標(biāo)題: Titlebook: International Conference on Innovative Computing and Communications; Proceedings of ICICC Deepak Gupta,Ashish Khanna,Ajay Jaiswal Conferenc [打印本頁(yè)] 作者: Ingrown-Toenail 時(shí)間: 2025-3-21 20:01
書目名稱International Conference on Innovative Computing and Communications影響因子(影響力)
書目名稱International Conference on Innovative Computing and Communications影響因子(影響力)學(xué)科排名
書目名稱International Conference on Innovative Computing and Communications網(wǎng)絡(luò)公開(kāi)度
書目名稱International Conference on Innovative Computing and Communications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱International Conference on Innovative Computing and Communications被引頻次
書目名稱International Conference on Innovative Computing and Communications被引頻次學(xué)科排名
書目名稱International Conference on Innovative Computing and Communications年度引用
書目名稱International Conference on Innovative Computing and Communications年度引用學(xué)科排名
書目名稱International Conference on Innovative Computing and Communications讀者反饋
書目名稱International Conference on Innovative Computing and Communications讀者反饋學(xué)科排名
作者: arthroplasty 時(shí)間: 2025-3-21 20:44
International Conference on Innovative Computing and Communications978-981-19-2821-5Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: Genome 時(shí)間: 2025-3-22 03:43 作者: 官僚統(tǒng)治 時(shí)間: 2025-3-22 05:14
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/471388.jpg作者: 強(qiáng)壯 時(shí)間: 2025-3-22 10:58 作者: obsolete 時(shí)間: 2025-3-22 14:10 作者: 分開(kāi)如此和諧 時(shí)間: 2025-3-22 17:32
Savita Wadhawan,Arvind K. Sharmal questions the CRPD raises for the way we think about human.This book, exploring the theoretical and practical implications of the United Nations Convention on the Rights of Persons with Disabilities (CRPD), brings together an international and interdisciplinary group of leading researchers in the 作者: 閃光你我 時(shí)間: 2025-3-22 23:22 作者: 網(wǎng)絡(luò)添麻煩 時(shí)間: 2025-3-23 02:58 作者: Pelago 時(shí)間: 2025-3-23 09:29
P. S. Niveditha,Saju P. John,Serin V. Simpson as the fairy tale about the ugly duckling (Olbers .). Of course this is a bittersweet remark, because although for millions such is an advantageous and even life-saving intervention, all of them have to cope with the post-obesity status. Obesity is a chronic incurable disease and the postobesity st作者: DALLY 時(shí)間: 2025-3-23 10:51
Hicham Boudlal,Mohammed Serrhini,Ahmed Tahirildings has been exposed by these earthquakes. In this region, most of the existing buildings are non-ductile as they are built before the introduction of modern seismic design codes. Seismic safety and resilience of these non-ductile structures can be increased by the use of a reliable retrofitting 作者: atrophy 時(shí)間: 2025-3-23 17:54 作者: 支柱 時(shí)間: 2025-3-23 21:58 作者: Mere僅僅 時(shí)間: 2025-3-23 22:18 作者: landfill 時(shí)間: 2025-3-24 03:55 作者: 高貴領(lǐng)導(dǎo) 時(shí)間: 2025-3-24 07:29 作者: 討人喜歡 時(shí)間: 2025-3-24 14:08
OpenDaylight SDN and NFV Integration in OpenStack Cloud: OpenSource Approach for Improving Network nfiguration as well as provisioning of resources in the cloud. In this article, we highlight how OpenDaylight can be integrated with OpenStack to enhance network services. After describing SDN with NFV and how they compromise cloud services, we present some advantages of SDN in cloud networks. In ad作者: 織布機(jī) 時(shí)間: 2025-3-24 16:19
K-MNSOA: K-Anonymity Model for Privacy in the Presence of Multiple Numerical Sensitive Overlapped Ader to move forward. Data is the main object to get information, and data is considered as a big data nowadays as it contains numerous information in all directions. As knowledge is bliss, it is also possible that an adversary can use this information to harm an individual. To protect data from an a作者: 特征 時(shí)間: 2025-3-24 19:09 作者: 表被動(dòng) 時(shí)間: 2025-3-25 01:20 作者: Inflammation 時(shí)間: 2025-3-25 03:27
Cold start and Data Sparsity Problems in Recommender System: A Concise Review,ut any item, and it is difficult for the system to search the user interest and predict the user preference. The recommender system (RS) came into existence and supports both customers and providers in their decision-making process. Nowadays, recommender systems are suffering from various problems s作者: overreach 時(shí)間: 2025-3-25 10:12 作者: 一大群 時(shí)間: 2025-3-25 13:22 作者: Morose 時(shí)間: 2025-3-25 19:50 作者: Hyperplasia 時(shí)間: 2025-3-25 20:45
,Exposure of?Sensitive Data Through Blockchain Wallets: A Comparative Analysis,to sensitive data exploitation in blockchain applications. Blockchain wallet is an essential part of blockchain framework and contains the most sensitive data of blockchain application. In 2020, out of 122 blockchain attacks, 27 were found to be solely focused on the wallet. Even though the comparis作者: 漂白 時(shí)間: 2025-3-26 02:06
Classification of Sentiment Reviews for Indian Railways Using Machine Learning Methods,ng it sample data and thus makes the system intelligent that is helpful for real-world AI applications. Machine learning algorithms are applied to such social feedback data to excerpt useful information that confers a competitive edge to several enterprises. There are enough machine learning technol作者: 友好關(guān)系 時(shí)間: 2025-3-26 06:31 作者: motivate 時(shí)間: 2025-3-26 11:52 作者: CRAB 時(shí)間: 2025-3-26 15:42
Entrust SDP Authentication to Software-Defined Campus Network (SDCN),bled to set up remote learning. In turn, the number of users and devices on the network multiplies in a tremendous way. This enlargement forces network administration to control and verify the accessibility. To address this subject, this paper puts forward the software-defined perimeter (SDP) integr作者: 發(fā)微光 時(shí)間: 2025-3-26 19:56 作者: Flavouring 時(shí)間: 2025-3-26 22:28 作者: 原諒 時(shí)間: 2025-3-27 02:14 作者: Firefly 時(shí)間: 2025-3-27 08:25 作者: AV-node 時(shí)間: 2025-3-27 13:28 作者: flaunt 時(shí)間: 2025-3-27 14:38 作者: cognizant 時(shí)間: 2025-3-27 19:24
Secure Environment Establishment for Multipath Routing,ues. According to the trust value, each node assesses the behavior of its neighbors. The proposed certificate revocation and the route re-computation mechanism minimize the overhead in multipath OLSR. As per the simulation results, the proposed approach could outperform the existing approaches in detecting the malicious nodes.作者: reception 時(shí)間: 2025-3-28 00:24 作者: 偶像 時(shí)間: 2025-3-28 04:04
Review on Edge Computing-assisted d2d Networks,munication. This paper conducts a comprehensive survey on different techniques developed to enhance the performance of device-to-device networks by enabling edge computing capability for the devices in the communication network.作者: Axillary 時(shí)間: 2025-3-28 06:18 作者: Condense 時(shí)間: 2025-3-28 11:11
Entrust SDP Authentication to Software-Defined Campus Network (SDCN),or of legitimate users and enhances quality of service. SDP with SDCN helps in enabling additional boundaries within the network which acts as a defense, enhances scalability, and shields the network from external attacks as well as from internal malicious users.作者: orthopedist 時(shí)間: 2025-3-28 16:15 作者: Functional 時(shí)間: 2025-3-28 19:14 作者: VOK 時(shí)間: 2025-3-28 23:44 作者: 輕浮思想 時(shí)間: 2025-3-29 05:06
Comparative Analysis of Transfer Learning and Attention-driven Memory-based Learning for COVID-19 Fttention-based bi-directional LSTM model. The achieved training accuracy by BERT is 86% which is much higher than the accuracy achieved by attention-based Bi-LSTM. BERT precision, recall, and F-score are 0.82, 0.79, and 0.80, respectively, which shows that BERT can detect COVID-19 fake news better t作者: 煩擾 時(shí)間: 2025-3-29 10:57 作者: cardiopulmonary 時(shí)間: 2025-3-29 11:32
A Novel Technique to Detect Inappropriate Content Accessed by Children on Smartphone,ged four to six and seven and eight years were found to use smartphones less with 128.37 and 151.17?min on an average, respectively, and get exposed to inappropriate content less frequently. Children in all the age groups got exposed to inappropriate graphical content more frequently as compared to 作者: Abjure 時(shí)間: 2025-3-29 19:24 作者: 弓箭 時(shí)間: 2025-3-29 22:43 作者: Lipoprotein(A) 時(shí)間: 2025-3-30 02:25 作者: Ardent 時(shí)間: 2025-3-30 06:44
,Process-Based Multi-level Homogeneous Ensemble Predictive Model for Analysing Student’s Academic Pet can extract useful information from massive amounts of data after being processed by a computer. The most difficult problem in predictive modelling is identifying the most effective prediction algorithms that are also accurate enough to be useful. Therefore, a multi-level homogeneous ensemble pred作者: 嘲弄 時(shí)間: 2025-3-30 11:26
Classification of Sentiment Reviews for Indian Railways Using Machine Learning Methods, .-measure, recall, precision, logarithmic loss, and accuracy. The first section of this paper provides the preface of sentiment analysis, and the next section presents the related work and motivation for sentiment analysis then methodology adopted for better decision making through machine learning作者: 彎彎曲曲 時(shí)間: 2025-3-30 13:33 作者: dapper 時(shí)間: 2025-3-30 17:39
Heart Disease Prediction Using Modified Machine Learning Algorithm,s by implementing a modified machine learning algorithm. The input data are passed through various procedures comprising preprocessing, clustering, and selection of effective attributes before classification. To determine the heart illness, four algorithms which include random forest, K-means, genet作者: SOW 時(shí)間: 2025-3-31 00:47 作者: 婚姻生活 時(shí)間: 2025-3-31 01:47 作者: Allowance 時(shí)間: 2025-3-31 05:50
Anshika Choudhary,Anuja Arorama and disability. Obesity and mental disorder each accounts for substantial burden of disease, social prejudice, and discrimination and internalized stigma. A multifaceted relationship links psychopathology, obesity, social discrimination, and disability with circular connections.作者: Innovative 時(shí)間: 2025-3-31 11:37 作者: malapropism 時(shí)間: 2025-3-31 14:15
Hicham Boudlal,Mohammed Serrhini,Ahmed Tahiriorate record-to-record variability. For both as-built and BRB retrofitted frame seismic fragility curves are obtained. For seismic risk assessment, the site-specific seismic hazard curve of Guwahati city giving relationship between annual probability of exceedance and peak spectral acceleration at 1作者: 未開(kāi)化 時(shí)間: 2025-3-31 20:55
Nidhi M. Chourey,Rashmi Sonithis approach, it is ardently necessary to understand the core reasoning behind the disasters, theirimpact on the socio-economic contexts, and the ways to mitigate them. The book can be a valuable reference for beginners, researchers, and professionals interested in disaster risk reduction and allie作者: Obstacle 時(shí)間: 2025-3-31 22:01
Savita Yadav,Pinaki Chakraborty,Prabhat Mittal,Aditya Kumar,Harshit Gupta作者: 清唱?jiǎng)?nbsp; 時(shí)間: 2025-4-1 03:24 作者: 造反,叛亂 時(shí)間: 2025-4-1 08:58
M. Shanmuga Sundari,M. Sudha Rani,Kodumuri Bhargav Ram作者: GRATE 時(shí)間: 2025-4-1 12:49
Ranjana Sikarwar,Shashank Sheshar Singh,Harish Kumar Shakya