派博傳思國(guó)際中心

標(biāo)題: Titlebook: Applied Soft Computing and Communication Networks; Proceedings of ACN 2 Sabu M. Thampi,Jaime Lloret Mauri,Axel Sikora Conference proceeding [打印本頁(yè)]

作者: HBA1C    時(shí)間: 2025-3-21 17:45
書目名稱Applied Soft Computing and Communication Networks影響因子(影響力)




書目名稱Applied Soft Computing and Communication Networks影響因子(影響力)學(xué)科排名




書目名稱Applied Soft Computing and Communication Networks網(wǎng)絡(luò)公開度




書目名稱Applied Soft Computing and Communication Networks網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Applied Soft Computing and Communication Networks被引頻次




書目名稱Applied Soft Computing and Communication Networks被引頻次學(xué)科排名




書目名稱Applied Soft Computing and Communication Networks年度引用




書目名稱Applied Soft Computing and Communication Networks年度引用學(xué)科排名




書目名稱Applied Soft Computing and Communication Networks讀者反饋




書目名稱Applied Soft Computing and Communication Networks讀者反饋學(xué)科排名





作者: irradicable    時(shí)間: 2025-3-21 22:45

作者: 原來(lái)    時(shí)間: 2025-3-22 03:34

作者: SPER    時(shí)間: 2025-3-22 06:58
EEG-Based Emotion Recognition and Its Interface with Augmented Reality,emotion detection using brain signals and interfacing the data with the virtual world which gives a secured view of the information. The most notable feature of this work is the creation of a readily accessible and easy-to-use App with augmented reality and uploading the information to the App enhan
作者: Jocose    時(shí)間: 2025-3-22 10:24
Profile Verification Using Blockchain,mutable documentation. Across the globe, a huge number of students graduate every year from universities. Their work, both curricular and extracurricular, needs secure storage and verification so that it remains protected and the students can highlight it anywhere without further rounds of verificat
作者: FILTH    時(shí)間: 2025-3-22 14:22

作者: 昆蟲    時(shí)間: 2025-3-22 18:00

作者: effrontery    時(shí)間: 2025-3-22 22:39

作者: 千篇一律    時(shí)間: 2025-3-23 01:25

作者: 低位的人或事    時(shí)間: 2025-3-23 09:29

作者: 政府    時(shí)間: 2025-3-23 12:44

作者: Indict    時(shí)間: 2025-3-23 15:50
Localization in Wireless Sensor Networks Using a Mobile Anchor and Subordinate Nodes,ied nodes in a WSN using anchor nodes (nodes whose location is known). Localization, along with the mobility of nodes in the network, makes this field more potent for practical purposes. Therefore, in this paper, we propose an algorithm for localization in WSNs using a mobile anchor and subordinate
作者: ALLEY    時(shí)間: 2025-3-23 21:23
Smart Cities and Spectrum Vulnerabilities in Long-Range Unlicensed Communication Bands: A Review,cities are on the rise across the globe, it is expected that the unlicensed spectrum will play a critical role in achieving the cities of the future. However, the use of this band is fast becoming saturated due to massive deployment of different technologies. There are many issues that need to be ad
作者: 象形文字    時(shí)間: 2025-3-24 00:23

作者: 培養(yǎng)    時(shí)間: 2025-3-24 04:06

作者: 有惡臭    時(shí)間: 2025-3-24 10:10
Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter, most promising wireless technologies that coexist. Joint operation of LTE and Wi-Fi in the same license-exempt bands is a real possibility but it requires advanced intelligent techniques. When such devices coexist, they suffer from significant interference and leads to performance degradation. This
作者: Progesterone    時(shí)間: 2025-3-24 12:31
VHF OSTBC MIMO System Used to Overcome the Effects of Irregular Terrain on Radio Signals,mmunication are not available in the area. This setback has impacted the power utility, Eskom negatively in this region as they have substations and other high voltage apparatus to monitor using the Supervisory Control and Data Acquisition (SCADA) system. This paper addresses this challenge by makin
作者: 扔掉掐死你    時(shí)間: 2025-3-24 18:53
Modelling Video Frames for Object Extraction Using Spatial Correlation,ce and tracking. Normal video sequence does not have steady background and hence these techniques cannot be applied to them. In our work, we propose an elegant method to model background and foreground based on histogram data. We use 2D continuous wavelet transform to spatially localize object and c
作者: incision    時(shí)間: 2025-3-24 21:25
Profile Verification Using Blockchain,ion. The paper presents a way that can ease up the process of doing the verification by using blockchain. A verification protocol is devised using the concept of mentors. A blockchain-based verification system is also set up?to demonstrate the working of the verification protocol.
作者: 膠狀    時(shí)間: 2025-3-25 02:54

作者: CUMB    時(shí)間: 2025-3-25 03:46

作者: 無(wú)畏    時(shí)間: 2025-3-25 11:24
2367-3370 were carefully reviewed and selected from several initial submissions.? The book is directed to the researchers and scientists engaged in various fields of intelligent systems..978-981-33-6172-0978-981-33-6173-7Series ISSN 2367-3370 Series E-ISSN 2367-3389
作者: mutineer    時(shí)間: 2025-3-25 14:30
Conference proceedings 20210) held in VIT, Chennai, India, during October 14–17, 2020. The research papers presented were carefully reviewed and selected from several initial submissions.? The book is directed to the researchers and scientists engaged in various fields of intelligent systems..
作者: ARIA    時(shí)間: 2025-3-25 16:28

作者: conscience    時(shí)間: 2025-3-25 22:39
C. León,R. León,F. Vázquez-Poloy, precision, recall, F1 and prediction time. Experimental results of the model built demonstrated 99.92667% accuracy, 0.22 s predicting time in CICDDoS2019 and 96.2% accuracy, 0.12 s predicting time in UNSW-NB15 dataset in the instance of Random Forest classifier which is higher than other classification algorithms.
作者: 碎石頭    時(shí)間: 2025-3-26 00:18

作者: EXULT    時(shí)間: 2025-3-26 05:48

作者: ethereal    時(shí)間: 2025-3-26 11:02
Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach,y, precision, recall, F1 and prediction time. Experimental results of the model built demonstrated 99.92667% accuracy, 0.22 s predicting time in CICDDoS2019 and 96.2% accuracy, 0.12 s predicting time in UNSW-NB15 dataset in the instance of Random Forest classifier which is higher than other classification algorithms.
作者: 鬧劇    時(shí)間: 2025-3-26 12:51

作者: Mitigate    時(shí)間: 2025-3-26 18:33
https://doi.org/10.1007/978-3-030-62669-3nd the DEAP dataset is used for other emotions. A depressed individual can get out of his sad mental state with the aid of this system. Angry, excited, pleasant and sad emotions are classified with the aid of Support Vector Machine and respective soothing videos for each emotion are played in the virtual world.
作者: 窒息    時(shí)間: 2025-3-26 22:40

作者: Bereavement    時(shí)間: 2025-3-27 02:47
Support Structures of Wind Energy Convertersated using Matlab software. The results generated provide coverage predictions and receive signal levels of two OSTBC MIMO systems operating at two different VHF frequencies. The results reveal that employing a low VHF frequency band OSTBC MIMO transceiver system, in rough terrain environments, can greatly improve radio signal reception.
作者: 繞著哥哥問(wèn)    時(shí)間: 2025-3-27 05:37
EEG-Based Emotion Recognition and Its Interface with Augmented Reality,nd the DEAP dataset is used for other emotions. A depressed individual can get out of his sad mental state with the aid of this system. Angry, excited, pleasant and sad emotions are classified with the aid of Support Vector Machine and respective soothing videos for each emotion are played in the virtual world.
作者: achlorhydria    時(shí)間: 2025-3-27 10:36
Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter, manage such interference. Results show that for a fixed SNR there is a reasonable reduction in BER when transmissions are allowed after estimating the behavior of the channel. The coexistence environment is deployed in MATLAB with the aid of WLAN and LTE toolboxes.
作者: AVID    時(shí)間: 2025-3-27 15:58

作者: 偽造    時(shí)間: 2025-3-27 19:30
C. León,R. León,F. Vázquez-Poloion. The paper presents a way that can ease up the process of doing the verification by using blockchain. A verification protocol is devised using the concept of mentors. A blockchain-based verification system is also set up?to demonstrate the working of the verification protocol.
作者: 天文臺(tái)    時(shí)間: 2025-3-28 01:41

作者: SLUMP    時(shí)間: 2025-3-28 02:47
A Generic Farming System Simulatorreate object mask to approximate silhouette. With available histogram for object pixels and background pixels, we obtain probability density function by normalizing the area under histogram. In order to retain smoothness in our density function, we use curve-fitting techniques to approximate the probability density function.
作者: Leisureliness    時(shí)間: 2025-3-28 06:53
2367-3370 ai, India.Serves as a reference resource for researchers and.This book constitutes thoroughly refereed post-conference proceedings of the International Applied Soft Computing and Communication Networks (ACN 2020) held in VIT, Chennai, India, during October 14–17, 2020. The research papers presented
作者: GOAT    時(shí)間: 2025-3-28 11:01

作者: 進(jìn)取心    時(shí)間: 2025-3-28 17:18

作者: Madrigal    時(shí)間: 2025-3-28 18:45
Secure Multimodal Biometric Recognition in Principal Component Subspace,ver existing schemes is that it does not require a user specific key for ensuring the irreversibility. User specific key is used only for ensuring the revocability of the protected template. Results show that the proposed method is able to achieve a matching performance of . for a multimodal system
作者: 搜集    時(shí)間: 2025-3-29 00:30
Intrusion Detection Using Deep Neural Network with AntiRectifier Layer,taset. The experimental results show that DNN-based IDS with AntiRectifier layer outperforms compared to ML techniques such as Decision Tree (DT), Random Forest (RF), Na?ve Bayes (NB), Support Vector Machine (SVM), k-Nearest Neighbours (k-NN) and variants of dropout namely, Standard dropout, Gaussia
作者: resistant    時(shí)間: 2025-3-29 06:53
CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers,er shares the path taken by researchers for understanding the architecture, technology, and tools required to set up a resilient test environment. This path also depicts the introduced framework CCSE. The parameters found out of the experiments were Virtual Machines (VMs), Cloudlets, Host, and Cores
作者: 使困惑    時(shí)間: 2025-3-29 07:17

作者: 粘    時(shí)間: 2025-3-29 14:06
An Asynchronous Leader-Based Neighbor Discovery Protocol in Static Wireless Ad Hoc Networks,d .). In addition, our proposal presents reasonable results in comparison to the deterministic leader-based protocol regarding time, energy and throughput results, and it also allows its use in an asynchronous way.
作者: coltish    時(shí)間: 2025-3-29 19:31
P2P Bot Detection Based on Host Behavior and Big Data Technology,c and reads PCAP files directly from Hadoop distributed file system (HDFS) and avoids conversion of PCAP files to text. The detection is based on the various characteristics of P2P bots such as count of unique destination hosts connected, total amount of data transferred from the source host, averag
作者: 反對(duì)    時(shí)間: 2025-3-29 22:59
Localization in Wireless Sensor Networks Using a Mobile Anchor and Subordinate Nodes,ill some nodes left in the network to be localized due to holes or a small percentage of anchor nodes. Further, these subordinate nodes are used to localize all the remaining nodes in the network. We have also used a method of solving the system of distance equations, which reduces the propagation o
作者: 使顯得不重要    時(shí)間: 2025-3-30 02:34

作者: CARE    時(shí)間: 2025-3-30 07:42
Solar Radiation and Its Measurement,ver existing schemes is that it does not require a user specific key for ensuring the irreversibility. User specific key is used only for ensuring the revocability of the protected template. Results show that the proposed method is able to achieve a matching performance of . for a multimodal system
作者: 幸福愉悅感    時(shí)間: 2025-3-30 09:37
Bin Li,Xiaojing Sun,Zhongsheng Tan,Chang Yutaset. The experimental results show that DNN-based IDS with AntiRectifier layer outperforms compared to ML techniques such as Decision Tree (DT), Random Forest (RF), Na?ve Bayes (NB), Support Vector Machine (SVM), k-Nearest Neighbours (k-NN) and variants of dropout namely, Standard dropout, Gaussia
作者: gimmick    時(shí)間: 2025-3-30 12:48

作者: 繁忙    時(shí)間: 2025-3-30 20:25
Human enteric viruses in polluted water,ies for analyzing security events. This survey paper identifies the various big data technologies, datasets and feature selection algorithms that are used in BDTCA systems. This paper also reports different methods that are used to read packet trace files from Hadoop Distributed File System (HDFS).
作者: apiary    時(shí)間: 2025-3-30 23:44

作者: VEIL    時(shí)間: 2025-3-31 01:40

作者: ULCER    時(shí)間: 2025-3-31 07:22

作者: Abrupt    時(shí)間: 2025-3-31 12:22
Applications of Environmental Aerodynamicse intelligible and to simplify the optimization procedure for constructing positively invariant estimates of the ROA. Results on the Van der Pol oscillator show how this may lead to larger ROAs than via traditional methods.
作者: 坦白    時(shí)間: 2025-3-31 14:04
Serverless Deployment of a Voice-Bot for Visually Impaired,
作者: 嬰兒    時(shí)間: 2025-3-31 21:14
Janet F. Bornman,Alan H. Teramura due to their intrinsic restrictions. This condition makes Fog computing an ideal solution, where hosts may be distributed over the Fog domain, and additionally, the Cloud domain may be used as support. In this context, a generic scenario is presented and the most common actions regarding the manage
作者: Interim    時(shí)間: 2025-3-31 22:58

作者: 準(zhǔn)則    時(shí)間: 2025-4-1 04:01
Solar Radiation and Its Measurement,. A generalized feature representation is convenient and efficient in multimodal biometric system as the complexity involved in fusing or protecting the heterogeneous features corresponding to different biometric modalities can be avoided. The dimensionality of the features can also be reduced effec
作者: Conducive    時(shí)間: 2025-4-1 09:46

作者: 纖細(xì)    時(shí)間: 2025-4-1 13:21
C. León,R. León,F. Vázquez-Polomutable documentation. Across the globe, a huge number of students graduate every year from universities. Their work, both curricular and extracurricular, needs secure storage and verification so that it remains protected and the students can highlight it anywhere without further rounds of verificat
作者: 有發(fā)明天才    時(shí)間: 2025-4-1 17:58

作者: BRIEF    時(shí)間: 2025-4-1 19:56
Bin Li,Xiaojing Sun,Zhongsheng Tan,Chang Yuus types of vulnerabilities and exploits. Security mechanisms such as Intrusion Detection System (IDS) are designed to detect various types of vulnerabilities and attacks. Various Machine Learning (ML) and Deep Learning (DL) techniques are used for building IDS. In this paper, we aim to build Deep N
作者: Infinitesimal    時(shí)間: 2025-4-2 00:12





歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
霍州市| 海林市| 黔南| 涟源市| 吉木萨尔县| 安新县| 新郑市| 六安市| 衡水市| 鹤岗市| 健康| 三原县| 江阴市| 闵行区| 喀喇沁旗| 吐鲁番市| 施甸县| 巢湖市| 漯河市| 乳源| 兖州市| 深州市| 亳州市| 阳山县| 湟源县| 湘阴县| 鸡西市| 开原市| 永兴县| 贡觉县| 雷州市| 中宁县| 宁都县| 资阳市| 阿拉善右旗| 黎平县| 安平县| 萝北县| 泽州县| 西丰县| 金昌市|