派博傳思國際中心

標題: Titlebook: Second International Conference on Networks and Advances in Computational Technologies; NetACT 19 Maurizio Palesi,Ljiljana Trajkovic,John J [打印本頁]

作者: 黑暗社會    時間: 2025-3-21 20:00
書目名稱Second International Conference on Networks and Advances in Computational Technologies影響因子(影響力)




書目名稱Second International Conference on Networks and Advances in Computational Technologies影響因子(影響力)學科排名




書目名稱Second International Conference on Networks and Advances in Computational Technologies網(wǎng)絡(luò)公開度




書目名稱Second International Conference on Networks and Advances in Computational Technologies網(wǎng)絡(luò)公開度學科排名




書目名稱Second International Conference on Networks and Advances in Computational Technologies被引頻次




書目名稱Second International Conference on Networks and Advances in Computational Technologies被引頻次學科排名




書目名稱Second International Conference on Networks and Advances in Computational Technologies年度引用




書目名稱Second International Conference on Networks and Advances in Computational Technologies年度引用學科排名




書目名稱Second International Conference on Networks and Advances in Computational Technologies讀者反饋




書目名稱Second International Conference on Networks and Advances in Computational Technologies讀者反饋學科排名





作者: ovation    時間: 2025-3-21 21:25
Ajeesh Ramanujan,Blesson Andrews Vargheseoung colleagues an opp- tunity to present their work and new perspectives. These fresh perspectives enhanced our experienced of the conference and complemented 978-3-540-89673-9978-3-540-89674-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: BROW    時間: 2025-3-22 03:18
2569-7072 in Computational Technologies (NetACT19);.Includes research in Computer Application, Image Processing,Network Security, Hardware & Network Systems and Machine Learning;.Provides perspectives from industry, academia and government..978-3-030-49502-2978-3-030-49500-8Series ISSN 2569-7072 Series E-ISSN 2569-7080
作者: LAVA    時間: 2025-3-22 08:33

作者: 善辯    時間: 2025-3-22 10:31
A Framework for Test Coverage of Safety and Mission Critical Software, a test case. Coverage assessment of launch vehicle flight software in the integrated system test is a difficult task as code instrumentation affects the real-time performance of the system and the integrated tests fail to meet its objectives. Hence the software with instrumentation is executed in a
作者: Ingredient    時間: 2025-3-22 16:42
Internet Censorship Based on Bayes Learning Model,malicious content manually takes time within which irreversible damage would have occurred. This paper proposes a censorware based on machine learning. It uses a modified version of the Naive Bayes algorithm to analyze captured packets and censor it. It is designed as a continuous learning tool to a
作者: ABHOR    時間: 2025-3-22 18:10

作者: 褻瀆    時間: 2025-3-22 23:19

作者: TIGER    時間: 2025-3-23 02:23
Multichannel Probabilistic Framework for Prenatal Diagnosis of Fetal Arrhythmia Using ECG,he variations in the heart can be detected by using feature vector that is extracted from the signal and a classification method is also used to classify the signal as abnormal and normal. This work shows a result of accuracy about 94.11% and sensitivity of 88.88%.
作者: 同時發(fā)生    時間: 2025-3-23 09:09
Reversible Data Hiding and Coupled Chaotic Logistic Map Using Image Encryption, used. By using information in the binary location map, the error position information is inserted to the encrypted image by most significant bit (MSB) substitution method. Chaotic generator used in this work for encryption process is two chaotic logistic map, which is used to produce pseudo-random
作者: 吞沒    時間: 2025-3-23 12:51

作者: machination    時間: 2025-3-23 16:21
A Survey on VANETs Routing Protocols in Urban Scenarios,hic routing is to select nodes that are nearer to the destination which can lead to increase in the probability of link breakage. Hence fuzzy logic based geographic routing protocol is most appropriate because it uses artificial intelligence in selecting the route. This paper focuses on the geograph
作者: 全等    時間: 2025-3-23 19:46

作者: capillaries    時間: 2025-3-23 22:46

作者: 悲痛    時間: 2025-3-24 03:40
A. Thahira,S. Sabithas, called practical reasoning rules, which are used to define the reflective capabilities of agents and provide a mechanism for goal revision. The combination of the theoretical and practical perspective contributes, we hope, to filling the gap between theory and practice.
作者: 勤勞    時間: 2025-3-24 08:18

作者: Insul島    時間: 2025-3-24 12:09

作者: nurture    時間: 2025-3-24 18:17

作者: 功多汁水    時間: 2025-3-24 22:06

作者: 賭博    時間: 2025-3-25 02:25

作者: 含沙射影    時間: 2025-3-25 05:31
Vinitha M. Rajan,Ajeesh Ramanujanind mappings each other. In our framework, a user plays a mutual mind reading game with an agent and they gradually learn to read the other’s mind through the game. Eventually we fully implement our framework and make experiments to investigate its effectiveness.
作者: SNEER    時間: 2025-3-25 08:08

作者: ONYM    時間: 2025-3-25 11:59
Amrithasree Haridas,L. Preethihanism for the transportation companies to form coalition and negotiate on the prices based on their own utilities and profit concerns. In this paper we propose a mechanism to solve the best tourist track problem. The mechanism includes a heuristic shortest path finding algorithm for a track graph a
作者: notion    時間: 2025-3-25 19:49

作者: Locale    時間: 2025-3-25 20:23
K. Surya,K. K. Abdul Majeede game foster vividness and memory retention as well as a better understanding of both symptoms and of the need to manage time during a heart attack event. Also, results provide insight into areas where emotive pedagogical agents help and hinder user performance. Finally, we conclude with next steps
作者: glisten    時間: 2025-3-26 02:47
Jeni Francis,Ancy S. Anselamulti-agent platform and distributed computational intelligence. Knowbots consist of self-learning artificial brains connected to input sensors and output actuators of which speech recognition and synthesis are used to connect to networks of people. They have access to other software agents and compu
作者: 水土    時間: 2025-3-26 04:49

作者: Constrain    時間: 2025-3-26 09:13

作者: impale    時間: 2025-3-26 13:52

作者: amenity    時間: 2025-3-26 19:03
Susan George,Hiran H. Lathabai,Thara Prabhakaran,Manoj Changatirement for the network to adapt to user behaviour and our control architecture demonstrates a mechanism for achieving the reconfigurations. The network scenario is considered a closed system, where the network operator has full control over the network elements, such as the routing tables and switc
作者: dragon    時間: 2025-3-26 23:00

作者: 存在主義    時間: 2025-3-27 01:21

作者: 表示向下    時間: 2025-3-27 06:58
2569-7072 arch in Computer Application, Image Processing, Network Secu.This book presents the proceedings of the 2nd?International Conference on Networks and Advances in Computational Technologies (NetACT19) which took place on July 23-25, 2019 at Mar Baselios College of Engineering and Technology in Thiruvan
作者: Nebulous    時間: 2025-3-27 11:02
Malware Attacks: A Survey on Mitigation Measures,ifferent malware variants, ransomware became very popular as it locks up the victim’s system and demands ransom payment for regaining access. The growth of malware occurs exponentially, but the mitigation strategies are not very successful as there are still stories of attacks in the world. To discr
作者: 門窗的側(cè)柱    時間: 2025-3-27 17:16
A Survey on Online Review Spammer Group Detection,re written by people who are hired by an organization either to promote their product or to demote their competitors’ product. Nowadays, these fake reviewers work in groups to magnify their activities and to gain maximum profit. These review spammer groups occur more frequently and are even more har
作者: FLACK    時間: 2025-3-27 20:29

作者: 費解    時間: 2025-3-27 23:32

作者: etidronate    時間: 2025-3-28 05:29

作者: 寬容    時間: 2025-3-28 07:45

作者: 里程碑    時間: 2025-3-28 10:57

作者: 禁令    時間: 2025-3-28 16:51

作者: 思鄉(xiāng)病    時間: 2025-3-28 22:28
Architecture of a Semantic WordCloud Visualization, user-friendly are widely used in various real-life applications irrespective of the domain. The key design principle behind wordclouds is to project the most prominent keywords from a given raw text or document on a visual canvas. The prominence of each keyword is proportionately depicted using the
作者: 極微小    時間: 2025-3-29 00:04

作者: 盲信者    時間: 2025-3-29 04:01
A Survey on Different Search Techniques Over Encrypted Data in Cloud,ivacy, everything should be encrypted before outsourcing into the cloud and only authorized users can retrieve their data. But this process is complicated in the case of encrypted data, because traditional data storage system works only on plain data. Therefore dedicated information retrieval system
作者: glowing    時間: 2025-3-29 10:08
Modeling and Verification of Launch Vehicle Onboard Software Using SPIN Model Checker,e is essential to ensure complete success of missions. In this work, a part of the onboard software, the scheduler, is represented in the SPIN model checker. Different tasks in the software are modeled with minimal data transfer and error checking. Assertion statements are inserted in the model to c
作者: hazard    時間: 2025-3-29 13:39

作者: COMMA    時間: 2025-3-29 16:04

作者: refine    時間: 2025-3-29 21:57
Reversible Data Hiding and Coupled Chaotic Logistic Map Using Image Encryption,cover image and reconstruction of the same cover image after extracting the hidden information without any alteration is recognized as reversible data hiding (RDH) technology. Reversible data hiding is mainly found application in military and medical field applications. Many such types of schemes ar
作者: AORTA    時間: 2025-3-30 02:24

作者: Vital-Signs    時間: 2025-3-30 04:14

作者: STELL    時間: 2025-3-30 11:36
Towards Stock Recommendation and Portfolio Management Systems Using Network Analysis, data mining of stock market based on complex networks is done as a preliminary for development of stock recommendation and/or portfolio management systems. Lobbying power of players is identified based on unweighted and weighted stock market networks that are created from United States stock data d
作者: 歌曲    時間: 2025-3-30 13:27

作者: Generator    時間: 2025-3-30 19:55

作者: 不要嚴酷    時間: 2025-3-30 23:32
A Survey on Different Search Techniques Over Encrypted Data in Cloud,s were developed to handle the encrypted data. Different search methods over cloud data have been proposed for efficient information retrieval. The main objective of this paper is to provide an overview of some of the existing searching techniques on the encrypted data and make a comparative study.
作者: LINES    時間: 2025-3-31 01:51
Pre-Silicon Validation of 32-Bit Indigenous Processor for Space Applications,g task for the microprocessor design team. Zero tolerance of bugs is a pre-requisite for the processor, given the unforgiving nature of space applications. This paper describes the exhaustive validations carried out for evaluating the design of the 32-bit processor in the designer lab.
作者: 猜忌    時間: 2025-3-31 06:47

作者: 揉雜    時間: 2025-3-31 10:50

作者: 手工藝品    時間: 2025-3-31 15:38

作者: 單純    時間: 2025-3-31 18:17

作者: 取消    時間: 2025-4-1 01:10
Network Approach for Inventor Collaboration Recommendation System,ictive approach, a preliminary design of an inventor collaboration recommendation system is proposed. As a case study, patent data from ‘Wireless Power Transmission’ is analysed and various implications are discussed.
作者: 愛國者    時間: 2025-4-1 02:19
Architecture of a Semantic WordCloud Visualization,n the canvas by maintaining the appropriate relationships among them. In this article we provide a tutorial on the architecture and design components to generate such a system. Such an overview can be really helpful for aspiring researchers in the prerequisite analysis of semantic wordclouds.
作者: landmark    時間: 2025-4-1 06:46

作者: 周興旺    時間: 2025-4-1 11:20





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
定安县| 固原市| 沈阳市| 南阳市| 综艺| 金湖县| 靖边县| 平陆县| 喀喇沁旗| 延吉市| 灵山县| 中山市| 丹阳市| 宝应县| 新源县| 衡山县| 淮安市| 收藏| 汨罗市| 枣强县| 长葛市| 河曲县| 高州市| 任丘市| 佛学| 金湖县| 隆回县| 宽城| 茌平县| 台南县| 泊头市| 体育| 淮南市| 平南县| 彝良县| 手机| 靖边县| 乐至县| 罗田县| 泰宁县| 公主岭市|