標(biāo)題: Titlebook: New Trends in Information and Communications Technology Applications; 6th International Co Abbas M. Al-Bakry,Safaa O. Al-Mamory,George S. O [打印本頁(yè)] 作者: 太平間 時(shí)間: 2025-3-21 17:36
書(shū)目名稱New Trends in Information and Communications Technology Applications影響因子(影響力)
書(shū)目名稱New Trends in Information and Communications Technology Applications影響因子(影響力)學(xué)科排名
書(shū)目名稱New Trends in Information and Communications Technology Applications網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱New Trends in Information and Communications Technology Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱New Trends in Information and Communications Technology Applications被引頻次
書(shū)目名稱New Trends in Information and Communications Technology Applications被引頻次學(xué)科排名
書(shū)目名稱New Trends in Information and Communications Technology Applications年度引用
書(shū)目名稱New Trends in Information and Communications Technology Applications年度引用學(xué)科排名
書(shū)目名稱New Trends in Information and Communications Technology Applications讀者反饋
書(shū)目名稱New Trends in Information and Communications Technology Applications讀者反饋學(xué)科排名
作者: JECT 時(shí)間: 2025-3-21 23:39
Enhancing Service Classification for Network Slicing in 5G Using Machine Learning Algorithms network more flexible, but very complicated in term of management. A slice is a set of services that the network needs based on the user requirements. Moreover, each slice has a set of services called sub-slice, or one type of service. This research aims to improve the availability and scalability 作者: harbinger 時(shí)間: 2025-3-22 00:36
MesoNet3: A Deepfakes Facial Video Detection Network Based on Object Behavior Analysise has become closer to the truth. Many researchers are based on discovering deep fakes that were created by traditional methods. These methods produce often generate artifacts that may be subtle to humans. This paper can detect deepfakes that are perfectly created. Through the use of the new MesoNet作者: Outshine 時(shí)間: 2025-3-22 08:08
Computer Vision Techniques for Hand Gesture Recognition: Surveynd interpret hand gestures. In addition to their use in many medical applications, communication between the hearing impaired, device automation, and robot control, hand gestures are of particular importance as a form of nonverbal communication. So far, hand gesture recognition has taken two approac作者: 金桌活畫(huà)面 時(shí)間: 2025-3-22 11:27
A Comprehensive Review in Using the Advances of Deep Learning in the 3D Race Classificationhe advantages of Deep Learning techniques in developing face recognition systems implemented on both 2D and 3D face datasets. However, the usefulness of Deep learning in analyzing facial features of 3D faces gender, and ethnicity are examined in literature with only three main perspectives: data rep作者: 極端的正確性 時(shí)間: 2025-3-22 16:22 作者: single 時(shí)間: 2025-3-22 20:05 作者: Gorilla 時(shí)間: 2025-3-22 22:53
Food Recommendation System Based on Data Clustering Techniques and User Nutrition Records. Some are natural, others are artificial, and they are reengineered and emerging every day, so choosing healthy food is becoming a more complex task. The food recommendation system (FRS) is a response to this need. It is used to give a recommended list of appropriate meal content that suits every c作者: 創(chuàng)新 時(shí)間: 2025-3-23 04:22 作者: tympanometry 時(shí)間: 2025-3-23 07:01
Implementation of Network Slicing for Multi-controller Environment Based on FlowVisory capable of covering the diversity that occurred. Virtual Software Defined Network (vSDN) is one of the most important technologies in the field of networking. It is concerned with optimizing the use of network infrastructure by creating virtual networks (network slicing) within the same physical n作者: encomiast 時(shí)間: 2025-3-23 10:58
A Novel Ensemble Method for Network-Based Anomaly Intrusion Detection Systemhniques are promising machine learning methods in anomaly detection that aim to produce multiple models and combine their output in a specific manner to obtain a perfect attack detection. However, it’s still difficult to choose an appropriate ensemble method for a particular dataset. This research i作者: defenses 時(shí)間: 2025-3-23 15:22 作者: Deduct 時(shí)間: 2025-3-23 18:54
Use Multichannel EEG-Based Biometrics Authentication Signal in Real Time Using Neural Network a biometric method for user authentication that is much safer. The current study shows a biometric security framework that is based on EEG. In particular, the plan is to lower the noise level with ensemble averaging and a band pass filter, pull out frequency features with fast Fourier transform (FF作者: 不遵守 時(shí)間: 2025-3-24 01:55 作者: 按時(shí)間順序 時(shí)間: 2025-3-24 04:28 作者: OFF 時(shí)間: 2025-3-24 09:21
ss für jedes Chemie- bzw. Chemieingenieurstudium.Includes su.Die St?chiometrie handelt von den Mengenverh?ltnissen bei einer chemischen Reaktion und erm?glicht die quantitative Berechnung der umgesetzten Massen oder Volumina der Reaktionspartner. Fester Bestandteil jedes Studiums der Chemie, des Che作者: abreast 時(shí)間: 2025-3-24 12:00
Nidhal K. El Abbadi,Ali Hussein Abdulkhaleq,Safaa Alwan Al Hassaniss für jedes Chemie- bzw. Chemieingenieurstudium.Includes su.Die St?chiometrie handelt von den Mengenverh?ltnissen bei einer chemischen Reaktion und erm?glicht die quantitative Berechnung der umgesetzten Massen oder Volumina der Reaktionspartner. Fester Bestandteil jedes Studiums der Chemie, des Che作者: iodides 時(shí)間: 2025-3-24 17:29
Noor Abdalkarem Mohammedali,Triantafyllos Kanakis,Ali Al-Sherbaz,Michael Opoku Agyeman,Saad Talib Hass für jedes Chemie- bzw. Chemieingenieurstudium.Includes su.Die St?chiometrie handelt von den Mengenverh?ltnissen bei einer chemischen Reaktion und erm?glicht die quantitative Berechnung der umgesetzten Massen oder Volumina der Reaktionspartner. Fester Bestandteil jedes Studiums der Chemie, des Che作者: 語(yǔ)源學(xué) 時(shí)間: 2025-3-24 19:33
Qasim Jaleel,Israa H. Aliss für jedes Chemie- bzw. Chemieingenieurstudium.Includes su.Die St?chiometrie handelt von den Mengenverh?ltnissen bei einer chemischen Reaktion und erm?glicht die quantitative Berechnung der umgesetzten Massen oder Volumina der Reaktionspartner. Fester Bestandteil jedes Studiums der Chemie, des Che作者: 非秘密 時(shí)間: 2025-3-25 01:04
Noor Fadel,Emad I. Abdul Kareemhen Dieselbrennverfahrens, welches die Verwendung eines Drei-Wege-Katalysators erm?glicht, weiter. Dieser stellt eine Vereinfachung der dieselmotorischen Abgasnachbehandlung dar und kann die kostenintensiven und aufwendigen Speicherkatalysator- oder SCR-Systeme ersetzen. Der Autor bewertet das st?ch作者: Myofibrils 時(shí)間: 2025-3-25 04:17
Noor H. Reda,Hawraa Abbashen Dieselbrennverfahrens, welches die Verwendung eines Drei-Wege-Katalysators erm?glicht, weiter. Dieser stellt eine Vereinfachung der dieselmotorischen Abgasnachbehandlung dar und kann die kostenintensiven und aufwendigen Speicherkatalysator- oder SCR-Systeme ersetzen. Der Autor bewertet das st?ch作者: LAVA 時(shí)間: 2025-3-25 09:38 作者: 貨物 時(shí)間: 2025-3-25 14:20
ach ihm benannte, von ihm selbst ?L’asphyxie locale symmétrique des extremités“ genannte Krankheitsbild beschrieben. Obwohl einschl?gige Einzelbeobachtungen bereits durch zwei Jahrhunderte vorher gemacht worden waren, blieb es ihm vorbehalten, das Wesentliche aus allen bisher gesehenen Bildern herau作者: Guileless 時(shí)間: 2025-3-25 19:35
Estimating Blur Parameters to Reconstruct the Motion Blurred Imagese peak signal-to-noise ratio (PSNR) of restored images, are compared with competent recent schemes. The experimental results of the suggested algorithm show good accuracy, robustness, and time efficiency for blur detection, estimation of the PSF parameters, and reconstruction of the image when compa作者: 冷淡周邊 時(shí)間: 2025-3-25 22:50
Enhancing Service Classification for Network Slicing in 5G Using Machine Learning Algorithmsdeliver flexibility in the 5G network by creating multiple slices on top of the physical network. When the implementation of the prototype is completed, traffic generated tool was used to send traffic over the slices. After data collection, we classified different services using machine learning alg作者: 看法等 時(shí)間: 2025-3-26 02:49
Computer Vision Techniques for Hand Gesture Recognition: Survey computer vision approach. The survey was carried out as follows: the first part dealt with research based on artificial intelligence techniques for hand gesture recognition, and the second part focused on research that used artificial neural networks and deep learning for hand gesture recognition.作者: Amylase 時(shí)間: 2025-3-26 06:30 作者: 依法逮捕 時(shí)間: 2025-3-26 09:36
Food Recommendation System Based on Data Clustering Techniques and User Nutrition Recordsimilarity value. The use of Euclidean Distance and Manhattan Distance produced a similar recommended list according to user preferences depending on food nutrition. Also, using Cosine Similarity and Correlation will obtain a slight difference between its results and the first two algorithms. It’s cl作者: vasospasm 時(shí)間: 2025-3-26 13:18
EEG Data Compression Using Tap9/7 Wavelet Transform and Double Shift-Codingose obtained using the Discrete Wavelet Transform (DCT). The experimental tests are carried out with the CHB-MIT dataset, and the best compression ratio (CR?=?7) is accomplished with an error level that is close to zero (MSE?=?0.044).作者: 收養(yǎng) 時(shí)間: 2025-3-26 19:26 作者: Lacerate 時(shí)間: 2025-3-26 21:24 作者: 平靜生活 時(shí)間: 2025-3-27 04:43
Machine Learning-Based DDoS Attack Detection in Software-Defined Networking Using the CICIDS2017 dataset, the ML models were trained and tested. The feature sets for classification were determined using a proposed features selection algorithm, evaluation via multiple tests, and the filtered features are the most applicable and relevant in an SDN environment. The performanc作者: MOAT 時(shí)間: 2025-3-27 05:40 作者: 可以任性 時(shí)間: 2025-3-27 12:24
rl?utert. Ein wesentliches, didaktisches Ziel dieses Buches liegt darin, dass anhand von übersichtlich gestalteten Beispielen der behandelte Zusammenhang vom Leser verstanden werden kann..978-3-540-36160-2Series ISSN 0937-7433 Series E-ISSN 2512-5214 作者: exceed 時(shí)間: 2025-3-27 13:44
Nidhal K. El Abbadi,Ali Hussein Abdulkhaleq,Safaa Alwan Al Hassanirl?utert. Ein wesentliches, didaktisches Ziel dieses Buches liegt darin, dass anhand von übersichtlich gestalteten Beispielen der behandelte Zusammenhang vom Leser verstanden werden kann..978-3-540-36160-2Series ISSN 0937-7433 Series E-ISSN 2512-5214 作者: fiction 時(shí)間: 2025-3-27 21:06 作者: 使堅(jiān)硬 時(shí)間: 2025-3-27 22:07
Qasim Jaleel,Israa H. Alirl?utert. Ein wesentliches, didaktisches Ziel dieses Buches liegt darin, dass anhand von übersichtlich gestalteten Beispielen der behandelte Zusammenhang vom Leser verstanden werden kann..978-3-540-36160-2Series ISSN 0937-7433 Series E-ISSN 2512-5214 作者: Fabric 時(shí)間: 2025-3-28 04:29 作者: CHART 時(shí)間: 2025-3-28 09:53 作者: 表否定 時(shí)間: 2025-3-28 11:23 作者: 吞下 時(shí)間: 2025-3-28 17:29
er fehlerhaften Innervation, die Gangr?n durch die hieraus resultierende ?Abwesenheit des Blutes oder die Anwesenheit eines zur Ern?hrung ungeeigneten Blutes“. Alle durch organische Ver?nderungen der Gef??e und des Herzens hervorgerufenen ?hnlichen Bilder trennt er grunds?tzlich ab. Auch der Begriff作者: SLUMP 時(shí)間: 2025-3-28 20:09
Ali H. Al-Shakarchi,Nabeel H. Al-A’araji,Safaa O. Al-mamory作者: Ballad 時(shí)間: 2025-3-28 23:36
Nadhim Azeez Sayel,Salah Albermany,Bayan Mahdi Sabbar作者: 啞劇 時(shí)間: 2025-3-29 03:33
New Trends in Information and Communications Technology Applications6th International Co作者: Nmda-Receptor 時(shí)間: 2025-3-29 09:57 作者: 預(yù)兆好 時(shí)間: 2025-3-29 13:29
1865-0929 y Applications, NTICT 2022, held in Baghdad, Iraq, during November 16–17, 2022.?.The 14 full papers? included in this book were carefully reviewed and selected from 53 submissions. They were organized in topical sections as follows: computing methodologies; information systems; network; security and作者: Indent 時(shí)間: 2025-3-29 16:27
Conference proceedings 2023ions, NTICT 2022, held in Baghdad, Iraq, during November 16–17, 2022.?.The 14 full papers? included in this book were carefully reviewed and selected from 53 submissions. They were organized in topical sections as follows: computing methodologies; information systems; network; security and privacy..作者: metropolitan 時(shí)間: 2025-3-29 21:19 作者: Vasodilation 時(shí)間: 2025-3-30 02:35