派博傳思國際中心

標(biāo)題: Titlebook: International Conference on Intelligent Computing and Applications; ICICA 2016 Subhransu Sekhar Dash,Swagatam Das,Bijaya Ketan Pa Conferenc [打印本頁]

作者: panache    時(shí)間: 2025-3-21 18:56
書目名稱International Conference on Intelligent Computing and Applications影響因子(影響力)




書目名稱International Conference on Intelligent Computing and Applications影響因子(影響力)學(xué)科排名




書目名稱International Conference on Intelligent Computing and Applications網(wǎng)絡(luò)公開度




書目名稱International Conference on Intelligent Computing and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱International Conference on Intelligent Computing and Applications被引頻次




書目名稱International Conference on Intelligent Computing and Applications被引頻次學(xué)科排名




書目名稱International Conference on Intelligent Computing and Applications年度引用




書目名稱International Conference on Intelligent Computing and Applications年度引用學(xué)科排名




書目名稱International Conference on Intelligent Computing and Applications讀者反饋




書目名稱International Conference on Intelligent Computing and Applications讀者反饋學(xué)科排名





作者: 擁護(hù)    時(shí)間: 2025-3-21 20:40

作者: FEIGN    時(shí)間: 2025-3-22 03:55
https://doi.org/10.1007/978-981-10-5520-1ICICA 2016; Signal Processing; Intelligent Computing; Data Engineering; Cloud Computing; ICT for Educatio
作者: BLINK    時(shí)間: 2025-3-22 08:32

作者: Hemodialysis    時(shí)間: 2025-3-22 11:02

作者: 侵蝕    時(shí)間: 2025-3-22 13:12

作者: BILIO    時(shí)間: 2025-3-22 17:40

作者: CON    時(shí)間: 2025-3-23 00:37

作者: Manifest    時(shí)間: 2025-3-23 05:09
Block Compressive Sampling and Wiener Curvelet Denoising Approach for Satellite Images, more memory and computing capacity. In classical satellite imaging system, conventional compression algorithms like JPEG were used. However, they are not very efficient in reducing the data rate. In order to overcome this, block compressive sensing (BCS) technique, reweighted sampling (RWS) are use
作者: 吝嗇性    時(shí)間: 2025-3-23 08:58
Neural Deployment Algorithm for WSN: A Concept,nt has happened, and it is going on in the field of WSN. The importance of conservation of energy in WSN in most of its applications will provide the best scope for WSN development. Sufficient literatures are already carried for deployment of nodes leading to conservation of energy. One of the impor
作者: Interstellar    時(shí)間: 2025-3-23 12:08
Intelligent System Approach to Real-Time Video Denoising Using Lifting-Based Wavelet Technique,her point. We propose a new method for an efficient and improved quality real-time video denoising using a temporal video slicing (TVS) technique, lifting-based dual-tree complex wavelet transform (L-DTCWT), and adaptive thresholding approach. The TVS technique extracts discrete frames from a noisy
作者: 步兵    時(shí)間: 2025-3-23 16:04
Data Loss Prevention Scheme Using ADCN with Effective Tour Strategy in Wireless Sensor Network, wireless sensor network (WSN), and hence, reliable data dissemination is desirable. In WSN, event detection ratio should be very high. In such condition, huge data are generated by event node. But there is always limitation of buffer size. As a result, it gets overflow. The data which are important
作者: Accommodation    時(shí)間: 2025-3-23 18:48
Network Information Security Model Based on Web Data Mining,One of the most common techniques that are used to enhance the performance of information security in networks is ‘web data mining.’ This technology is found to be effective in providing information security in a network. This paper presents a meta-analytic report on information security by using da
作者: Neonatal    時(shí)間: 2025-3-23 23:55

作者: 苦笑    時(shí)間: 2025-3-24 02:59
Adaptive Filter Algorithms Based Noise Cancellation Using Neural Network in Mobile Applications,e signal from the corrupted signal. We propose signal extraction using artificial neural network hybrid back propagation adaptive for mobile systems. The performance analysis of the proposed hybrid adaptive algorithms is carried out based on the error convergence and correlation coefficient. By taki
作者: 1FAWN    時(shí)間: 2025-3-24 09:23
A Novel Approach to Database Confidentiality in Online Voting System,se public voting and reduce the cost involved in an election, we need an online voting system. Public will be motivated to vote if they believe in the privacy and security of the system. This paper addresses issues in identification and authentication in the online voting system. Password and six-di
作者: CHOKE    時(shí)間: 2025-3-24 11:41
Attending Prominent Face in the Set of Multiple Faces Through Relative Visual Saliency, dominance features decide the focus on attention. Attention boosts up the recognition and identification process in a crowd and hence plays an excelling role in the area of visual surveillance and robotic vision. Using different computer vision-based techniques, enormous researches have been carrie
作者: 不易燃    時(shí)間: 2025-3-24 15:41
Parallel Palm Print Identification Using Fractional Coefficients of Palm Edge Transformed Images onages for Haar transform, Cosine and Kekre transform on the GPU-based system running on CUDA platform. In this, three edge detection methods are applied on palm image to obtain the palm edge images. Transform palm edge images are obtained using three different image transforms. The characteristics of
作者: defenses    時(shí)間: 2025-3-24 22:12
A Secure Spatial Domain Image Steganography Using Genetic Algorithm and Linear Congruential Generat the existence of secret communication. Hence, it is extensively used to solve the issues related to data security. In this paper, a secure and lossless spatial domain image steganography technique is proposed. Stream of secret data is hidden in quarter part of image by identifying suitable location
作者: 現(xiàn)實(shí)    時(shí)間: 2025-3-25 01:34
Three-Dimensional MRI Brain Image Analysis on Hadoop Platform,omes essential for medical practitioners. This paper focuses on implementation of automatic diagnosis of three-dimensional data using the MapReduce framework. After flourishing completion of two-dimensional image analysis of magnetic resonance imaging (MRI) brain pictures for detecting tumor, we hav
作者: 我沒有強(qiáng)迫    時(shí)間: 2025-3-25 03:45
Performance Evaluation of Fingerprint Trait Authentication System,he biometric trait with the stored template. Fingerprint is the most popularly used for authentication due to the simplicity in capturing the fingerprint image. Human biometric traits such as fingerprint, iris, and palmprint can be used to identify the person due to its unique texture pattern. In th
作者: 廚房里面    時(shí)間: 2025-3-25 09:45
Graphical Password Using an Intuitive Approach,nse of Internet and human–computer interaction has created new threats of unauthorized access and data exploitation. Traditional methods of authentication have been text-based password schemes. However, the major drawback with them has been the fact that their strength varies inversely with user con
作者: SYN    時(shí)間: 2025-3-25 12:36

作者: 寵愛    時(shí)間: 2025-3-25 17:17
Comparative Study of Android-Based M-Apps for Farmers,This paper highlights the mobile applications for agriculture, where architecture of mobile phone with its current trends and the most useful M-Apps related to agriculture market, soil description, weather information, and government schemes have been described in detail. In this paper, Android-base
作者: nephritis    時(shí)間: 2025-3-25 23:24
Feature Extraction of DICOM Images Using Canny Edge Detection Algorithm,ere captured in Digital Imaging and Communication in Medicine (DICOM) format (Bhagat and Atique in Medical Images: Formats, Compression Techniques and Dicom Image Retrieval Survey, 2012) [.]. As per the structure of DICOM image, physicians were unable to detect strangeness or disease in the patient
作者: 大約冬季    時(shí)間: 2025-3-26 04:00
Design of 2-Bit Parallel Asynchronous Self-timed Adder and 2-Bit Parallel Adder Using Radix Adder,r-delay product, and number of transistors to design different adders. The parallel asynchronous self-timed adder designed using half adder along 2:1 multiplexer requires minimum interconnection. These adders have propensity to run faster than existing adders for random data. Parallel adder based on
作者: exceed    時(shí)間: 2025-3-26 07:35

作者: Irksome    時(shí)間: 2025-3-26 09:10

作者: 寬度    時(shí)間: 2025-3-26 16:11
A Model of Legal and Procedural Framework for Cybercrime Investigation in India Using Digital Imagenforcement agency has to adopt a legal and procedural framework for their investigation process. This paper aims to propose a model of legal and procedural framework in cybercrime investigation where a digital image is considered as primary evidence. The model is constructed based on Indian laws and regulations.
作者: 漂亮才會豪華    時(shí)間: 2025-3-26 17:01

作者: Intersect    時(shí)間: 2025-3-26 23:54

作者: 拉開這車床    時(shí)間: 2025-3-27 02:21

作者: 細(xì)微的差異    時(shí)間: 2025-3-27 09:09

作者: indenture    時(shí)間: 2025-3-27 12:58

作者: FID    時(shí)間: 2025-3-27 17:11
Block Compressive Sampling and Wiener Curvelet Denoising Approach for Satellite Images,rvelet transform with Wiener filtering technique (CTWF) is used for significant denoising of the BCS data. Experimental results show that BCS along with denoising technique reproduces images with better PSNR values.
作者: cumulative    時(shí)間: 2025-3-27 18:50

作者: 合乎習(xí)俗    時(shí)間: 2025-3-28 01:56
Intelligent System Approach to Real-Time Video Denoising Using Lifting-Based Wavelet Technique,stantaneously. This process is continued until all the frames are denoised. All the denoised frames are suitably buffered to display the denoised video. Here the major core processing blocks are TVS, L-DTCWT framework, and denoising unit. The denoised video quality will be judged through quality metrics such as PSNR, GCF, NIQE, and SSIM.
作者: Orthodontics    時(shí)間: 2025-3-28 03:20

作者: ELUC    時(shí)間: 2025-3-28 09:59

作者: 草率女    時(shí)間: 2025-3-28 11:23
Conference proceedings 2018artment of Computer Engineering, D.Y. Patil College of Engineering, Pune, India during 20-22 December 2016. The book presents original work, information, techniques and applications in the field of computational intelligence,?power and computing technology.?This volume also talks about image languag
作者: 鍵琴    時(shí)間: 2025-3-28 17:07
Manan Arya,Saad Hassan,Swastik Binjola,Poonam Verma
作者: harmony    時(shí)間: 2025-3-28 20:54
Umesh M. Kulkarni,Harish H. Kenchannavar,Umakant P. Kulkarni
作者: interior    時(shí)間: 2025-3-29 02:08

作者: Slit-Lamp    時(shí)間: 2025-3-29 05:27
Rajat Mahey,Nimish Singh,Chandan Kumar,Nitin Bhagwat,Poonam Verma
作者: 侵略    時(shí)間: 2025-3-29 11:07

作者: 裙帶關(guān)系    時(shí)間: 2025-3-29 14:42

作者: 古代    時(shí)間: 2025-3-29 19:06
Diagnosis of Disease Using Feature Decimation with Multiple Classifier System, importance. These groups of features are then input to different stages of multiple classifier system. If output of stage I is showing risk of disease, then only system will go for second stage of classifier with second-level attribute set as input and so on. Thus, for healthy person system will st
作者: 起波瀾    時(shí)間: 2025-3-29 20:53

作者: constitute    時(shí)間: 2025-3-30 01:23
Parallel Palm Print Identification Using Fractional Coefficients of Palm Edge Transformed Images on comparison is done using GAR. Experimental result shows the performance improvement in terms of GAR value using fractional coefficient concept for all transforms. In all transform, Cosine Transform gives the best performance. Time required for matching on GPU shows two times faster performance than
作者: 膽汁    時(shí)間: 2025-3-30 05:42

作者: Serenity    時(shí)間: 2025-3-30 11:54
Performance Evaluation of Fingerprint Trait Authentication System,nce measures. Experimental results shown that feature vector size 4?×?4 gives the highest accuracy of 91.75% as compared to the accuracy with feature vector sizes taken as 8?×?8 or 16?×?16 or 32?×?32.
作者: 機(jī)械    時(shí)間: 2025-3-30 15:00
Feature Extraction of DICOM Images Using Canny Edge Detection Algorithm,etrieval of images have been a critical task for diagnosis of disease. The content-based image retrieval is effectively applicable for effective treatment of disease. Canny edge detection algorithm is useful for extracting features of medical images.
作者: FOIL    時(shí)間: 2025-3-30 16:52
International Conference on Intelligent Computing and ApplicationsICICA 2016
作者: Abrade    時(shí)間: 2025-3-30 22:48
Das Lesbenhormon, oder: Geschlechtsk?rper — hormonell stabilisiert oder flexibilisiert? der Hamburger Sexualforscher Gunter Schmidt z.B. hoffnungsfroh, es h?tte zwar die sexuelle Liberalisierung ab den 1970ern gerade zu einer Verst?rkung identit?tsstiftender Biologisierungen geführt, es g?be aber nun eine beginnende Aufl?sung monosexueller Festlegung. Dies schreibt er unter anderem ko
作者: Neolithic    時(shí)間: 2025-3-31 01:19
Reconfigurable architectures: A new vision for optimization problems,e, this algorithm has shown its ability to deal with formulas of large size that are not yet accessible to exhaustive methods. Many problems such as planning, scheduling, vision can efficiently be solved by using the GSAT algorithm. In this study, we give an implementation of GSAT on Field Programma
作者: 使聲音降低    時(shí)間: 2025-3-31 07:55

作者: 神化怪物    時(shí)間: 2025-3-31 12:08
erts.Represents an ideal reference for both clinicians and t.The new edition of this outstanding reference textbook, in two volumes, offers comprehensive and authoritative coverage of the contemporary specialty of oral and maxillofacial surgery. The aim is to provide an all-encompassing, user-friend
作者: Recess    時(shí)間: 2025-3-31 15:18
https://doi.org/10.1007/978-3-642-72743-6 immediate gratification and eudaimonia is marked by more collectively-oriented interest in enduring effort and contribution. This new model is linked to a dual process model of happiness and discussed in the context of psychological views on meaning in life.
作者: 松軟無力    時(shí)間: 2025-3-31 17:51

作者: 令人不快    時(shí)間: 2025-4-1 01:31
https://doi.org/10.1007/978-3-658-34631-7e an .(.log..) bits index achieving the same query time as that of Cole et al.’s index, where 0? 作者: tooth-decay    時(shí)間: 2025-4-1 02:41

作者: Corral    時(shí)間: 2025-4-1 07:25
The Neural Circuitry Subserving Aversive Conditioning of Contact Placing in Catsns contributing tonically to CP, the adult pattern of control of CP subsequently emerging after 6–7 weeks (Amassian and Ross, 1978). The claim that full hindlimb placing can be elicited in the spinal kitten (Forssberg .., 1974) has been refuted in several laboratories (Amassian .., 1977; Bradley ..,
作者: hieroglyphic    時(shí)間: 2025-4-1 12:50

作者: affinity    時(shí)間: 2025-4-1 16:55
,Die Einführung von eLearning managen — Eine aktuelle Aufgabe des Innovationsmanagements von Bildungklungsprogramms ?Lernkultur Kompetenzentwicklung“ aus Mitteln des Bundesministeriums für Bildung und Forschung (BMBF) sowie des Europ?ischen Sozialfonds gef?rdert wird. Mit dem komplexen Projektmanagement ist die Arbeitsgemeinschaft Betriebliche Weiterbildungsforschung e.V., Projekt QUEM, beauftragt
作者: Lymphocyte    時(shí)間: 2025-4-1 19:50

作者: Acetaldehyde    時(shí)間: 2025-4-1 23:56





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
永年县| 博罗县| 武冈市| 西吉县| 桦南县| 新沂市| 沁源县| 介休市| 宕昌县| 外汇| 鲜城| 普兰县| 永寿县| 肇庆市| 乌海市| 靖州| 阳谷县| 深州市| 桂平市| 柘荣县| 保定市| 曲松县| 固镇县| 饶阳县| 泰州市| 渭源县| 东乡县| 略阳县| 漾濞| 龙江县| 台前县| 利川市| 屏山县| 裕民县| 阜城县| 丁青县| 旺苍县| 梧州市| 潍坊市| 浠水县| 东台市|