派博傳思國際中心

標(biāo)題: Titlebook: International Conference on Intelligent Computing and Applications; Proceedings of ICICA M. Arun Bhaskar,Subhransu Sekhar Dash,Bijaya Ketan [打印本頁]

作者: iniquity    時間: 2025-3-21 18:12
書目名稱International Conference on Intelligent Computing and Applications影響因子(影響力)




書目名稱International Conference on Intelligent Computing and Applications影響因子(影響力)學(xué)科排名




書目名稱International Conference on Intelligent Computing and Applications網(wǎng)絡(luò)公開度




書目名稱International Conference on Intelligent Computing and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱International Conference on Intelligent Computing and Applications被引頻次




書目名稱International Conference on Intelligent Computing and Applications被引頻次學(xué)科排名




書目名稱International Conference on Intelligent Computing and Applications年度引用




書目名稱International Conference on Intelligent Computing and Applications年度引用學(xué)科排名




書目名稱International Conference on Intelligent Computing and Applications讀者反饋




書目名稱International Conference on Intelligent Computing and Applications讀者反饋學(xué)科排名





作者: 全部    時間: 2025-3-21 20:42
J. Sathya Priya,V. Krithikaa,S. Monika,P. Nivethini
作者: NIL    時間: 2025-3-22 03:48
K. Divya Krishnan,P. T. Ravichandran,P. Sreekanth Reddy
作者: Density    時間: 2025-3-22 06:40

作者: Parley    時間: 2025-3-22 12:38
Mohan Debarchan Mohanty,Dipamjyoti Pattnaik,Mahananda Parida,Soyam Mohanty,Mihir Narayan Mohanty
作者: 衰弱的心    時間: 2025-3-22 13:40

作者: headlong    時間: 2025-3-22 17:35

作者: 制定法律    時間: 2025-3-22 23:35

作者: 不連貫    時間: 2025-3-23 03:38

作者: 大吃大喝    時間: 2025-3-23 08:59
Ensuring Security in Sharing of Information Using Cryptographic Technique,owercase, special characters, and numbers. For each case, we have used different algorithms with different keys. We hope that we can suggest an approach for protecting the private information at a higher level.
作者: BOLT    時間: 2025-3-23 09:57
Efficient Collaborative Key Management Protocol for Secure Mobile Cloud Data Storage, data from DriverHQ public cloud infrastructure. The secret keys are generated by using Pseudorandom Number Generator (PRNG) algorithm that uses mathematical way to produce sequences of random numbers. The algorithm achieves the security for the file data and key by eliminating key escrow and key ex
作者: SUGAR    時間: 2025-3-23 13:55
Strength and Swelling Characteristics of Expansive Soils Treated with Calcium Carbide Residue,ated during the production of Acetylene Gas is used to modify the properties of the clayey soil to evaluate its potential usage for the treatment. For this investigation, two soil samples of high compressible clays are treated with different percentages of Calcium Carbide residue (3, 5, 7 and 9%) an
作者: CLAY    時間: 2025-3-23 21:39

作者: 有幫助    時間: 2025-3-24 02:10

作者: 神化怪物    時間: 2025-3-24 04:12
Throughput Maximization in WPCN: Assisted by Backscatter Communication with Initial Energy,model to improve the system performance. An optimization problem is formulated to maximize the sum-throughput by finding the optimal transmission policy, including the optimal users’ working mode permutation and time allocation. Simulation results demonstrate the superiority of the proposed model.
作者: chassis    時間: 2025-3-24 07:48
Real-Time Human Detection and Tracking Using PEI Representation in a Dynamic 3D Environment,of the tracked individuals. We use classifiers such as JHCH and HOHD. The statistics of color and height are then computed for associating data to generate the 3D orientation of the tracked individuals. In tracking, we try to estimate the similarity criteria in order to compare the current frame and
作者: 加劇    時間: 2025-3-24 11:30
2194-5357 olutions; smart grids; green and renewable energy technologies; optimization techniques in electrical systems; power electronics controllers for power systems; power converters and modeling; high voltage engineering; diagnosis and sensing systems; and robotics..978-981-13-2181-8978-981-13-2182-5Series ISSN 2194-5357 Series E-ISSN 2194-5365
作者: 財政    時間: 2025-3-24 14:49
A Novel IDS to Detect Multiple DoS Attacks with Network Lifetime Estimation Based on Learning-Based also important. Security and lifetime should work hand in hand to protect and conserve the network. For example, imparting any security solution should not decrease WSN’s lifetime. Thus, a novel energy prediction algorithm is developed and deployed in WSN structure that can actively look and report
作者: 表皮    時間: 2025-3-24 21:24

作者: JOT    時間: 2025-3-25 00:58

作者: Notify    時間: 2025-3-25 06:58
Efficient Collaborative Key Management Protocol for Secure Mobile Cloud Data Storage,e-rich in terms of storage, memory computational power, and battery power by remotely executing the wide range of mobile application’s data in a pay-per-use cloud computing environment. In MCC, one of the primary concern is the security and privacy of data managed in cloud. The existing techniques f
作者: 使害怕    時間: 2025-3-25 07:29
A Comprehensive Analysis of Key Management Models in the Cloud: Design, Challenges, and Future Diref the attractive features offered by cloud computing, many enterprises are using cloud storage for storing essential information. Like any other emerging technologies cloud computing also brings many new security challenges. Thus, numerous researches were done to ameliorate this problem by introduci
作者: Colonnade    時間: 2025-3-25 13:46
Identification of Fronto-Temporal Dementia Using Neural Network,ing the acquired MRI images and transforming RGB to grayscale image, detection of edge by applying Sobel algorithm, segmenting the image, extraction of features, and feeding to the classifier for classification.
作者: Mets552    時間: 2025-3-25 17:59

作者: 充氣女    時間: 2025-3-25 21:39

作者: mighty    時間: 2025-3-26 03:42

作者: nonsensical    時間: 2025-3-26 05:42

作者: 鈍劍    時間: 2025-3-26 11:39
Detection of Diabetes Using Multilayer Perceptron, It is a common factor of cardiac problem. Authors try to detect it using multilayer perceptron neural network in this paper. The case study is of Indian ladies with pregnancy suffer from diabetes. Data considered from PIMA database from UCI repository and are used. Eight attributes are taken as fea
作者: Arteriography    時間: 2025-3-26 15:00

作者: 影響    時間: 2025-3-26 19:37

作者: 歡騰    時間: 2025-3-27 00:17
Fractional Segmental Transform for Speech Enhancement,haracteristics as the signal changes from time to frequency domain. However, to locate the fractional Fourier domain frequency contents and multicomponent analysis of nonlinear chirp like signals such as speech the Short-Time FrFT (SFrFT) can provide an improved time-frequency resolution. By represe
作者: Arthritis    時間: 2025-3-27 05:02

作者: coddle    時間: 2025-3-27 07:53

作者: leniency    時間: 2025-3-27 10:21
Internet of Things (IoT) Enabled Wireless Sensor Network for Physiological Data Acquisition,ical device that handles physiological signals, such as pulse rate and core body temperature along with activity monitoring. The indigenously developed nodes, such as sensor node, destination and relay nodes are successfully deployed in indoor environments. The cooperative wireless network is establ
作者: Medley    時間: 2025-3-27 13:51

作者: 悄悄移動    時間: 2025-3-27 20:31
Real-Time Human Detection and Tracking Using PEI Representation in a Dynamic 3D Environment,onment with the help of a single RGB-D camera. The RGB-D cameras are also called as low depth cameras or ranging cameras. The depth camera provides depth information for each pixel. The indigenous RGB-D pixels are transformed into a new point ensemble image (PEI) and human detection and tracking in
作者: Neutropenia    時間: 2025-3-28 01:33

作者: Classify    時間: 2025-3-28 02:53

作者: SUE    時間: 2025-3-28 08:19

作者: 純樸    時間: 2025-3-28 14:20

作者: 深淵    時間: 2025-3-28 17:53
M. Arun Bhaskar,Subhransu Sekhar Dash,Bijaya KetanDiscusses the latest advances and explores the future directions in the emerging areas of engineering and technology.Presents original work, ideas, techniques, and applications in the field of circuit
作者: Anticoagulants    時間: 2025-3-28 20:05
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/471404.jpg
作者: vertebrate    時間: 2025-3-29 00:57
Conference proceedings 2019ammal Engineering College, Chennai, India on 2–3 February 2018. Presenting original work in the field of computational intelligence and power and computing technology, it focuses on soft computing applications in power systems; power-system modeling and control; FACTS devices – applications in power
作者: 極端的正確性    時間: 2025-3-29 05:17

作者: headway    時間: 2025-3-29 10:29
Fractional Segmental Transform for Speech Enhancement,for better signal enhancement. The method has experienced with better Signal to Noise Ratio (SNR) and Perceptual Evaluation of Speech Quality (PESQ) under different noisy conditions as compared to the conventional FrFT in our results.
作者: 可憎    時間: 2025-3-29 11:30

作者: 啞巴    時間: 2025-3-29 15:48

作者: 勤勉    時間: 2025-3-29 23:46

作者: 相容    時間: 2025-3-30 01:17

作者: FILLY    時間: 2025-3-30 06:19

作者: inhibit    時間: 2025-3-30 11:53
QR Code-Based Highly Secure ECG Steganography,hat QR code version 40 allows embedding of maximum 2632 bytes of patient data with zero bit errors. Since QR code has an inbuilt error correction code, it provides additional layer of security to patient data and the proposed approach can be used for secure transfer of patient data.
作者: 錯誤    時間: 2025-3-30 15:46

作者: agglomerate    時間: 2025-3-30 18:33

作者: Glossy    時間: 2025-3-30 22:54

作者: 忘川河    時間: 2025-3-31 03:57

作者: 精致    時間: 2025-3-31 07:16

作者: Pandemic    時間: 2025-3-31 10:51
Social Engineering als Modus Operandir .?=?2, but .-complete for .?≥?3. We show that the clustering problem is polynomial-time solvable for .?=?2. To our knowledge, these results are also the first on the computational complexity of combinatorial optimization problems on dot product graphs..We also consider the situation when two indiv
作者: obsession    時間: 2025-3-31 17:15
Peter L. Andresenusing this new model, the anesthesiologist has the opportunity to discuss the various treatment modalities and potentially suggest diagnostic testing to be performed prior to delivery, similar to the pre-operative testing that is done in other surgical environments.?. . . . .
作者: 抑制    時間: 2025-3-31 18:36
Human Lymphocyte X-Prolyl Aminopeptidase (Aminopeptidase P)-Like Proteinionyl aminopeptidase (EC 3.4.11.18) and . and human proline dipeptidase (EC 3.4.13.9). We have been studying the soluble form of aminopeptidase P in human lymphocytes and platelets (4,5), and were interested in determining the nucleotide sequence that would provide useful information for the develop
作者: 詞匯記憶方法    時間: 2025-3-31 23:31

作者: 極力證明    時間: 2025-4-1 05:29
Der Bacillus pyocyaneus im Ohr,h habe bisher in meinem Buch die Universit?ten und Fachhochschulen gerade mit meinem Klostermodell arg gebeutelt. Aber selbstverst?ndlich entwickelt sich auch dieser Bereich weiter und daraus ergeben sich interessante M?glichkeiten für Unternehmen.
作者: 誘惑    時間: 2025-4-1 06:09

作者: 嫌惡    時間: 2025-4-1 12:12
Introduction to the Notion of Identity,At multiple stages of life, we have all questioned ourselves, who we actually are and where do we belong; and most of us have been in a state of excitement and curiosity to know about our origin or where we come from. These are common questions, through which we try to know more about ourselves.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
秦安县| 昌平区| 承德市| 泸水县| 阳西县| 香港| 麻栗坡县| 柘荣县| 临猗县| 墨竹工卡县| 临澧县| 调兵山市| 视频| 哈尔滨市| 青州市| 合水县| 苍溪县| 盐山县| 洛川县| 夏津县| 鲁山县| 扶沟县| 乳山市| 保康县| 扎赉特旗| 五家渠市| 雅安市| 密山市| 米林县| 吉水县| 太白县| 苏州市| 色达县| 额尔古纳市| 辽宁省| 巨野县| 湖南省| 平凉市| 左权县| 长葛市| 湘潭县|