派博傳思國際中心

標(biāo)題: Titlebook: ICT with Intelligent Applications; ICTIS 2023, Volume 1 Jyoti Choudrie,Parikshit N. Mahalle,Amit Joshi Conference proceedings 2023 The Edit [打印本頁]

作者: 貧血    時間: 2025-3-21 20:06
書目名稱ICT with Intelligent Applications影響因子(影響力)




書目名稱ICT with Intelligent Applications影響因子(影響力)學(xué)科排名




書目名稱ICT with Intelligent Applications網(wǎng)絡(luò)公開度




書目名稱ICT with Intelligent Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱ICT with Intelligent Applications被引頻次




書目名稱ICT with Intelligent Applications被引頻次學(xué)科排名




書目名稱ICT with Intelligent Applications年度引用




書目名稱ICT with Intelligent Applications年度引用學(xué)科排名




書目名稱ICT with Intelligent Applications讀者反饋




書目名稱ICT with Intelligent Applications讀者反饋學(xué)科排名





作者: entitle    時間: 2025-3-21 20:17

作者: Irascible    時間: 2025-3-22 02:14
Investigation of Aadhaar Card Enrolment in Government Schools Using R,haar card data is managed by the unique identification authority of India (UIDAI). We are going to do analysis on Aadhaar card enrolment whether the student is enrolled in school is enrolled with the Aadhaar card or not. If the student is not enrolled with the Aadhaar card he/she may not get the ben
作者: 功多汁水    時間: 2025-3-22 07:13
Automated Spurious Product Review Auditing System, goods and services, improvement in the life style of the people, research fields and more. Considering about the ways of purchasing of things people need and want, the blooming technology led people switch from physical markets to online shopping sites. But spurious reviews are the main problem whi
作者: Fsh238    時間: 2025-3-22 09:10
A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloudnew issues. In response, an extension of cloud computing, known as fog computing, aims to overcome these problems. It aims to bring computation, storage, and network services closer to the end-user by using a distributed computing infrastructure. With the ever-increasing need for secure communicatio
作者: Cubicle    時間: 2025-3-22 13:56
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology,ionized different sectors in every possible factor. It is a promising technology which provides which provides new dimension, growth and many tremendous factors to the users as well as researchers. In that particular synergy fusion of cloud and block-chain technology helps the service providers and
作者: maladorit    時間: 2025-3-22 19:50

作者: 蔑視    時間: 2025-3-22 22:39

作者: 罵人有污點    時間: 2025-3-23 02:24

作者: white-matter    時間: 2025-3-23 06:10
,A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset—An a vast study and examination is made to analyze students’ feedback to assess the efficiency of educating and learning. In this study, the algorithms and techniques of Natural Language Processing (NLP) and Machine Learning (ML) are considered for mining the student feedback on teaching and learning
作者: Incisor    時間: 2025-3-23 11:03

作者: 側(cè)面左右    時間: 2025-3-23 17:35

作者: 燒烤    時間: 2025-3-23 18:12

作者: Legion    時間: 2025-3-24 00:09

作者: 出生    時間: 2025-3-24 03:41

作者: intolerance    時間: 2025-3-24 07:31
Multi-objective Optimization with Practical Constraints Using AALOA,proposed method, standard test functions such as Sphere new function and Rastrigin functions and IEEE 30 bus systems. The basic ant lion algorithm is hybridized with Levy flight operation and the proposed algorithm as ameliorated ant lion optimization (AALO) algorithm in this considered objective fu
作者: BOOR    時間: 2025-3-24 11:50
An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System,a range of smart applications worldwide. It provides technology and delivers a range of smart applications to end users around the world. Majority of the cryptographic algorithms used today were developed for desktop and server contexts, as a result they are not suitable for small devices. Therefore
作者: Indigence    時間: 2025-3-24 14:57
Home Appliances Automation Using IPv6 Transmission Over BLE, home automation or small range devices data communication has Bluetooth as a good option as Bluetooth has developed or release as BLE (Bluetooth Low Energy) for efficient or low power solution for data transfer. It uses IPv6 over BLE for data transfer. It was proposed by Internet Engineering Task F
作者: 袖章    時間: 2025-3-24 20:24

作者: HEAVY    時間: 2025-3-25 00:51
a user-friendly approach, with an emphasis on worked exampleThe development of the di?erential calculus was one of the major achievements of seventeenth century European mathematics, originating in the work of N- ton, Leibniz and others. Integral calculus can be traced back to the work of Archimedes
作者: 召集    時間: 2025-3-25 06:33

作者: 你敢命令    時間: 2025-3-25 07:29
Arunangshu Giri,Dipanwita Chakrabarty,Adrinil Santra,Soumya Kanti Dharaa user-friendly approach, with an emphasis on worked exampleThe development of the di?erential calculus was one of the major achievements of seventeenth century European mathematics, originating in the work of N- ton, Leibniz and others. Integral calculus can be traced back to the work of Archimedes
作者: 微枝末節(jié)    時間: 2025-3-25 13:24

作者: bisphosphonate    時間: 2025-3-25 17:47
R. Sainivedhana,K. Koushik Khanna,Ch. Mahesh,N. Sabiyath Fatimaa user-friendly approach, with an emphasis on worked exampleThe development of the di?erential calculus was one of the major achievements of seventeenth century European mathematics, originating in the work of N- ton, Leibniz and others. Integral calculus can be traced back to the work of Archimedes
作者: 嗎啡    時間: 2025-3-25 20:01

作者: 拖債    時間: 2025-3-26 03:50

作者: 冰雹    時間: 2025-3-26 05:30

作者: certitude    時間: 2025-3-26 12:00

作者: Dendritic-Cells    時間: 2025-3-26 15:54
Balasubbareddy Mallala,P. Venkata Prasad,Kowstubha Pallergraduate and graduate students as well as researchers in the field...Starting from ten motivational examples, the book begins with the most important aspects of the classical theory, including the Direct Method, the Euler-Lagrange equation, Lagrange multipliers, Noether’s Theorem and some regularit
作者: 迫擊炮    時間: 2025-3-26 17:50

作者: 寵愛    時間: 2025-3-26 23:20

作者: Spangle    時間: 2025-3-27 04:38

作者: Forage飼料    時間: 2025-3-27 07:35
Multi-objective Optimization with Practical Constraints Using AALOA,hybridized with Levy flight operation and the proposed algorithm as ameliorated ant lion optimization (AALO) algorithm in this considered objective functions are tested by fulfilling equality, inequality, and practical constraints. Finally, the results are satisfactory.
作者: machination    時間: 2025-3-27 12:13

作者: ARCH    時間: 2025-3-27 16:01
Conference proceedings 2023n and Communication Technology for Intelligent Systems (ICTIS 2023), held in Ahmedabad, India. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike..
作者: 他去就結(jié)束    時間: 2025-3-27 19:11
Automated Spurious Product Review Auditing System,ch is identified using signed interface and genetic algorithm in this paper. The result is compared with mechanisms which identify fake reviews using machine learning and collective hyping approach. This method proves to have elevated accuracy compared with other methods.
作者: 懸掛    時間: 2025-3-27 23:26
,TB Bacteria and?WBC Detection from?ZN-Stained Sputum Smear Images Using Object Detection Model,ject detection model in TB bacteria detection process. The study showed that the RetinaNet-based object detection model is suitable for microscopic ZN images resulting in an Average Precision of 0. 91 for WBC and 0.94 for bacilli bacteria.
作者: Thyroid-Gland    時間: 2025-3-28 05:41

作者: ticlopidine    時間: 2025-3-28 07:47
A Research on the Impact of Big Data Analytics on the Telecommunications Sector,ases. Computer vision techniques have proven particularly useful in this regard. This article explores how Big Data Analytics is disrupting the telecoms sector by breaking down boundaries using technologies like Self-optimizing Networks (SON), Robotics Process Automation (RPA), and Chatbots.
作者: APO    時間: 2025-3-28 11:07

作者: AND    時間: 2025-3-28 18:30
2367-3370 hmedabad, India.Serves as a reference for researchers and pr.This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis. It presents the ou
作者: magnanimity    時間: 2025-3-28 22:22
2367-3370 dia. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike..978-981-99-3757-8978-981-99-3758-5Series ISSN 2367-3370 Series E-ISSN 2367-3389
作者: concise    時間: 2025-3-28 23:37

作者: 燕麥    時間: 2025-3-29 06:36
Investigation of Aadhaar Card Enrolment in Government Schools Using R,used to manage the strength of the students in school and provide better education to all. We have done the data analysis of two district schools to check what is status of the Aadhaar card enrolment and see what is the improvement rate.
作者: 擦試不掉    時間: 2025-3-29 11:09
Intelligence Monitoring of Home Security,. The generic framework that is being suggested includes a number of modules, including those for auto-configuration and management, communication protocol, auto-monitoring, and control. The proposed generic framework is designed to work on all vendor boards and variants of Linux and Windows operating system.
作者: 淘氣    時間: 2025-3-29 15:05
Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach,he same time. Therefore, looking at this scenario we decided to design a Face mask isolation canister. It is simple, sturdy and easy to use. The Face Mask Isolation Canister is design in such a way that the mask will not have any contact with the surface and is capable of storing and isolating the mask of multiple users at the same time.
作者: Commonwealth    時間: 2025-3-29 19:39
Conference proceedings 2023telligent computing, cloud storage, data mining, and software analysis. It presents the outcomes of the Seventh International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2023), held in Ahmedabad, India. The book is divided into two volumes. It discusses the
作者: TRAWL    時間: 2025-3-29 23:45
Monitoring Algorithm for Datafication and Information Control for Data Optimization,ns to make sense of the vast amounts of the data they collect, and to protect sensitive information from unauthorized access. However, it is important to note that these algorithms are not full proof and should be part of a larger security strategy.
作者: 退出可食用    時間: 2025-3-30 02:41

作者: FAWN    時間: 2025-3-30 05:25
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology, review paper focused on data security and block-chain using customer’s data privacy solutions. Also an in-depth review is made for improving the enhancement of ability or functionality of cloud systems and security improvement. Block-chain technology in different will help the cloud systems in diff
作者: arrhythmic    時間: 2025-3-30 11:55

作者: Gingivitis    時間: 2025-3-30 12:37

作者: Terminal    時間: 2025-3-30 17:52
,Modeling the Impact of Access to Finance on MSMEs’ Contribution Towards Exports of the Economy,inally the study recommended lower lending rate, limited collateral, shorter time to disburse the loan, and easy access to finance for accelerating the MSMEs’ export contribution to the country’s economy.
作者: 放逐某人    時間: 2025-3-30 21:02

作者: JADED    時間: 2025-3-31 02:21
An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System,he hardware module via an MQTT broker thus enabling data security in IoT Healthcare application. A comparative analysis is made on the four lightweight cryptographic algorithms and their performance characteristics is analyzed based on various factors such as time and throughput. The results show th
作者: corn732    時間: 2025-3-31 08:44

作者: Geyser    時間: 2025-3-31 11:48

作者: Intuitive    時間: 2025-3-31 13:32
Sameer Ahsan,V Sakthivel,T. Subbulakshmi,Vallidevi Krishnamurthytieth century developments in Analysis and Topology. We can learn much about calculus by studying its history, and a good starting point is the St Andrews’ History of Mathematics website www-history. mcs. st-and. ac. uk/history/ Thisbookisdesignedforbeginninguniversitystudents,boththosestudying math
作者: elucidate    時間: 2025-3-31 20:05

作者: idiopathic    時間: 2025-3-31 23:27

作者: 名字的誤用    時間: 2025-4-1 04:43

作者: GULLY    時間: 2025-4-1 08:53
Ahina George,Divya James,K. S. Lakshmiion are explored...While predominantly designed as a textbook for lecture courses on the calculus of variations, this book can also serve as the basis for a reading seminar or as a companion for self-study. The reader is assumed to be familiar with basic vector analysis, functional analysis, Sobolev
作者: inscribe    時間: 2025-4-1 10:36
tudying its history, and a good starting point is the St Andrews’ History of Mathematics website www-history. mcs. st-and. ac. uk/history/ Thisbookisdesignedforbeginninguniversitystudents,boththosestudying math978-1-85233-940-1978-1-84628-222-5Series ISSN 1615-2085 Series E-ISSN 2197-4144
作者: CLIFF    時間: 2025-4-1 18:12

作者: 射手座    時間: 2025-4-1 19:10

作者: Impugn    時間: 2025-4-1 22:55
R. Sainivedhana,K. Koushik Khanna,Ch. Mahesh,N. Sabiyath Fatimatudying its history, and a good starting point is the St Andrews’ History of Mathematics website www-history. mcs. st-and. ac. uk/history/ Thisbookisdesignedforbeginninguniversitystudents,boththosestudying math978-1-85233-940-1978-1-84628-222-5Series ISSN 1615-2085 Series E-ISSN 2197-4144




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
彰武县| 天津市| 肇州县| 正定县| 漠河县| 法库县| 大田县| 海阳市| 津市市| 阿鲁科尔沁旗| 金阳县| 和林格尔县| 荔浦县| 宜阳县| 灌南县| 游戏| 城固县| 上林县| 柘荣县| 凉山| 类乌齐县| 井冈山市| 西吉县| 浠水县| 镇沅| 桐庐县| 奉新县| 曲靖市| 额济纳旗| 浦江县| 大英县| 法库县| 开原市| 汾阳市| 方正县| 广德县| 上饶市| 司法| 巴南区| 衡南县| 张家界市|