標(biāo)題: Titlebook: Intelligent Technologies and Applications; Second International Imran Sarwar Bajwa,Tatjana Sibalija,Dayang Norhaya Conference proceedings 2 [打印本頁] 作者: 連結(jié) 時(shí)間: 2025-3-21 20:02
書目名稱Intelligent Technologies and Applications影響因子(影響力)
書目名稱Intelligent Technologies and Applications影響因子(影響力)學(xué)科排名
書目名稱Intelligent Technologies and Applications網(wǎng)絡(luò)公開度
書目名稱Intelligent Technologies and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Intelligent Technologies and Applications被引頻次
書目名稱Intelligent Technologies and Applications被引頻次學(xué)科排名
書目名稱Intelligent Technologies and Applications年度引用
書目名稱Intelligent Technologies and Applications年度引用學(xué)科排名
書目名稱Intelligent Technologies and Applications讀者反饋
書目名稱Intelligent Technologies and Applications讀者反饋學(xué)科排名
作者: 輕快帶來危險(xiǎn) 時(shí)間: 2025-3-21 23:02
https://doi.org/10.1007/978-981-15-5232-8artificial intelligence; communication systems; computer hardware; computer networks; computer security; 作者: 減震 時(shí)間: 2025-3-22 01:13 作者: miscreant 時(shí)間: 2025-3-22 07:23 作者: Matrimony 時(shí)間: 2025-3-22 09:50 作者: Ventilator 時(shí)間: 2025-3-22 15:23 作者: laparoscopy 時(shí)間: 2025-3-22 20:38
1865-0929 achine learning; smart systems;?semantic web;?decision support systems;?image analysis;?automated software engineering..978-981-15-5231-1978-981-15-5232-8Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Stagger 時(shí)間: 2025-3-23 00:44 作者: evince 時(shí)間: 2025-3-23 03:34 作者: 修改 時(shí)間: 2025-3-23 08:55 作者: 安慰 時(shí)間: 2025-3-23 11:13 作者: 打谷工具 時(shí)間: 2025-3-23 14:41 作者: gustation 時(shí)間: 2025-3-23 18:00
1865-0929 19, held in Bahawalpur, Pakistan, in November 2019..The 60 revised full papers and 6 revised short papers presented were carefully reviewed and selected from 224 submissions. Additionally, the volume presents 1 invited paper. The papers of this volume are organized in topical sections on AI and heal作者: characteristic 時(shí)間: 2025-3-24 00:44
FireNot - An IoT Based Fire Alerting System: Design and Implementationd and monitored using a simple Android app. The FireNot system uses Raspberry Pi programmed through Python language and utilises Google API for location detection. This paper practically demonstrates the FireNot system through extensive testing on various operations and the FireNot system is proven to be efficient.作者: Observe 時(shí)間: 2025-3-24 05:43 作者: Mri485 時(shí)間: 2025-3-24 06:30
Scientific Map Creator: A Tool to Analyze the Author’s Affiliation and Citations by Producing Mind Mch papers such as JUCS, IEEE Explore and Scopus is intended to be managed and extracting influential author and present that meta data in the form of mind maps with the help of “Scientific Map Creator”.作者: OVERT 時(shí)間: 2025-3-24 13:11
s are exposed as web services based on industry standards, which follows WSDL for service illustration. These services depend on SOAP to handle service request and response. Hence Web services security is one of the important factors which are used to assess cloud system security. While creating a n作者: CLOWN 時(shí)間: 2025-3-24 17:57
s are exposed as web services based on industry standards, which follows WSDL for service illustration. These services depend on SOAP to handle service request and response. Hence Web services security is one of the important factors which are used to assess cloud system security. While creating a n作者: fibroblast 時(shí)間: 2025-3-24 20:56 作者: 背心 時(shí)間: 2025-3-25 00:08 作者: 做事過頭 時(shí)間: 2025-3-25 06:34
Imran Memon,Hadiqua Fazal,Riaz Ahmed Shaikh,Ghulam Ali Mallah,Rafaqat Hussain Arain,Ghulam Muhammad are not very helpful. It has nevertheless been felt necessary to include such material in this volume because it is of fundamental concern, and as such should be discussed. This entails introducing a number of topics that are still subject to close research but which can nevertheless be described m作者: GLOOM 時(shí)間: 2025-3-25 09:44
Khurram Shahzad,Muhammad Kamran Malik,Khawar Mehmood are not very helpful. It has nevertheless been felt necessary to include such material in this volume because it is of fundamental concern, and as such should be discussed. This entails introducing a number of topics that are still subject to close research but which can nevertheless be described m作者: 有斑點(diǎn) 時(shí)間: 2025-3-25 15:19 作者: Misgiving 時(shí)間: 2025-3-25 16:51
Wajid Rafique,Maqbool Khan,Xuan Zhao,Nadeem Sarwar,Wanchun Doulications has brought about important changes in the design of control systems. Their performance and their low cost make them suitable for use in control systems of various kinds which demand far better capabilities and performances than those provided by analog controllers. However, in order reall作者: insular 時(shí)間: 2025-3-25 22:17
Sana Ghafoor,Khan Bahadar Khan,Muhammad Rizwan Tahir,Maryoum Mustafathe development of suitable programming techniques are all having increasing influence on the techniques of measurement and con- trol and on automation in general. The application of digital techni- ques to process automation started in about 1960 when the first process computer was installed. From 作者: Awning 時(shí)間: 2025-3-26 01:50 作者: 縮短 時(shí)間: 2025-3-26 04:45 作者: corpus-callosum 時(shí)間: 2025-3-26 10:24
Younas Khan,Sajjad Ahmad Bhatti,Sohail Khattakvices determine the present development of automation. The application of digital techniques to process automation started in about 1960, when the first process computer was installed. From about 1970 process computers with cathodic ray tube display have become standard equipment for larger automati作者: TAP 時(shí)間: 2025-3-26 16:21 作者: Estimable 時(shí)間: 2025-3-26 19:45
Afshan Saad,Muhammad Saad,Shah Muhammad Emaduddin,Rafi Ullahrmine the present development of automation. The application of digital techniques to process automation started in about 1960, when the first process computer was installed. From about 1970 process computers with cathodic ray tube display have become standard equipment for larger automation systems作者: Carcinoma 時(shí)間: 2025-3-26 22:58
M. Zafar Iqbal,Ghulam Mustafa,Nadeem Sarwar,Syed Hamza Wajid,Junaid Nasir,Shaista Siddquealso other applications in which dynamic processes have to be identified in closed loop. Relevant examples are processes which have to operate in closed loop because of technical reasons or for integrated and economical processes for which feedback is an integrated part of the overall system. Proces作者: 幾何學(xué)家 時(shí)間: 2025-3-27 03:46 作者: GRE 時(shí)間: 2025-3-27 07:36
Design of Wearable Prototype Smart Wristband for Remote Health Monitoring Using Internet of Things as pulse rate, blood pressure and temperature are the basic parameters, used for monitoring a patient’s health. The designed healthcare kit consists of different sensors that are used for sensing and monitoring a patient’s health. The data from healthcare kit is transmitted via the internet to save作者: 熱心助人 時(shí)間: 2025-3-27 11:57
FireNot - An IoT Based Fire Alerting System: Design and Implementation of IoT based systems is extend to real time detection and warning system. However, cost has been a major factor for development and implementation of IoT systems. Considering the cost, ease of implementation, this paper proposes a low cost yet efficient IoT system called FireNot for warning and ale作者: 啞巴 時(shí)間: 2025-3-27 14:18 作者: 點(diǎn)燃 時(shí)間: 2025-3-27 21:19
Perception of Wearable Intelligent Devices: A Case of Fitbit-Alta-HRent, energy prediction, as well as for health management. Our thorough analysis of the literature has revealed that the majority of the studies focus on investigating the usefulness, accuracy, or adoption of the devices. However, no study has been conducted to evaluate the perception of these wearab作者: 彩色 時(shí)間: 2025-3-28 00:53 作者: 聯(lián)想 時(shí)間: 2025-3-28 02:22
A Blockchain-Based Framework for Information Security in Intelligent Transportation Systemsreality. The smart cities utilize Intelligent Transportation System (ITS) to facilitate smart vehicles to operate independently without much human intervention. The ITS system utilizes the data produced by the smart infrastructure to intelligently operate the smart vehicles and make highly precise d作者: Presbycusis 時(shí)間: 2025-3-28 09:38
Home Automation Security System Based on Face Detection and Recognition Using IoTurity methods have some flaws and they can be hacked. The proposed system for resolving the security issue is based on face detection and recognition using Internet of Things (IoT). The face of a person is captured by the camera and compared with the acquired database. The authorized user can also u作者: amphibian 時(shí)間: 2025-3-28 11:44
Smart Reader for Visually Impaired People Based on Optical Character Recognitioneople are living with some kind of visual impairment while 36 million people are completely visually impaired. Reading is one of the major necessities of visually impaired people. Numerous researchers have worked on developing a mechanism that allows blind people to detect obstacles, to read the lab作者: 聰明 時(shí)間: 2025-3-28 16:29 作者: 無能力 時(shí)間: 2025-3-28 20:33
A Real-Time Driver Drowsiness Detection and Warning System Based on an Eye Blinking Rate and deaths. The other causes of traffic accidents are due to human errors and/or due to mechanical failures. Driver fatigue is one of the leading causes of Road Traffic Accidents (RTA) in Pakistan. Numerous systems are invented that minimize the impact of these accidents. The research in this area 作者: slow-wave-sleep 時(shí)間: 2025-3-28 23:10
Optimization of Bug Reporting System (BRS): Artificial Intelligence Based Method to Handle Duplicatequality of tested software and productivity of resources allocated to that software. Bug Reporting System (BRS) plays an important role in tracking all essential bug reports during software development life cycle (SDLC). Duplicate Bug Reports (DBR) have an adverse effect on the software quality assu作者: Charlatan 時(shí)間: 2025-3-29 07:00
A Review of Star Schema and Snowflakes Schemalogs, webpages, and most important databases. Database and relational databases both provide help to decision making in the future work. Nowadays these approaches become time and resource consuming there for new concept use name data warehouse. Which can analyze many databases at a time on a common 作者: 種屬關(guān)系 時(shí)間: 2025-3-29 09:22
A Region-Based and a Unified Team’s Strength in the Game of Cricket Using Principal Component Analysarious factors of a team such as batting, bowling and fielding strengths. In cricket, it is significant to measure the strengths of the teams across the region/venue because every region has different playing condition which affects their performance. The selectors should be aware of their team’s st作者: 摻和 時(shí)間: 2025-3-29 14:27
A Unit Softmax with Laplacian Smoothing Stochastic Gradient Descent for Deep Convolutional Neural Neation functions. Arguably, softmax is the traditionally convenient to train Deep Convolutional Neural Networks (DCNNs) for classification task. However, the modern deep learning architectures have exposed its limitation towards feature discriminability. In this paper, we offered a supervision signal作者: narcissism 時(shí)間: 2025-3-29 15:47
Scientific Map Creator: A Tool to Analyze the Author’s Affiliation and Citations by Producing Mind Ms to evaluate the authors to rank them for deserving positions such as assigning those researchers PHD supervisions, presenting them award, hiring them as a reviewer or editor in the Journal. With the help of “Scientific Map Creator”, we can provide web-based concept mapping application with a Datab作者: 車床 時(shí)間: 2025-3-29 20:58
Prediction and Analysis of Sun Shower Using Machine Learningost tragic wonders. In this manner, expectation of climate wonders is of significant enthusiasm for human culture to keep away from or limit the devastation of climate risks. Climate forecast is unpredictable because of clamor and missing qualities dataset. Various endeavors were made to make climat作者: 小卷發(fā) 時(shí)間: 2025-3-30 02:51
Electroencephalography Based Machine Learning Framework for Anxiety Classificationest into anxiety disorder, which is a root cause of multiple mental health issues. Therefore, accurately detecting anxiety is vital using methods that are automated, efficient and independent of user bias. To this end, we present an experimental study for the classification of human anxiety using el作者: 歌曲 時(shí)間: 2025-3-30 06:55
Imran Sarwar Bajwa,Tatjana Sibalija,Dayang Norhaya作者: expound 時(shí)間: 2025-3-30 08:58
k at a color palette scheme which records the RGB color values of the chosen color during registration and these values are used during sign on, subsequently it performs the access control mechanism. To strengthen web services towards message level by encrypting SOAP messages with AES and shared key作者: Indolent 時(shí)間: 2025-3-30 14:35 作者: Subjugate 時(shí)間: 2025-3-30 17:27
Ayesha Masood,Khan Bahadar Khan,Talha Younas,Ali Raza Khalid partitioning the dataset. Two datasets namely, bench mark Adult dataset and Real life Medical dataset are used for experimentation in this work. The privacy preserved datasets using the proposed algorithm are compared for its utility with .-diversified dataset for single sensitive attribute and ori作者: 悲觀 時(shí)間: 2025-3-30 23:19
Imran Memon,Hadiqua Fazal,Riaz Ahmed Shaikh,Ghulam Ali Mallah,Rafaqat Hussain Arain,Ghulam Muhammadng the reader with underived mathematical results is a practice we have adopted as seldom as possible, but it was felt that to present the derivations as well as the results would be a large undertaking of dubious value in the circumstances; we can only hope that our judgement in the matter has been作者: gastritis 時(shí)間: 2025-3-31 03:05 作者: dendrites 時(shí)間: 2025-3-31 07:30
Muhammad Rizwan Masood,Ali Sufyan,Usama Khalid,Muhammad Makki Khan,Sundus Amink takes into account the fact that the association of books with software and on-line material is radically changing the teaching methods of the control discipline. Despite its interactive character, computer-aided control design software requires the understanding of a number of concepts in order t作者: Limited 時(shí)間: 2025-3-31 09:48
Wajid Rafique,Maqbool Khan,Xuan Zhao,Nadeem Sarwar,Wanchun Douk takes into account the fact that the association of books with software and on-line material is radically changing the teaching methods of the control discipline. Despite its interactive character, computer-aided control design software requires the understanding of a number of concepts in order t作者: aspersion 時(shí)間: 2025-3-31 14:27
Sana Ghafoor,Khan Bahadar Khan,Muhammad Rizwan Tahir,Maryoum Mustafaocess control is characterized by the centralization of many functions in a single (though sometimes in several) process computer. Such centralization does not permit full utilization of the many advantages of digital signal processing and rapid economic pay-off as analog back-up systems or parallel作者: Bernstein-test 時(shí)間: 2025-3-31 18:20
Muhammad Farid Zamir,Khan Bahadar Khan,Shafquat Ahmmad Khan,Eid Rehmantion to process control is characterized by the centralization of many functions in a single (though sometimes in several) process computer. Such centralization does not permit full utilization of the many advantages of digital signal processing and rapid economic pay-off as analog back-up systems or parallel978-3-662-02319-8作者: 延期 時(shí)間: 2025-4-1 01:11 作者: 似少年 時(shí)間: 2025-4-1 05:31