標(biāo)題: Titlebook: Information, Communication and Computing Technology; 6th International Co Mahua Bhattacharya,Latika Kharb,Deepak Chahal Conference proceedi [打印本頁(yè)] 作者: controllers 時(shí)間: 2025-3-21 16:10
書(shū)目名稱Information, Communication and Computing Technology影響因子(影響力)
書(shū)目名稱Information, Communication and Computing Technology影響因子(影響力)學(xué)科排名
書(shū)目名稱Information, Communication and Computing Technology網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Information, Communication and Computing Technology網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Information, Communication and Computing Technology被引頻次
書(shū)目名稱Information, Communication and Computing Technology被引頻次學(xué)科排名
書(shū)目名稱Information, Communication and Computing Technology年度引用
書(shū)目名稱Information, Communication and Computing Technology年度引用學(xué)科排名
書(shū)目名稱Information, Communication and Computing Technology讀者反饋
書(shū)目名稱Information, Communication and Computing Technology讀者反饋學(xué)科排名
作者: 易達(dá)到 時(shí)間: 2025-3-21 23:41
Ghadekar Premanand Pralhad,S. Abhishek,Tejas Kachare,Om Deshpande,Rushikesh Chounde,Prachi Tapadiyad in der Gesamtheit der Truppe .- bzw. .geht.. Damit ist auch die spezifische Position der Avantgarde in einem künstlerischen Kontext markiert, wo sie ihre Aufgabe in der . des den ?Vormarsch? Behindernden, d.h. in der . der kulturellen Tradition findet:作者: 壯觀的游行 時(shí)間: 2025-3-22 03:30
Shiv Preet,Amandeep Baggaetables has become acceptable, desired, and commodified. Previously censored words, acts and art works are now celebrated—including through their hefty price tags—instead of reviled. Has the designation of respectability become a form of censorship in its own right?作者: 甜食 時(shí)間: 2025-3-22 04:53
Trupti Nagrareetables has become acceptable, desired, and commodified. Previously censored words, acts and art works are now celebrated—including through their hefty price tags—instead of reviled. Has the designation of respectability become a form of censorship in its own right?作者: Gleason-score 時(shí)間: 2025-3-22 10:33 作者: ALLAY 時(shí)間: 2025-3-22 14:23
Prakhar Shrivastava,Kapil Kumar Soni,Akhtar Rasooles between Dadaist works, artists, and chapters previously imagined disparate, the book shows how Dada simultaneously prefigured structuralist theories of subject formation and pre-performed post-structuralist critiques of those theories.978-3-031-26612-6978-3-031-26610-2作者: 良心 時(shí)間: 2025-3-22 19:51
Sumedha,Rajesh Rohillath flat elimination rules has harmonious flat introduction rules. If a harmonious characterisation of a connective is given, it can be explicitly defined in terms of the standard operators for implication, conjunction, disjunction, falsum and (propositional) universal quantification, namely by its i作者: MAIZE 時(shí)間: 2025-3-23 00:19
Abrar Alnami,Miada Almasre,Norah Al-Malkilung der aus den Wirkprinzipien resultierenden Qualit?t und Quantit?t der Digitalisierdaten. Für eine ausführliche Beschreibung wird jeweils auf weiterführende Literatur verwiesen. Erg?nzend sei hier auf [Woh94] verwiesen, wo ebenfalls ein überblick, allerdings mit dem Schwerpunkt auf optischen Verf作者: engagement 時(shí)間: 2025-3-23 02:07 作者: 錫箔紙 時(shí)間: 2025-3-23 05:56 作者: 健談的人 時(shí)間: 2025-3-23 10:58 作者: Cabinet 時(shí)間: 2025-3-23 14:54
Comparative Analysis of Serverless Solutions from Public Cloud ProvidersThese scenarios included several phases of sudden and spontaneous load increment and decrement, mimicking how it happens in real-world situations. Finally, we observed how quickly and effectively they scale, their cold boot times, and their response times.作者: 憤慨點(diǎn)吧 時(shí)間: 2025-3-23 19:23
Secure Data Transmission Techniques for Privacy Preserving Computation Offloading Between Fog Comput. The architecture relies on establishing a layer of Data-Tables over the communicating nodes and a novel Encryption Procedure encompassed within the data transfer mechanism. The objective is to ensure a smooth flow of computation and data transfer while providing the necessary privacy and security 作者: Keshan-disease 時(shí)間: 2025-3-23 23:18 作者: 指令 時(shí)間: 2025-3-24 03:11
Web-Based Real-Time Gesture Recognition with Voice by Node.js which helps in the development of web application and is written in JavaScript. In the proposed application, ML algorithm is running in the web browser, hence there is no need to install any driver or library. Users just need to open the webpage and the program is ready to run. Users can作者: commune 時(shí)間: 2025-3-24 09:23
A MapReduce Approach to Automatic Key File Updates for SPT (Squeeze, Pack and Transfer) Algorithm decompressing files with the help of the SPT algorithm. It can not only eliminate the manual generation of the keys for SPT algorithm but also it helps in reducing the time required for creation and updates of the key files.作者: 平淡而無(wú)味 時(shí)間: 2025-3-24 13:27
Performance Analysis of Named Entity Recognition Approaches on Code-Mixed Datae generation, etc. In this work, we present a study on the performance analysis of various approaches to the automatic NER of code-mixed data and propose an improved approach based on BiLSTM-CRF for NER. In this approach, we pass pre-trained word embeddings, trainable character embeddings and a few 作者: 無(wú)禮回復(fù) 時(shí)間: 2025-3-24 17:22
Quantum Based Deep Learning Models for Pattern Recognitionf classical model by incorporating Grover’s search method and quantum Hebbian learning. The aim of writing this article is to introduce the necessity of deep learning model, an emergence of quantum computations, discussion over requisites of data preprocessing techniques, then to propose the classic作者: 名字 時(shí)間: 2025-3-24 19:53
Story Generation from Images Using Deep Learning stories on input images. Thus, when testing the model’s performance, a list of names will be entered from the first component so that the second generator arranges them and generates a short story from them. The proposed model developed could generate a short story expressive of an input image as s作者: 大酒杯 時(shí)間: 2025-3-25 01:49
Detecting Text-Bullying on Twitter Using Machine Learning AlgorithmsdaBoost Classifier, K-neighbors Classifier, and Logistic Regression machine learning models. Then tuning a model fitting the best results we get in (TFIDF). We achieve the best accuracy, 0.924 in the Linear SVC classifier, best F1 Score 0.942% in the same classifier, the best Precision 0.975 in the 作者: 誘騙 時(shí)間: 2025-3-25 03:21
Information, Communication and Computing Technology6th International Co作者: 沉著 時(shí)間: 2025-3-25 08:50 作者: parsimony 時(shí)間: 2025-3-25 13:28
Darshan Baid,Pallavi Murghai Goel,Pragya Bhardwaj,Astha Singh,Vishu Tyagi作者: Cosmopolitan 時(shí)間: 2025-3-25 18:45 作者: 秘密會(huì)議 時(shí)間: 2025-3-25 23:52 作者: Exaggerate 時(shí)間: 2025-3-26 02:26
rts den Status der Kunst in der bürgerlichen Gesellschaft radikal problematisierten. Heute werden diese Bewegungen in der Regel dem Begriff der . subsumiert. Bevor dieser Begriff allerdings — erstmals von Guillaume Apollinaire — zur Abgrenzung innovativer Kunstformen verwendet wurde, hatte er in sei作者: 瑪瑙 時(shí)間: 2025-3-26 05:59 作者: 移植 時(shí)間: 2025-3-26 08:43
Shiv Preet,Amandeep Baggaal was rejected as degenerate. In Paris, Dada events often ended in violence—against and within the group of performers—and occasionally with the police being called. Dada spread mischief in every city that it called home, seeking to shake society into readdressing its role within the madness of war作者: 商議 時(shí)間: 2025-3-26 14:55 作者: 涂掉 時(shí)間: 2025-3-26 20:42
Sreeja Gaddamidi,Rajendra Prasathdual sign, literary manifesto, photographic image.Theorizes .Dada’s Subject and Structure. argues that Dadaist praxis was far more theoretically incisive than previous scholarship has indicated. The book combines theoretical frameworks surrounding ideological subject formation with critical media an作者: 外表讀作 時(shí)間: 2025-3-26 23:01
Prakhar Shrivastava,Kapil Kumar Soni,Akhtar Rasooldual sign, literary manifesto, photographic image.Theorizes .Dada’s Subject and Structure. argues that Dadaist praxis was far more theoretically incisive than previous scholarship has indicated. The book combines theoretical frameworks surrounding ideological subject formation with critical media an作者: 貧窮地活 時(shí)間: 2025-3-27 02:58
Sumedha,Rajesh Rohillatives in terms of the standard operators. With every list of introduction or elimination rules proposed for an .-ary connective ., we associate a certain formula of second-order intuitionistic propositional logic. The formula corresponding to given introduction rules expresses the ., the formula cor作者: GRACE 時(shí)間: 2025-3-27 07:52
Abrar Alnami,Miada Almasre,Norah Al-Malki Digitalisieren zeichnet sich dadurch aus, da? die Werkstückoberfl?che durch eine geeignete Sensorik abgetastet wird. Die geometrische Gestalt wird in Form einer rechnerinternen Darstellung — meist diskrete Raumpunkte — gespeichert. Das dabei zu verwendende Digitalisiersystem mu? die komplette und h作者: CARE 時(shí)間: 2025-3-27 10:01
Abdullah Yahya Abdullah Amer,Tamanna Siddiquio?” accompagnato da uno sguardo per metà affascinato e per metà compassionevole, come per dire “Certo, si occupa di cose molto interessanti, ma così lontane dalla vita vera!”. Alcune volte lo sguardo ha anche un non so che di impaurito e forse accusatorio: “Ah, è una di quelli che si propongono di d作者: 干旱 時(shí)間: 2025-3-27 15:04 作者: 敵手 時(shí)間: 2025-3-27 17:47
Multipath TCP Security Issues, Challenges and Solutionsrous benefits such as higher throughput, reliability, fault tolerance, backward compatibility and load balancing by supporting multi-homing that allows use of multiple paths for data transfer over single network connection still it is vulnerable to many security intrusions such as Denial of Service,作者: arrogant 時(shí)間: 2025-3-27 22:03
Challenge-Response Based Data Integrity Verification (DIV) and Proof of Ownership (PoW) Protocol for service used by them to outsource their data and also expect safety of data from cloud vendors w.r.t. confidentiality, integrity and access control. Nowadays, the massive amount data is being generated and outsourced from multiple sources to cloud, this data growth introduces many security issues a作者: animated 時(shí)間: 2025-3-28 03:08 作者: 豎琴 時(shí)間: 2025-3-28 08:03 作者: 甜瓜 時(shí)間: 2025-3-28 12:34
Comparative Analysis of Serverless Solutions from Public Cloud Providerss, promising higher availability and dynamic auto-scaling while at the same time diminishing operational and maintenance costs. One such is serverless processing, or function-as-a-service (FaaS). Serverless has emerged as a decent contestant for web applications, APIs, backend-services due to their 作者: 修飾 時(shí)間: 2025-3-28 16:33 作者: Brocas-Area 時(shí)間: 2025-3-28 18:55
Secure Data Transmission Techniques for Privacy Preserving Computation Offloading Between Fog Compute consumers brought Cloud Computing in existence. But computation on cloud is expensive and continuous expansion of this field leads to an arising security concern. This led to the creation of Fog Computing, a layer that transcends the barrier between cloud and edge devices, that operates on most of作者: 澄清 時(shí)間: 2025-3-29 01:52 作者: incontinence 時(shí)間: 2025-3-29 07:08
Web-Based Real-Time Gesture Recognition with Voiceproposed application are taken in the form of hand gestural inputs with the help of webcam. This application also helps to interact with google home or smart home of google. As the gestures captured by the webcam can be given for functionality which works for google home and the application can spea作者: Aqueous-Humor 時(shí)間: 2025-3-29 09:56
A MapReduce Approach to Automatic Key File Updates for SPT (Squeeze, Pack and Transfer) Algorithmzing the available network resources and reducing size of dataset by using inbuilt compression algorithm. This paper epitomizes the use of MapReduce for finding out symmetrical binary keys for SPT (Squeeze Pack and Transfer) algorithm from various data files available on public cloud domains. This p作者: 難解 時(shí)間: 2025-3-29 12:05
Measurement of Liquid Level Using Prediction Methodologys for level measurement are also varies in every place. In this paper, work is done on video-based level measurement for scientific purpose where it requires accuracy in millimeter range. The camera for video capturing is placed at some distance and by image processing the level of liquid can be det作者: 思考而得 時(shí)間: 2025-3-29 16:19 作者: venous-leak 時(shí)間: 2025-3-29 20:15 作者: inferno 時(shí)間: 2025-3-30 02:01
Empirical Laws of Natural Language Processing for Neural Language Generated Textd the text and language, it leads to a significant reduction in human involvement. Many sequence models show great work in generating human like text, but the amount of research work done to check the extent up to which their results match the man-made texts are limited in number. In this paper, the作者: 粗魯?shù)娜?nbsp; 時(shí)間: 2025-3-30 07:07 作者: 評(píng)論者 時(shí)間: 2025-3-30 10:29 作者: Pantry 時(shí)間: 2025-3-30 14:33
1865-0929 CICCT 2021, held in New Delhi, India, in May 2021..The 16 full papers and 4 short paper presented in this volume were carefully reviewed and selected from 83 qualified submissions. The papers are organized in topical sections on communication and network systems; computational intelligence technique作者: 行業(yè) 時(shí)間: 2025-3-30 19:24
Conference proceedings 2021, held in New Delhi, India, in May 2021..The 16 full papers and 4 short paper presented in this volume were carefully reviewed and selected from 83 qualified submissions. The papers are organized in topical sections on communication and network systems; computational intelligence techniques..作者: 遵循的規(guī)范 時(shí)間: 2025-3-30 20:52
Multipath TCP Security Issues, Challenges and Solutionsare not tested properly. The implementation and experiment details of ADD_ADDR and Eavesdropper in initial handshake attacks performed on MPTCP version0 and version1, detailed analysis of all the available solutions, limitations of these solutions and direction to offer the solution over these limitations are covered in this paper.作者: 勾引 時(shí)間: 2025-3-31 03:31 作者: 懶惰民族 時(shí)間: 2025-3-31 05:33 作者: 進(jìn)入 時(shí)間: 2025-3-31 10:04 作者: AGATE 時(shí)間: 2025-3-31 16:02 作者: carotid-bruit 時(shí)間: 2025-3-31 20:06
A Post Quantum Signature Scheme for?Secure User Certification System The security of proposed signature scheme relies on Shortest-Integer problem, which can withstand the quantum attacks. Moreover, we prove that the proposed scheme satisfies unforgeability and other security aspects (invisibility, non-repudiation and impersonation) under the standard security model.作者: 音樂(lè)戲劇 時(shí)間: 2025-4-1 00:07 作者: 最小 時(shí)間: 2025-4-1 03:36
Conference proceedings 2021, held in New Delhi, India, in May 2021..The 16 full papers and 4 short paper presented in this volume were carefully reviewed and selected from 83 qualified submissions. The papers are organized in topical sections on communication and network systems; computational intelligence techniques..作者: forestry 時(shí)間: 2025-4-1 09:28
Communications in Computer and Information Sciencehttp://image.papertrans.cn/i/image/465999.jpg