close correlation between nature and theor
作者: Medicare    時(shí)間: 2025-3-25 14:43
A Survey on Transport Layer Protocols for Reliable and Secure Wireless Sensor Networks,ayer protocols has been done on the basis of certain parameters under reliability and congestion control. The present paper represents a detailed review on the transport layer protocols, their functionalities, attributes and research issues associated with it.
作者: alleviate    時(shí)間: 2025-3-25 18:09
A Lightweight Exchangeable Encryption Scheme for IoT Devices Based on Vigenere Cipher and MLS Keystn and any rounds of permutation and substitution operations. The encryption scheme has been applied for encryption of text, speech, and image. Experimental results based on correlation coefficient measures show that the proposed encryption is secure.
作者: 斗爭    時(shí)間: 2025-3-25 22:17
Improving Steepest Descent Method by Learning Rate Annealing and Momentum in Neural Network,f learning. This research proposed solution for the slow learning convergence velocity by implementing learning rate annealing which implements anneal the learning rate (decline as time progresses) rather than constant learning rate throughout the training. The problem of local minima can be address
作者: Vsd168    時(shí)間: 2025-3-26 00:27
Fingerprint and Face-Based Secure Biometric Authentication System Using Optimized Robust Features,ameters, precision, TDR, f-measure and detection accuracy. Simulation results have established that the systems demonstrated an average recognition accuracy of 91.25% (FPRS) and 92.28% (FRS). Moreover, it has also been established that by increasing a sample size from 10 to 500 images, the recogniti
作者: FLOUR    時(shí)間: 2025-3-26 04:27

作者: 百科全書    時(shí)間: 2025-3-26 10:53
Optimized Route Discovery and Node Registration for FANET,(LI). The performance of the proposed architecture is validated using three parameters, namely throughput, packet delivery ratio (PDR), and Jitter in different UAVs. The results are compared with existing techniques to show the effectiveness of the proposed work in terms of throughput rate and Jitte
作者: 商議    時(shí)間: 2025-3-26 13:23
1876-1100 rch works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.978-981-15-7806-9978-981-15-7804-5Series ISSN 1876-1100 Series E-ISSN 1876-1119
作者: Throttle    時(shí)間: 2025-3-26 18:20

作者: FEIGN    時(shí)間: 2025-3-26 22:45
https://doi.org/10.1007/978-3-319-54337-6CI machine library Web site and have succeeded in achieving an accuracy of 95.56% with fine-tuning of hyperparameters. The accuracy is also checked with other parameters like by changing the volume of images and hyperparameters like L2Regularization, minibatch sizes that exhibits high performance de
作者: 廢墟    時(shí)間: 2025-3-27 02:43

作者: 粘土    時(shí)間: 2025-3-27 07:46

作者: 案發(fā)地點(diǎn)    時(shí)間: 2025-3-27 09:39

作者: GREG    時(shí)間: 2025-3-27 15:39
https://doi.org/10.1007/978-3-658-24487-3 and a dual polarization. The parameters such as surface current of the radiating structure, polar gain plot, normalized gain are also discussed. The better performance of the presented antenna in connection with return loss, peak gain, impedance matching, radiation pattern, directivity, and impedan
作者: 諷刺    時(shí)間: 2025-3-27 18:03

作者: Pander    時(shí)間: 2025-3-28 01:58
Fandom, Authenticity, and Operaayer protocols has been done on the basis of certain parameters under reliability and congestion control. The present paper represents a detailed review on the transport layer protocols, their functionalities, attributes and research issues associated with it.
作者: filial    時(shí)間: 2025-3-28 03:54
https://doi.org/10.1057/9781137393531n and any rounds of permutation and substitution operations. The encryption scheme has been applied for encryption of text, speech, and image. Experimental results based on correlation coefficient measures show that the proposed encryption is secure.
作者: eardrum    時(shí)間: 2025-3-28 09:37

作者: ostrish    時(shí)間: 2025-3-28 13:30
Z. Liu,S. Y. Yang,J. J. Li,C. Z. Guameters, precision, TDR, f-measure and detection accuracy. Simulation results have established that the systems demonstrated an average recognition accuracy of 91.25% (FPRS) and 92.28% (FRS). Moreover, it has also been established that by increasing a sample size from 10 to 500 images, the recogniti
作者: 細(xì)胞膜    時(shí)間: 2025-3-28 18:10
Fans, Followers and Brand Advocates,per, the author discusses the recent trends and some challenges in the software industry to incorporate security and artificial intelligence into the various stages of the DevOps life cycle to deliver efficient, reliable, and secured software.
作者: 褲子    時(shí)間: 2025-3-28 21:40

作者: WAG    時(shí)間: 2025-3-29 02:01
Evolving Technologies for Computing, Communication and Smart WorldProceedings of ETCCS
作者: Talkative    時(shí)間: 2025-3-29 04:11

作者: inflame    時(shí)間: 2025-3-29 08:53

作者: Arthropathy    時(shí)間: 2025-3-29 12:52

作者: 混合,攙雜    時(shí)間: 2025-3-29 15:42

作者: HPA533    時(shí)間: 2025-3-29 21:32
,Software Reusability Estimation Using Machine Learning Techniques—A Systematic Literature Review,order to produce good quality, error free, and less maintainable software. Software reusability is an attribute of quality which helps in selecting beforehand acquired notions in new statuses. Software reusability not only advances productivity, but it also provides a good quality software and has a
作者: FRAUD    時(shí)間: 2025-3-30 00:32
,Unsupervised Learning-Based Sentiment Analysis with Reviewer’s Emotion,hey all are mainly content-centric methodologies. The aspect of the user’s mindset and sentiment for writing the reviews is never considered and the emotions of the writer. In this paper, we are proposing the consideration of these aspects and their impact. They are accommodated on the basis of the
作者: tariff    時(shí)間: 2025-3-30 06:56
Event-Triggered Share Price Prediction,cks for a particular company based on the economy. This stock market price analysis/prediction problem has attracted researchers from various fields like statistics, machine learning (ML), deep learning (DL), etc. The analysis or prediction of the stock prices will help the individuals/customers to
作者: Receive    時(shí)間: 2025-3-30 10:52
,A Review: Efficient Transportation—Future Aspects of IoV,omes, smart transport and smart home appliances, which has been realized due to Internet of Things (IoT). With the invent of smart cars and emerging communication technologies among vehicles, IoV has become the field of research and thereby attracted several vehicle industries and researchers. Inter
作者: 倔強(qiáng)不能    時(shí)間: 2025-3-30 13:12

作者: 使無效    時(shí)間: 2025-3-30 17:58
Questionnaire-Based Prediction of Hypertension Using Machine Learning,lerts or vitals monitoring. However, their application in real world is limited by availability of data. In this paper, we show that simple machine learning algorithms especially neural networks, if designed carefully, are extremely effective even with limited amount of data. Specifically with exhau
作者: CAMEO    時(shí)間: 2025-3-30 23:12

作者: admission    時(shí)間: 2025-3-31 02:42

作者: 乞討    時(shí)間: 2025-3-31 05:49
A Lightweight Exchangeable Encryption Scheme for IoT Devices Based on Vigenere Cipher and MLS Keysty based on random keystream generated from the Meitei lock sequence (MLS). The encryption scheme is lightweight in the sense that it does not require any memory buffer during its execution and also, it does not involve any complex mathematical operations. It is also size preserving, i.e., plaintext
作者: Kidnap    時(shí)間: 2025-3-31 13:07

作者: accordance    時(shí)間: 2025-3-31 15:29
Fingerprint and Face-Based Secure Biometric Authentication System Using Optimized Robust Features,pects. In this pape, the authors have proposed two biometric recognition systems to deal with the security and authentication systems. Fingerprint recognition system (FPRS) is based on minutiae feature extraction of fingerprint image and in face recognition system (FRS). Viola–Jones algorithm (VJA)
作者: 伸展    時(shí)間: 2025-3-31 20:45
DevOps, DevSecOps, AIOPS- Paradigms to IT Operations,are development and IT operations to build and deliver software in a repeatable and automated manner. Because of widespread breach of personal and confidential data, the software industry is increasingly taking steps to build security in to the various stages of DevOps lifecycle. This process of int




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
厦门市| 祁东县| 浦东新区| 井冈山市| 天门市| 铁岭市| 远安县| 安塞县| 梅州市| 宁南县| 林西县| 吉水县| 平邑县| 来安县| 永新县| 大名县| 湾仔区| 若尔盖县| 古蔺县| 葫芦岛市| 三明市| 丹阳市| 云霄县| 凤冈县| 柳河县| 普兰县| 平和县| 河南省| 鞍山市| 平泉县| 安化县| 河北省| 临潭县| 抚远县| 海兴县| 行唐县| 多伦县| 柘荣县| 永新县| 南召县| 商河县|