標題: Titlebook: Machine Intelligence for Research and Innovations; Proceedings of MAiTR Om Prakash Verma,Lipo Wang,Anupam Yadav Conference proceedings 2024 [打印本頁] 作者: FETUS 時間: 2025-3-21 18:30
書目名稱Machine Intelligence for Research and Innovations影響因子(影響力)
書目名稱Machine Intelligence for Research and Innovations影響因子(影響力)學(xué)科排名
書目名稱Machine Intelligence for Research and Innovations網(wǎng)絡(luò)公開度
書目名稱Machine Intelligence for Research and Innovations網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Machine Intelligence for Research and Innovations被引頻次
書目名稱Machine Intelligence for Research and Innovations被引頻次學(xué)科排名
書目名稱Machine Intelligence for Research and Innovations年度引用
書目名稱Machine Intelligence for Research and Innovations年度引用學(xué)科排名
書目名稱Machine Intelligence for Research and Innovations讀者反饋
書目名稱Machine Intelligence for Research and Innovations讀者反饋學(xué)科排名
作者: 偽證 時間: 2025-3-21 20:57 作者: THE 時間: 2025-3-22 03:40 作者: 假裝是我 時間: 2025-3-22 08:17
Akash Nag,Atri Bandyopadhyay,Tathagata Nayak,Subhanjana Banerjee,Babita Panda,Sanhita Mishraen. Aus dem schier uferlosen Stoff wie aus der Viel- zahl mathematischer Methoden war eine Auswahl zu treffen, die m?g- lichst geradlinig zu den Gegenst?nden und Problemen unserer heutigen Epoche hinführt. Diese Auswahl war gelenkt von dem Grundgedanken, da? die Atomphysik, im weitesten Sinne dieses作者: placebo 時間: 2025-3-22 10:31
Shivam Krishana,Monika Khandelwal,Ranjeet Kumar Rout,Saiyed Umert nicht notwendig, da? er diese Eigenschaft auch bei der Begründung der relativistischen Quantenmechanik beh?lt. In der Relativit?tstheorie bildet ja die Zeit mit den drei Raumkoordinaten zusammen einen Vierervektor . (., ., .,..) und ebenso der Impuls eines Massenpunktes mit dessen Energie zusammen作者: 概觀 時間: 2025-3-22 13:13 作者: 偏狂癥 時間: 2025-3-22 21:02 作者: 榨取 時間: 2025-3-22 23:44 作者: Gene408 時間: 2025-3-23 05:07 作者: PANG 時間: 2025-3-23 09:12
,A Simple Algorithm to?Secure Data Dissemination in?Wireless Sensor Network,or node to the sink node, unauthorized individuals attempt to access it, breaching confidentiality. The first step in enhancing the security of data transmission in a wireless sensor network (WSN) is figuring out the best method for encrypting data as it moves from the sensors to the central node. I作者: 拖債 時間: 2025-3-23 11:50
,Analysis of?Pollard Rho Attacks Over ECDLP,like RSA. ECC has attracted a lot of interest lately as it offers higher security with reduced key sizes. Security of ECC is based on a hard problem known as Elliptic Curve Discrete Logarithm Problem (ECDLP). Computation of private scalar integer from public key is computationally difficult. Solving作者: 抗體 時間: 2025-3-23 15:53 作者: 主動脈 時間: 2025-3-23 21:29
Application of Varieties of Learning Rules in Intuitionistic Fuzzy Artificial Neural Network,ometric and weighted averaging pairs, where one component is used to induce an ordering over the second component, which are intuitionistic fuzzy values, and then aggregated. The decision-making problem is addressed by the proposed method of a novel ANN, where the inputs take the form of intuitionis作者: 蚊子 時間: 2025-3-23 23:06 作者: pantomime 時間: 2025-3-24 03:10 作者: nurture 時間: 2025-3-24 07:11 作者: 仲裁者 時間: 2025-3-24 11:36 作者: 推遲 時間: 2025-3-24 17:29
Harnessing the Power of Machine Learning Algorithms for Landslide Susceptibility Prediction, limited prediction capability. Hence, computational methods, specifically machine learning, are being employed to enhance accuracy. Our study aims to predict landslide susceptibility in the Kashmir Himalayas, specifically Muzaffarabad and the Azad Kashmir region. Initially, we established eleven di作者: JUST 時間: 2025-3-24 22:36 作者: 襲擊 時間: 2025-3-25 02:11 作者: 土坯 時間: 2025-3-25 05:49 作者: CLAMP 時間: 2025-3-25 11:31
Secure and Energy Efficient Routing in VANETs Using Nature Inspired Hybrid Optimization,c nature, VANETs are prone to multiple security attacks that can be mitigated using lightweight security solutions based on trust models. There is a trade-off between accuracy and delay in making a decision via trust based models. In a scenario, where the behavior of the node can be estimated by its作者: 思考才皺眉 時間: 2025-3-25 11:42
,Performance Evaluation of?Machine Learning Models for?Intrusion Detection in?Wireless Sensor NetworoS) attacks. This research paper assesses the performance of three machine learning models, namely KNN, Logistic Regression, and Decision Tree (DT), using the WSN DS dataset for WSN intrusion detection. The dataset featured DoS attacks of several types: scheduling, blackhole, flooding, and gray hole作者: VALID 時間: 2025-3-25 16:56 作者: 赦免 時間: 2025-3-25 20:51 作者: 喪失 時間: 2025-3-26 00:16 作者: Parley 時間: 2025-3-26 07:38 作者: creatine-kinase 時間: 2025-3-26 09:31 作者: 內(nèi)部 時間: 2025-3-26 15:25
Application of Varieties of Learning Rules in Intuitionistic Fuzzy Artificial Neural Network,e new method of intuitionistic fuzzy ANN, which is a groundbreaking work in the field of intuitionistic fuzzy ANN, proves to be more effective than the previous methods because it eliminates the unimportant decision alternatives from the system of available decision alternatives for inputs such as intuitionistic fuzzy matrices.作者: DEBT 時間: 2025-3-26 20:10
Directional Edge Coding for Facial Expression Recognition System,mpass Mask and Kirsch Compass Mask were two makes used for edge detection considered for the extraction of edge features. In addition, the DEC-FERS lessens the redundancy by removing redundant pixels those won’t have any contribution for center pixel.作者: 裂縫 時間: 2025-3-26 21:57 作者: 杠桿 時間: 2025-3-27 04:06 作者: 橫截,橫斷 時間: 2025-3-27 05:46 作者: 和平主義 時間: 2025-3-27 11:34
,Enhancing Performance of?Noise-Robust Gujarati Language ASR Utilizing the?Hybrid Acoustic Model and compared to baseline MFCC with greedy decoding. This method exhibits potential for enhancing ASR systems, making them more reliable and accurate for real-world applications necessitating precise speech-to-text conversion.作者: 要控制 時間: 2025-3-27 15:48 作者: cluster 時間: 2025-3-27 19:20
Harnessing the Power of Machine Learning Algorithms for Landslide Susceptibility Prediction,le and not susceptible. Evaluating classification performance, we achieved test accuracies ranging from 69.30 to 78.71%. The K-Nearest Neighbors (KNN) algorithm outperformed other models, yielding superior accuracy with an optimal k-value for the chosen dataset.作者: ascend 時間: 2025-3-27 22:16
,A Simple Algorithm to?Secure Data Dissemination in?Wireless Sensor Network,ransmission in a wireless sensor network (WSN) is figuring out the best method for encrypting data as it moves from the sensors to the central node. In order to move encrypted data from different sensor nodes to sink nodes efficiently in wireless sensor networks, this paper introduces a simple data encryption technique.作者: 懸掛 時間: 2025-3-28 04:02
Character-Level Bidirectional Sign Language Translation Using Machine Learning Algorithms, that uses various machine learning algorithms, including Support Vector Machines (SVM), Random Forest, Logistic Regression (LR), and K-Nearest Neighbors (KNN), as well as deep learning algorithm—Convolutional Neural Networks (CNN), to provide a solution to this communication issue.作者: BRIEF 時間: 2025-3-28 06:48
2367-3370 al Institute of Technology Jalandhar.Serves as a reference f.The book is a collection of high-quality peer-reviewed research papers presented in the First International Conference on?MAchine inTelligence for Research & Innovations (MAiTRI 2023 Summit), held at Dr. B. R. Ambedkar National Institute o作者: Urgency 時間: 2025-3-28 12:32 作者: 盲信者 時間: 2025-3-28 17:24
Conference proceedings 2024h as machine learning, deep learning, quantum machine learning, real-time computer vision, pattern recognition, natural language processing, statistical modelling, autonomous vehicles, human interfaces, computational intelligence, and robotics..作者: freight 時間: 2025-3-28 19:29
978-981-99-8128-1The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: 貧窮地活 時間: 2025-3-29 02:57 作者: 合群 時間: 2025-3-29 05:38 作者: heirloom 時間: 2025-3-29 08:24 作者: Isolate 時間: 2025-3-29 14:06 作者: chondromalacia 時間: 2025-3-29 19:28
,Analysis of?Pollard Rho Attacks Over ECDLP,tion techniques and iteration function is discussed. Experimental analysis of the Floyd and Brent cycle over different prime curves is presented. Further, proposed techniques for paralleled Pollard method using distinguished point property are discussed using CPU, Graphics Processing Unit (GPU), and作者: 暫時過來 時間: 2025-3-29 21:37 作者: 終點 時間: 2025-3-30 02:34
Distinguishing the Symptoms of Depression and Associated Symptoms by Using Machine Learning Approacder to predict their accuracy. This would go a long way in diagnosing and treating patients for much healthier well-being. Every life is meaningful. There is no shame in admitting someone suffers from mental health conditions and should immediately consult an expert to overcome their problems.作者: 不能逃避 時間: 2025-3-30 06:13
Rule-Based Learner Competencies Predictor System,d classifier—a multiple-layer perceptron neural network, considering cluster categories as labels. The proposed model assists learners and instructors in identifying the learners’ learning capabilities and priorities, resulting in improved learner performances.作者: cocoon 時間: 2025-3-30 11:19
Exploring the Relationship Between Digital Engagement and Cybersecurity Practices Among College StuThese practices encompass the pivotal domains of password management, the adoption of antivirus software, and the cultivation of vigilant awareness towards phishing threats. The core of the analysis lies in employing regression analysis in Excel to unveil a trove of findings. The exploration of coll作者: 憲法沒有 時間: 2025-3-30 14:51
,Performance Evaluation of?Machine Learning Models for?Intrusion Detection in?Wireless Sensor Networc regression and kNN models yielded lower values of 0.98, 0.96, 0.97, and 0.87, 0.85, 0.86, respectively. These findings have significant implications for practitioners and researchers working on securing WSNs against DoS attacks and highlight the importance of using machine learning-based IDSs to d作者: 600 時間: 2025-3-30 18:39 作者: Blatant 時間: 2025-3-31 00:24 作者: GREEN 時間: 2025-3-31 04:31
Veeramani Sonai,Indira Bharathi Andererseits ist eine solche M?glichkeit aber auch nicht a priori auszuschlie?en; die Lorentz-Invarianz der Theorie kann durchaus bestehen, ohne in jeder Gleichung sofort deutlich zum Ausdruck zu kommen, und eine entscheidende Bedeutung solcher Gleichungen, welche die Lorentz-Invarianz nicht aufwei作者: NIB 時間: 2025-3-31 06:22 作者: 疼死我了 時間: 2025-3-31 09:19
Akash Nag,Atri Bandyopadhyay,Tathagata Nayak,Subhanjana Banerjee,Babita Panda,Sanhita Mishraerhalb des strengen Rahmens der Max- wellschen Theorie liegen, ohne die aber ein tieferes physikalisches Ver- st?ndnis doch nicht m?glich ist. Die Grenzen, welche klassischen und halb klassischen Betrachtungen dieser Art notwendig gesetzt sind, werden natürlich überall angedeutet; hier wird der korr作者: filial 時間: 2025-3-31 15:51
Shivam Krishana,Monika Khandelwal,Ranjeet Kumar Rout,Saiyed Umere solche M?glichkeit aber auch nicht a priori auszuschlie?en; die Lorentz–Invarianz der Theorie kann durchaus bestehen, ohne in jeder Gleichung sofort deutlich zum Ausdruck zu kommen, und eine entscheidende Bedeutung solcher Gleichungen, welche die Lorentz–Invarianz nicht aufweisen, kann durch die A作者: 石墨 時間: 2025-3-31 18:18