標(biāo)題: Titlebook: International Conference on Intelligent Computing and Applications; Proceedings of ICICA M. Arun Bhaskar,Subhransu Sekhar Dash,Bijaya Ketan [打印本頁] 作者: iniquity 時間: 2025-3-21 18:12
書目名稱International Conference on Intelligent Computing and Applications影響因子(影響力)
書目名稱International Conference on Intelligent Computing and Applications影響因子(影響力)學(xué)科排名
書目名稱International Conference on Intelligent Computing and Applications網(wǎng)絡(luò)公開度
書目名稱International Conference on Intelligent Computing and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱International Conference on Intelligent Computing and Applications被引頻次
書目名稱International Conference on Intelligent Computing and Applications被引頻次學(xué)科排名
書目名稱International Conference on Intelligent Computing and Applications年度引用
書目名稱International Conference on Intelligent Computing and Applications年度引用學(xué)科排名
書目名稱International Conference on Intelligent Computing and Applications讀者反饋
書目名稱International Conference on Intelligent Computing and Applications讀者反饋學(xué)科排名
作者: 全部 時間: 2025-3-21 20:42
J. Sathya Priya,V. Krithikaa,S. Monika,P. Nivethini作者: NIL 時間: 2025-3-22 03:48
K. Divya Krishnan,P. T. Ravichandran,P. Sreekanth Reddy作者: Density 時間: 2025-3-22 06:40 作者: Parley 時間: 2025-3-22 12:38
Mohan Debarchan Mohanty,Dipamjyoti Pattnaik,Mahananda Parida,Soyam Mohanty,Mihir Narayan Mohanty作者: 衰弱的心 時間: 2025-3-22 13:40 作者: headlong 時間: 2025-3-22 17:35 作者: 制定法律 時間: 2025-3-22 23:35 作者: 不連貫 時間: 2025-3-23 03:38 作者: 大吃大喝 時間: 2025-3-23 08:59
Ensuring Security in Sharing of Information Using Cryptographic Technique,owercase, special characters, and numbers. For each case, we have used different algorithms with different keys. We hope that we can suggest an approach for protecting the private information at a higher level.作者: BOLT 時間: 2025-3-23 09:57
Efficient Collaborative Key Management Protocol for Secure Mobile Cloud Data Storage, data from DriverHQ public cloud infrastructure. The secret keys are generated by using Pseudorandom Number Generator (PRNG) algorithm that uses mathematical way to produce sequences of random numbers. The algorithm achieves the security for the file data and key by eliminating key escrow and key ex作者: SUGAR 時間: 2025-3-23 13:55
Strength and Swelling Characteristics of Expansive Soils Treated with Calcium Carbide Residue,ated during the production of Acetylene Gas is used to modify the properties of the clayey soil to evaluate its potential usage for the treatment. For this investigation, two soil samples of high compressible clays are treated with different percentages of Calcium Carbide residue (3, 5, 7 and 9%) an作者: CLAY 時間: 2025-3-23 21:39 作者: 有幫助 時間: 2025-3-24 02:10 作者: 神化怪物 時間: 2025-3-24 04:12
Throughput Maximization in WPCN: Assisted by Backscatter Communication with Initial Energy,model to improve the system performance. An optimization problem is formulated to maximize the sum-throughput by finding the optimal transmission policy, including the optimal users’ working mode permutation and time allocation. Simulation results demonstrate the superiority of the proposed model.作者: chassis 時間: 2025-3-24 07:48
Real-Time Human Detection and Tracking Using PEI Representation in a Dynamic 3D Environment,of the tracked individuals. We use classifiers such as JHCH and HOHD. The statistics of color and height are then computed for associating data to generate the 3D orientation of the tracked individuals. In tracking, we try to estimate the similarity criteria in order to compare the current frame and作者: 加劇 時間: 2025-3-24 11:30
2194-5357 olutions; smart grids; green and renewable energy technologies; optimization techniques in electrical systems; power electronics controllers for power systems; power converters and modeling; high voltage engineering; diagnosis and sensing systems; and robotics..978-981-13-2181-8978-981-13-2182-5Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: 財政 時間: 2025-3-24 14:49
A Novel IDS to Detect Multiple DoS Attacks with Network Lifetime Estimation Based on Learning-Based also important. Security and lifetime should work hand in hand to protect and conserve the network. For example, imparting any security solution should not decrease WSN’s lifetime. Thus, a novel energy prediction algorithm is developed and deployed in WSN structure that can actively look and report作者: 表皮 時間: 2025-3-24 21:24 作者: JOT 時間: 2025-3-25 00:58 作者: Notify 時間: 2025-3-25 06:58
Efficient Collaborative Key Management Protocol for Secure Mobile Cloud Data Storage,e-rich in terms of storage, memory computational power, and battery power by remotely executing the wide range of mobile application’s data in a pay-per-use cloud computing environment. In MCC, one of the primary concern is the security and privacy of data managed in cloud. The existing techniques f作者: 使害怕 時間: 2025-3-25 07:29
A Comprehensive Analysis of Key Management Models in the Cloud: Design, Challenges, and Future Diref the attractive features offered by cloud computing, many enterprises are using cloud storage for storing essential information. Like any other emerging technologies cloud computing also brings many new security challenges. Thus, numerous researches were done to ameliorate this problem by introduci作者: Colonnade 時間: 2025-3-25 13:46
Identification of Fronto-Temporal Dementia Using Neural Network,ing the acquired MRI images and transforming RGB to grayscale image, detection of edge by applying Sobel algorithm, segmenting the image, extraction of features, and feeding to the classifier for classification.作者: Mets552 時間: 2025-3-25 17:59 作者: 充氣女 時間: 2025-3-25 21:39 作者: mighty 時間: 2025-3-26 03:42 作者: nonsensical 時間: 2025-3-26 05:42 作者: 鈍劍 時間: 2025-3-26 11:39
Detection of Diabetes Using Multilayer Perceptron, It is a common factor of cardiac problem. Authors try to detect it using multilayer perceptron neural network in this paper. The case study is of Indian ladies with pregnancy suffer from diabetes. Data considered from PIMA database from UCI repository and are used. Eight attributes are taken as fea作者: Arteriography 時間: 2025-3-26 15:00 作者: 影響 時間: 2025-3-26 19:37 作者: 歡騰 時間: 2025-3-27 00:17
Fractional Segmental Transform for Speech Enhancement,haracteristics as the signal changes from time to frequency domain. However, to locate the fractional Fourier domain frequency contents and multicomponent analysis of nonlinear chirp like signals such as speech the Short-Time FrFT (SFrFT) can provide an improved time-frequency resolution. By represe作者: Arthritis 時間: 2025-3-27 05:02 作者: coddle 時間: 2025-3-27 07:53 作者: leniency 時間: 2025-3-27 10:21
Internet of Things (IoT) Enabled Wireless Sensor Network for Physiological Data Acquisition,ical device that handles physiological signals, such as pulse rate and core body temperature along with activity monitoring. The indigenously developed nodes, such as sensor node, destination and relay nodes are successfully deployed in indoor environments. The cooperative wireless network is establ作者: Medley 時間: 2025-3-27 13:51 作者: 悄悄移動 時間: 2025-3-27 20:31
Real-Time Human Detection and Tracking Using PEI Representation in a Dynamic 3D Environment,onment with the help of a single RGB-D camera. The RGB-D cameras are also called as low depth cameras or ranging cameras. The depth camera provides depth information for each pixel. The indigenous RGB-D pixels are transformed into a new point ensemble image (PEI) and human detection and tracking in 作者: Neutropenia 時間: 2025-3-28 01:33 作者: Classify 時間: 2025-3-28 02:53 作者: SUE 時間: 2025-3-28 08:19 作者: 純樸 時間: 2025-3-28 14:20 作者: 深淵 時間: 2025-3-28 17:53
M. Arun Bhaskar,Subhransu Sekhar Dash,Bijaya KetanDiscusses the latest advances and explores the future directions in the emerging areas of engineering and technology.Presents original work, ideas, techniques, and applications in the field of circuit作者: Anticoagulants 時間: 2025-3-28 20:05
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/471404.jpg作者: vertebrate 時間: 2025-3-29 00:57
Conference proceedings 2019ammal Engineering College, Chennai, India on 2–3 February 2018. Presenting original work in the field of computational intelligence and power and computing technology, it focuses on soft computing applications in power systems; power-system modeling and control; FACTS devices – applications in power作者: 極端的正確性 時間: 2025-3-29 05:17 作者: headway 時間: 2025-3-29 10:29
Fractional Segmental Transform for Speech Enhancement,for better signal enhancement. The method has experienced with better Signal to Noise Ratio (SNR) and Perceptual Evaluation of Speech Quality (PESQ) under different noisy conditions as compared to the conventional FrFT in our results.作者: 可憎 時間: 2025-3-29 11:30 作者: 啞巴 時間: 2025-3-29 15:48 作者: 勤勉 時間: 2025-3-29 23:46 作者: 相容 時間: 2025-3-30 01:17 作者: FILLY 時間: 2025-3-30 06:19 作者: inhibit 時間: 2025-3-30 11:53
QR Code-Based Highly Secure ECG Steganography,hat QR code version 40 allows embedding of maximum 2632 bytes of patient data with zero bit errors. Since QR code has an inbuilt error correction code, it provides additional layer of security to patient data and the proposed approach can be used for secure transfer of patient data.作者: 錯誤 時間: 2025-3-30 15:46 作者: agglomerate 時間: 2025-3-30 18:33 作者: Glossy 時間: 2025-3-30 22:54 作者: 忘川河 時間: 2025-3-31 03:57 作者: 精致 時間: 2025-3-31 07:16 作者: Pandemic 時間: 2025-3-31 10:51
Social Engineering als Modus Operandir .?=?2, but .-complete for .?≥?3. We show that the clustering problem is polynomial-time solvable for .?=?2. To our knowledge, these results are also the first on the computational complexity of combinatorial optimization problems on dot product graphs..We also consider the situation when two indiv作者: obsession 時間: 2025-3-31 17:15
Peter L. Andresenusing this new model, the anesthesiologist has the opportunity to discuss the various treatment modalities and potentially suggest diagnostic testing to be performed prior to delivery, similar to the pre-operative testing that is done in other surgical environments.?. . . . .作者: 抑制 時間: 2025-3-31 18:36
Human Lymphocyte X-Prolyl Aminopeptidase (Aminopeptidase P)-Like Proteinionyl aminopeptidase (EC 3.4.11.18) and . and human proline dipeptidase (EC 3.4.13.9). We have been studying the soluble form of aminopeptidase P in human lymphocytes and platelets (4,5), and were interested in determining the nucleotide sequence that would provide useful information for the develop作者: 詞匯記憶方法 時間: 2025-3-31 23:31 作者: 極力證明 時間: 2025-4-1 05:29
Der Bacillus pyocyaneus im Ohr,h habe bisher in meinem Buch die Universit?ten und Fachhochschulen gerade mit meinem Klostermodell arg gebeutelt. Aber selbstverst?ndlich entwickelt sich auch dieser Bereich weiter und daraus ergeben sich interessante M?glichkeiten für Unternehmen.作者: 誘惑 時間: 2025-4-1 06:09 作者: 嫌惡 時間: 2025-4-1 12:12
Introduction to the Notion of Identity,At multiple stages of life, we have all questioned ourselves, who we actually are and where do we belong; and most of us have been in a state of excitement and curiosity to know about our origin or where we come from. These are common questions, through which we try to know more about ourselves.