作者: 擁擠前 時間: 2025-3-21 23:16
Mukta Sharma,Rahul Verma,Ambuj Mishra,Mahua Bhattacharya to work in data analysis and modeling. This volume uses numerous solved examples, published case studies from the author’s own research, and well-conceived problems in order to enhance comprehension levels among readers and their understanding of the “processes”along with the tools.作者: 條街道往前推 時間: 2025-3-22 04:05
Blockchain for Secure Internet of Things,asics of blockchain and its application toward auditability, security, and characteristics of decentralization is discussed. Further, current challenges of centralized IoT models and their solution using blockchains for achieving decentalized and secure medium for the IoT are introduced.作者: Keratin 時間: 2025-3-22 07:53
Video Synopsis: A Systematic Review,he area of video synopsis by discussing the state-of-the-art techniques. Then the end of the article also focuses on a new trend in synopsis generation methods applied to the challenging area of multi-camera networks. This literature identifies various optimization techniques, dataset, and evaluation matrix used for each approach.作者: 污穢 時間: 2025-3-22 12:16 作者: Bouquet 時間: 2025-3-22 16:48 作者: scrape 時間: 2025-3-22 19:31 作者: 藐視 時間: 2025-3-23 01:00 作者: 不能強(qiáng)迫我 時間: 2025-3-23 04:05
Black-Hole and Wormhole Attack Using DYMO and AODV Protocol: A Review,l always be in action to destroy the communication or link between the sender and receiver. In the following paper, we present the survey on various types of attack in the field of wireless ad-hoc network including internal and external attack.作者: 細(xì)節(jié) 時間: 2025-3-23 09:23
Book 2020ata analytics within the scope of the discussed topics. This book will help students, researchers, and technology professionals discover latest trends in the fields of computer vision and artificial intelligence.?作者: 使迷惑 時間: 2025-3-23 11:27
Book 2020 provide in-depth discussions on a range of emerging multidisciplinary topics like?computer vision, image processing, artificial intelligence, machine learning, cloud computing, IoT, and big data. The book also includes illustrations of algorithms, architecture, applications, software systems, and d作者: 退潮 時間: 2025-3-23 17:57 作者: 搏斗 時間: 2025-3-23 22:05 作者: Negotiate 時間: 2025-3-23 22:47 作者: Germinate 時間: 2025-3-24 03:12
Semantic Image Completion and Enhancement Using GANs,Adversarial Networks (GAN) have turned out to be helpful in picture completion tasks. In this chapter, we will discuss the underlying GAN architecture and how they can be used for image completion tasks.作者: Trochlea 時間: 2025-3-24 10:02
Statistical Time Series Models for Wind Speed Forecasting, have been utilized to develop the models. In our investigation, it has been found that the VAR model performs the best in most of the cases since it includes more than one variable for the development of the model.作者: Lymphocyte 時間: 2025-3-24 13:37
1860-949X from early vision (low-level) to recognition and interpretatThis book focuses on the challenges and the recent findings in vision intelligence incorporating high performance computing applications. The contents provide in-depth discussions on a range of emerging multidisciplinary topics like?compute作者: 我悲傷 時間: 2025-3-24 15:08
N. Chaurasia,P. Dimri,K. K. Guptat) scheme of SM4 is proposed by exploiting the structure property. Moreover, this scheme is further improved by introducing the page-locked memory and CUDA streams. The results show that: SM4 optimized parallel implementation under GPU can obtain with a speed-up ratio of 89, and the throughput can reach up?to 31.41?Gbps.作者: 固定某物 時間: 2025-3-24 20:07
L. Davila Nicanor,H. R. Orozco Aguirre,V. M. Landassuri Moreno dynamic .-times anonymous authentication protocol, the scheme can achieve thieves identification and privacy preservation at the same time without the involvement of a trusted authority in the system. Finally, we point out the path of our future work.作者: Predigest 時間: 2025-3-24 23:28
Madhuri GuptaBayesian, are covered, and some of the important probability distributions are presented. Finally, an effort is made to explain how probability is different from statistics, and to present different views of probability concepts such as absolute, relative and subjective probabilities.作者: PAC 時間: 2025-3-25 05:11
past decades, cryptanalysts have proved that many once prevailing cryptographic algorithms (e.g., MD4, MD5, 3DES, RC4) are no longer secure now. However, insecure cryptographic algorithms are still widely deployed in practice, seriously endangering the security of cyberspace. The reasons for this d作者: 冷漠 時間: 2025-3-25 11:27 作者: 圓桶 時間: 2025-3-25 13:00 作者: Freeze 時間: 2025-3-25 15:57 作者: 國家明智 時間: 2025-3-25 20:49 作者: Fallibility 時間: 2025-3-26 03:55 作者: 分開如此和諧 時間: 2025-3-26 06:44 作者: Receive 時間: 2025-3-26 10:50
Ansuman Mahapatra,Pankaj K. Saation of block ciphers has been attracting active research. It is an obstacle to efficient masked implementation that the complexity of an evaluation of multiplication is quadratic in the order of masking. A direct approach to this problem is to explore methods to reduce the number of multiplication作者: 拱形大橋 時間: 2025-3-26 14:54 作者: IDEAS 時間: 2025-3-26 20:12
Priyansh Saxena,Raahat Gupta,Akshat Maheshwari,Saumil Maheshwariissues. Firstly, how the social contexts of gameplay impact on players’ experiences, and secondly, on a more practical level, how game developers may utilise evidence of this effect to enhance the positive experiences derived from the activity. This will form the basis for this chapter, which will i作者: GRIN 時間: 2025-3-26 23:27
Madhuri Guptauity in outcome is inherent in the nature of the process itself. Both the primary views of probability, namely the frequentist (or classical) and the Bayesian, are covered, and some of the important probability distributions are presented. Finally, an effort is made to explain how probability is dif作者: 小畫像 時間: 2025-3-27 02:45
Mukta Sharma,Rahul Verma,Ambuj Mishra,Mahua Bhattacharya both students and practitioners. It demonstrates how to apply concepts and methods learned in disparate courses such as mathematical modeling, probability,statistics, experimental design, regression, model building, optimization, risk analysis and decision-making to actual engineering processes and作者: cuticle 時間: 2025-3-27 05:54
Gajendra Kumar Ahirwaredge of probability and probability distributions. More specifically, such statistical inferences involve point estimation, confidence interval estimation, hypothesis testing of means and variances from two or more samples, analysis of variance methods, goodness of fit tests, and correlation analysi作者: fodlder 時間: 2025-3-27 10:17
Priyansh Saxena,Raahat Gupta,Akshat Maheshwariedge of probability and probability distributions. More specifically, such statistical inferences involve point estimation, confidence interval estimation, hypothesis testing of means and variances from two or more samples, analysis of variance methods, goodness of fit tests, and correlation analysi作者: 起皺紋 時間: 2025-3-27 13:44 作者: Aviary 時間: 2025-3-27 20:47 作者: RAFF 時間: 2025-3-28 00:56
Blockchain for Secure Internet of Things,tributed ledger which has the capability of maintaining a log of all the transactions occurring in the network. Recently, IoT is captivating a significant research interest. However, it can be observed that in areas such as building a distributed, secure and without third party environment for IoT, 作者: 浮雕 時間: 2025-3-28 02:54
Black-Hole and Wormhole Attack Using DYMO and AODV Protocol: A Review,etwork in which all the connected components shares their data and make communication with each other without any dedicated links/path or without wired communication. There are various protocols available for the secured communication and safely transfer the files and data. However, the attacker wil作者: 朝圣者 時間: 2025-3-28 10:15 作者: 昏迷狀態(tài) 時間: 2025-3-28 13:39 作者: 忙碌 時間: 2025-3-28 18:08
Video Synopsis: A Systematic Review, called video synopsis or otherwise called as rapid recap system. As the name suggests, it can highly condense a lengthy input surveillance video by extracting and shifting the moving objects in temporal axis and then displays them simultaneously in an non-overlapping fashion. This article investiga作者: 巨碩 時間: 2025-3-28 19:05 作者: capsule 時間: 2025-3-29 01:24
A Study of Scrambled Noisy Quantum Image Formation with Geometric Transformation and Its Denoising processing in various ways of handling (capture, manipulate, extract) images of different formats and for different purposes. In this paper, an image denoising scheme based on quantum wavelet transform (QWT) is proposed. Initially, a quantum noisy image is formed with the help of geometric transform作者: kidney 時間: 2025-3-29 05:50 作者: OVER 時間: 2025-3-29 09:26 作者: 獸群 時間: 2025-3-29 12:44 作者: 試驗(yàn) 時間: 2025-3-29 16:22
Chatterbot: Technologies, Tools and Applications,the voice-based chatbots (as like assistant) are SIRI, CORTANA, BIXBY, ALEXA, NATASHA, IBM WATSON and many more. There was no game changing in the chatbot technologies, it is obvious that they evolved from the very simple pattern matching systems towards complicated patterns combined with a set of c作者: Project 時間: 2025-3-29 22:08
Route Planning Using Nature-Inspired Algorithms,s (NIAs). Generally, they are inspired by some natural phenomenon, and due to their inherent converging and stochastic nature, they are known to give optimal results when compared to classical approaches. There are a large number of applications of NIAs, perhaps the most popular being route planning作者: 斥責(zé) 時間: 2025-3-30 03:39 作者: aquatic 時間: 2025-3-30 05:51
Smart HealthCare Model: An End-to-end Framework for Disease Prediction and Recommendation of Drugs gnosis of the health-related issue. Patients also have very little knowledge about the drugs that have been prescribed to them. This kind of knowledge is crucial for the patients to judge their diagnosis done by the doctor. To make people familiar with this, we have proposed a model. This model cons作者: Carcinogenesis 時間: 2025-3-30 09:52 作者: amorphous 時間: 2025-3-30 16:11 作者: 逃避現(xiàn)實(shí) 時間: 2025-3-30 18:25 作者: synovial-joint 時間: 2025-3-30 22:31 作者: 任意 時間: 2025-3-31 03:00
Megha Rathi,Nimit Jain,Priya Bist,Tarushi AgrawalOne the greatest revolutions in data communications is the usage of light waves to transmit digital pulses through fibre optic cables. A light carrying system has an almost unlimited information capacity. Theoretically, it has more than 200 000 times the capacity of a satellite TV system.作者: Dappled 時間: 2025-3-31 06:17 作者: 大范圍流行 時間: 2025-3-31 09:57 作者: 伸展 時間: 2025-3-31 15:56
https://doi.org/10.1007/978-981-15-6844-2High performance computing; Cloud computing; Image processing; Computer vision; Big data analytics; IoT; P