派博傳思國(guó)際中心

標(biāo)題: Titlebook: Inventive Computation and Information Technologies; Proceedings of ICICI S. Smys,Valentina Emilia Balas,Ram Palanisamy Conference proceedin [打印本頁]

作者: 大腦    時(shí)間: 2025-3-21 16:34
書目名稱Inventive Computation and Information Technologies影響因子(影響力)




書目名稱Inventive Computation and Information Technologies影響因子(影響力)學(xué)科排名




書目名稱Inventive Computation and Information Technologies網(wǎng)絡(luò)公開度




書目名稱Inventive Computation and Information Technologies網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Inventive Computation and Information Technologies被引頻次




書目名稱Inventive Computation and Information Technologies被引頻次學(xué)科排名




書目名稱Inventive Computation and Information Technologies年度引用




書目名稱Inventive Computation and Information Technologies年度引用學(xué)科排名




書目名稱Inventive Computation and Information Technologies讀者反饋




書目名稱Inventive Computation and Information Technologies讀者反饋學(xué)科排名





作者: 青石板    時(shí)間: 2025-3-21 21:28

作者: 交響樂    時(shí)間: 2025-3-22 00:38

作者: 爆米花    時(shí)間: 2025-3-22 07:43

作者: PALMY    時(shí)間: 2025-3-22 11:41
V. Geetha Lekshmy,P. A. Vishnu,P. S. Harikrishnansult in increased system instability and protection performance degradation. Efficient power supply restoration upon a power outage is demanded to ensure resilient operation of power distribution networks consisting of DGs with stochastic generation and diverse characteristics. This work proposes an
作者: Friction    時(shí)間: 2025-3-22 14:02

作者: 過渡時(shí)期    時(shí)間: 2025-3-22 19:13

作者: defeatist    時(shí)間: 2025-3-22 21:48
R. M. Balajee,M. K. Jayanthi Kannan,V. Murali Mohanctivity, and administrative approaches are assumed to be value neutral?or inconsequential. This chapter illustrates that these factors influence the sequencing of commitments and shows the differing impacts they have on a firm’s performance (or policy outcomes). When market structures and competitio
作者: 不幸的人    時(shí)間: 2025-3-23 01:41
Rajesh Kannan Megalingam,Gaurav Rudravaram,Vijay Kumar Devisetty,Deepika Asandi,Sai Smaran Kotaproluctivity, and administrative approaches are assumed to be value neutral?or inconsequential. This chapter illustrates that these factors influence the sequencing of commitments and shows the differing impacts they have on a firm’s performance (or policy outcomes). When market structures and competitio
作者: anesthesia    時(shí)間: 2025-3-23 05:33
Yash Khare,Abhijit Ramesh,Vishwaak Chandran,Sevagen Veerasamy,Pranjal Singh,S. Adarsh,T. Anjalictivity, and administrative approaches are assumed to be value neutral?or inconsequential. This chapter illustrates that these factors influence the sequencing of commitments and shows the differing impacts they have on a firm’s performance (or policy outcomes). When market structures and competitio
作者: 惡心    時(shí)間: 2025-3-23 09:48
V. Muralidharan,V. Vijayalakshmictivity, and administrative approaches are assumed to be value neutral?or inconsequential. This chapter illustrates that these factors influence the sequencing of commitments and shows the differing impacts they have on a firm’s performance (or policy outcomes). When market structures and competitio
作者: MARS    時(shí)間: 2025-3-23 15:36

作者: 松果    時(shí)間: 2025-3-23 18:36

作者: 傻瓜    時(shí)間: 2025-3-23 22:44
Ankita Agnihotri,Abinash Sahoo,Manoj Kumar Diwakarctivity, and administrative approaches are assumed to be value neutral?or inconsequential. This chapter illustrates that these factors influence the sequencing of commitments and shows the differing impacts they have on a firm’s performance (or policy outcomes). When market structures and competitio
作者: 斑駁    時(shí)間: 2025-3-24 05:54

作者: heartburn    時(shí)間: 2025-3-24 07:44

作者: 大漩渦    時(shí)間: 2025-3-24 13:36
Nayeem Ahmad Khance, it presents the micro-grids from their economic, environmental, social, and technological requirements, objectives, and impacts. The paradigmatic changes now imposed to the conventional grid are emphasised and contrasted with the micro-grid capabilities and benefits. Then, bidirectional power fl
作者: 諷刺滑稽戲劇    時(shí)間: 2025-3-24 16:27
A. Jhansi Sri Latha,Ch. NagaSai Manojna,Ch. N. L. Padma Ashalesha,K. S. Balamurugance, it presents the micro-grids from their economic, environmental, social, and technological requirements, objectives, and impacts. The paradigmatic changes now imposed to the conventional grid are emphasised and contrasted with the micro-grid capabilities and benefits. Then, bidirectional power fl
作者: 討好女人    時(shí)間: 2025-3-24 20:17

作者: REIGN    時(shí)間: 2025-3-25 03:11
Harikumar Rajaguru,S. R. Sannasi Chakravarthyinability and climate change policies. Its related policy cousin, environmental justice gained momentum in the 1970–1980s in the United States and Europe separate from the modern environmental movement. While environmental justice has had trouble defining how to determine disproportionate impact fro
作者: amnesia    時(shí)間: 2025-3-25 05:59

作者: companion    時(shí)間: 2025-3-25 09:27

作者: Confirm    時(shí)間: 2025-3-25 12:30

作者: GLIDE    時(shí)間: 2025-3-25 17:52

作者: sterilization    時(shí)間: 2025-3-25 21:40

作者: 個(gè)阿姨勾引你    時(shí)間: 2025-3-26 02:58
Image-Based Authentication Security Improvement by Randomized Selection Approach,tances, higher the information value provides the higher possibility for data hacking. This situation will develop further and will not be a setback, which implies that the security of those data should be improved as well. This element of security enhancement will be dependent on increasing physica
作者: Gastric    時(shí)間: 2025-3-26 05:45
Automatic Content Creation Mechanism and Rearranging Technique to Improve Cloud Storage Space,n order to provide the flexibility to use it anywhere, at any time, and on any device. Due to the increasing mobility in modern devices, data productivity and accessibility in cloud storage are increasing. Data versatility is expanding on a daily basis, posing a management challenge. All methods of
作者: 誘導(dǎo)    時(shí)間: 2025-3-26 11:50
Voter ID Card and Fingerprint-Based E-voting System, one would expect the procedure for voting to be on the cutting edge of technology in terms of security and adhere to the highest standards. This paper proposes and discusses a method of E-voting based on dual-factor authentication in the form of unique identification (UID) number and the fingerprin
作者: Eructation    時(shí)間: 2025-3-26 15:28
Intelligent CCTV Footage Analysis with Sound Source Separation, Object Detection and Super Resoluti footage analysis with sound source separation, object detection and super resolution. However, according to recent statistics, 80% of CCTV footage is discarded in the case of an investigation and is deemed uninformative. The reason being the grainy and low-quality video feed from CCTV cameras. None
作者: Middle-Ear    時(shí)間: 2025-3-26 17:57

作者: 悶熱    時(shí)間: 2025-3-27 00:46
A New Approach for Optical Image Encryption Standard Using Bit Swapping and Fractional Fourier Tranhave gained increased attention. A novel scheme for optical encryption of two-dimensional images is proposed in this paper by integrating image bit swapping strategies in fractional Fourier domains. The secret data hiding process is performed based on LSB replacing technique using secret bits. Image
作者: 蕁麻    時(shí)間: 2025-3-27 03:32

作者: 團(tuán)結(jié)    時(shí)間: 2025-3-27 06:40

作者: 永久    時(shí)間: 2025-3-27 13:07
Evaluation of Different Variable Selection Approaches with Naive Bayes to Improve the Customer Behas services and also predicate how long a customer will exist in the enterprises in future. To achieve better customer satisfaction and to establish a sustainable relationship with the customers, the need for consumer analysis must be performed out expertly. To perform customer analysis in a better w
作者: ingenue    時(shí)間: 2025-3-27 17:38

作者: 沒收    時(shí)間: 2025-3-27 21:34
PKI-Based Security Enhancement for IoT in 5G Networks,communicate. The IoT enables these objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems. Nowadays, 5G (fifth generation) systems have the potential to make the IoT
作者: deviate    時(shí)間: 2025-3-28 01:12
Wearable Tag for Human Health Monitoring System,ditions, researching behaviours, detecting events such as falls, tracking location, and so on. With the advancement of wearable technology, several researchers are developing a solution for establishing a seamless human health monitoring system that can be used both indoors and outdoors. The propose
作者: 笨拙處理    時(shí)間: 2025-3-28 03:42

作者: 輕率的你    時(shí)間: 2025-3-28 09:59

作者: 爭(zhēng)論    時(shí)間: 2025-3-28 11:17

作者: 辯論    時(shí)間: 2025-3-28 15:15
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/474632.jpg
作者: groggy    時(shí)間: 2025-3-28 19:02
978-981-16-6722-0The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
作者: TIGER    時(shí)間: 2025-3-28 23:46

作者: 頭腦冷靜    時(shí)間: 2025-3-29 03:57
Conference proceedings 2022CIT 2021), organized during 12–13 August 2021. The book includes papers in the research area of information sciences and communication engineering. The book presents novel and innovative research results in theory, methodology and applications of communication engineering and information technologies.
作者: 書法    時(shí)間: 2025-3-29 08:19
https://doi.org/10.1007/978-981-16-6723-7Innovative Computing Technologies; Information and Networking Technologies; Communication Networks; Rea
作者: Altitude    時(shí)間: 2025-3-29 13:55
,Adaptive IoT System for?Precision Agriculture,ature. Occurrence of rain is predicted by a machine learning model, and based on this, the system parameters like frequency of getting moisture sensor values are adjusted. This adaptation is fruitful during occurrence of continuous rain when the soil is wet and the moisture content information can b
作者: Priapism    時(shí)間: 2025-3-29 19:35

作者: Deceit    時(shí)間: 2025-3-29 21:14
Image-Based Authentication Security Improvement by Randomized Selection Approach,nvironmental impact, and (iii) device stability, reliability, and also additional power consumption for sensing device. When coming to sensorless approach for authentication, the simple traditional password scheme is not enough now, and there are some authentication schemes, which will make us to en
作者: 錯(cuò)事    時(shí)間: 2025-3-30 00:10

作者: Antarctic    時(shí)間: 2025-3-30 06:07

作者: headlong    時(shí)間: 2025-3-30 12:17
A Real-Time Approach of Fall Detection and Rehabilitation in Elders Using Kinect Xbox 360 and Supersk of fall. Activity recognition system is a very important technology for elderly people to do their daily activities in their life. Physiotherapy is one of the branches of rehabilitation science which brings differences in the ability and makes the individual to lead a healthy life. In this paper,
作者: anchor    時(shí)間: 2025-3-30 16:18
,Ensemble Model Ransomware Classification: A?Static Analysis-based Approach, elude the methods used in dynamic analysis. We propose a static analysis method along with machine learning for classifying the ransomware using opcodes extracted by disassemblers. By selecting the most appropriate feature vectors through the tf-idf feature selection method and tuning the parameter
作者: 要素    時(shí)間: 2025-3-30 18:40

作者: 策略    時(shí)間: 2025-3-30 21:35

作者: 預(yù)定    時(shí)間: 2025-3-31 02:45
Wearable Tag for Human Health Monitoring System,d provide a complete report when the authorized person intends to know the status of health and all by using a mobile phone. The proposed Wearable Tag is required to overcome the impact of present COVID-19 scenario.
作者: ineluctable    時(shí)間: 2025-3-31 05:29

作者: 闡釋    時(shí)間: 2025-3-31 11:35
Re project will on the one hand explore innovative NILM concepts to fulfill BMS application requirements while minimizing hardware cost. On the other hand, it will contribute innovative BMS applications based on device-level monitoring and contemporary communication infrastructure.
作者: 圍巾    時(shí)間: 2025-3-31 13:30
Aswathi Premkumar,R. Hridya Krishna,Nikita Chanalya,C. Meghadev,Utkrist Arvind Varma,T. Anjali,S. Siworking. The book presents the basic principles of energy internet and emphasizes the current research trends in the field of energy Internet at an advanced level. It includes instructor materials, case-studies, and worked examples throughout. .This is an ideal resource for students in advanced grad
作者: 容易生皺紋    時(shí)間: 2025-3-31 20:24
Aki Vamsi Krishna,E. Prabhurmal network and gas pipeline network. Then, considering the interweaving and interaction of long dynamic processes of wide time scale and phased evolution in the energy internet, this chapter proposes a three-layer multi-mode phased hybrid simulation framework to solve the dynamic and transient cou
作者: GET    時(shí)間: 2025-4-1 01:06

作者: Fibrillation    時(shí)間: 2025-4-1 04:20
V. Geetha Lekshmy,P. A. Vishnu,P. S. Harikrishnanpossible. This solution enables simultaneous power restoration in the presence of multiple faults with maximized restored loads and minimized power loss and power flow changes. The developed solution of power supply restoration is evaluated on the basis of a 53-bus test distribution feeder penetrate
作者: 通便    時(shí)間: 2025-4-1 07:28
R. M. Balajee,M. K. Jayanthi Kannan,V. Murali Mohanstem, there are many research interests in the new field. In this chapter, we explore some cyber-physical characteristics of Energy Internet mainly including the structure of cyber-physical energy internet, the relationship of the cyber resources and physical resources and the cyber security and saf
作者: Debility    時(shí)間: 2025-4-1 12:30

作者: 完成    時(shí)間: 2025-4-1 17:34





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
富裕县| 彰武县| 巴林右旗| 恩施市| 钟山县| 商城县| 白山市| 宁南县| 仪陇县| 连云港市| 静宁县| 惠安县| 九寨沟县| 全南县| 呼图壁县| 宣城市| 元谋县| 五常市| 喀什市| 凌海市| 利津县| 涪陵区| 宁晋县| 盘山县| 阿坝| 莱州市| 泰州市| 西峡县| 玛多县| 左权县| 吴桥县| 淮北市| 汝州市| 屯昌县| 志丹县| 扬中市| 泊头市| 石家庄市| 丽江市| 海淀区| 望江县|