標(biāo)題: Titlebook: Distributed Computing and Intelligent Technology; 19th International C Anisur Rahaman Molla,Gokarna Sharma,Sanjay Rawat Conference proceedi [打印本頁(yè)] 作者: Entangle 時(shí)間: 2025-3-21 19:33
書目名稱Distributed Computing and Intelligent Technology影響因子(影響力)
書目名稱Distributed Computing and Intelligent Technology影響因子(影響力)學(xué)科排名
書目名稱Distributed Computing and Intelligent Technology網(wǎng)絡(luò)公開度
書目名稱Distributed Computing and Intelligent Technology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Distributed Computing and Intelligent Technology被引頻次
書目名稱Distributed Computing and Intelligent Technology被引頻次學(xué)科排名
書目名稱Distributed Computing and Intelligent Technology年度引用
書目名稱Distributed Computing and Intelligent Technology年度引用學(xué)科排名
書目名稱Distributed Computing and Intelligent Technology讀者反饋
書目名稱Distributed Computing and Intelligent Technology讀者反饋學(xué)科排名
作者: Spangle 時(shí)間: 2025-3-22 00:12 作者: 討好女人 時(shí)間: 2025-3-22 03:13
Conference proceedings 2023s held in Bhubaneswar, India, in January 2023..The 20 full papers and 9 short papers presented in this volume were carefully reviewed and selected from 55 submissions. The papers are organized in the following topical sections:?Invited Talks;?Distributed Computing; Intelligent Technology..作者: 擋泥板 時(shí)間: 2025-3-22 07:30 作者: 惰性女人 時(shí)間: 2025-3-22 11:34 作者: confide 時(shí)間: 2025-3-22 15:24
Roger Jankowski M.D., Ph.D., PUPHP address database is partitioned into a different table based on first . bits of IP address, then a variant of trie approach is proposed to find the next hop. The proposed lookup approach shows 64.46% and 94.32% improvement than binary trie and BST implementations.作者: confide 時(shí)間: 2025-3-22 18:52 作者: 作繭自縛 時(shí)間: 2025-3-23 00:38
The Primary Nose and Palate in Evolutionrged frames in surveillance videos. Firstly, the motion residuals are computed from the videos sequences to extract the video forgery footprints, which are generated due to the manipulation operations. Secondly, the computed motion residuals are fed to VGG-16 network for detecting authentic and forged frames in a surveillance video.作者: 無孔 時(shí)間: 2025-3-23 04:13 作者: Fabric 時(shí)間: 2025-3-23 06:53
The Toba supervolcanic eruption: , used for baseline comparison. The proposed DCNN approach outperformed all the baselines chosen with an improvement of 2.1% in the f1-score. This study shows that deep learning would be better for building models capable of classifying landslides on real-world datasets.作者: fodlder 時(shí)間: 2025-3-23 10:19
A Perspective of?IP Lookup Approach Using Graphical Processing Unit (GPU)P address database is partitioned into a different table based on first . bits of IP address, then a variant of trie approach is proposed to find the next hop. The proposed lookup approach shows 64.46% and 94.32% improvement than binary trie and BST implementations.作者: Hiatus 時(shí)間: 2025-3-23 15:18 作者: 一加就噴出 時(shí)間: 2025-3-23 21:27
Detection of?Object-Based Forgery in?Surveillance Videos Utilizing Motion Residual and?Deep Learningrged frames in surveillance videos. Firstly, the motion residuals are computed from the videos sequences to extract the video forgery footprints, which are generated due to the manipulation operations. Secondly, the computed motion residuals are fed to VGG-16 network for detecting authentic and forged frames in a surveillance video.作者: Obscure 時(shí)間: 2025-3-24 01:38
Early Detection of Covid Using Spectral Analysis of Cough and Deep Convolutional Neural Networkd method with the cough spectral analysis and Deep Learning based algorithm returns the covid infection probability. The empirical results show that the proposed method of covid detection using cough spectral analysis using DWT and deep learning achieves better accuracy, while compared to the conventional methods.作者: monopoly 時(shí)間: 2025-3-24 02:32 作者: 該得 時(shí)間: 2025-3-24 08:46
Fine-Tuning of?Multilingual Models for?Sentiment Classification in?Code-Mixed Indian Language Textsalam and Tamil datasets were used to evaluate the model. Our work shows that transformer-based architectures for sequential classification tasks, at least for sentiment analysis, perform better than traditional machine learning solutions for code-mixed data.作者: 聲明 時(shí)間: 2025-3-24 11:39
0302-9743 lected from 55 submissions. The papers are organized in the following topical sections:?Invited Talks;?Distributed Computing; Intelligent Technology..978-3-031-24847-4978-3-031-24848-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 浪費(fèi)物質(zhì) 時(shí)間: 2025-3-24 16:11 作者: CHASE 時(shí)間: 2025-3-24 19:41
Greenhouse Gases and Mass Extinctions,n two tasks. Scheduling a workflow to achieve certain goal(s) (e.g.; minimize makespan, cost, penalty, and energy; maximize reliability, processor utilization, etc.) remains an active area of research. In this paper, we propose an efficient scheduling algorithm for workflows in heterogeneous multi-p作者: 懸掛 時(shí)間: 2025-3-25 00:27 作者: AVID 時(shí)間: 2025-3-25 06:51 作者: cultivated 時(shí)間: 2025-3-25 09:00 作者: 泥土謙卑 時(shí)間: 2025-3-25 14:20 作者: 披肩 時(shí)間: 2025-3-25 17:42 作者: 火海 時(shí)間: 2025-3-25 23:10 作者: ACRID 時(shí)間: 2025-3-26 01:02
Roger Jankowski M.D., Ph.D., PUPH their own opinion. The opinion of an individual can be favorable or unfavorable. Each individual can affect the others positively or negatively. In this paper, we consider the . problem for signed, weighted and directed social networks with Multi-Stage Linear Threshold Model for information propaga作者: Jocose 時(shí)間: 2025-3-26 06:41 作者: 忘川河 時(shí)間: 2025-3-26 11:51 作者: PHONE 時(shí)間: 2025-3-26 13:17
A Theoretical Framework for the Studylities that can be located on these sites in such a way that each pair of facilities are separated by a distance which is more than . from one another and no more facilities can be added. DACLP is closely related with anti-covering location problem (ACLP), which is concerned with finding the maximum作者: 顛簸下上 時(shí)間: 2025-3-26 19:48
A Theoretical Framework for the Studyity to malware evolution, security analysts heavily utilise end-to-end DNNs in malware detection systems. Unfortunately, security threats such as adversarial samples cause these classifiers to output erroneous results. These adversarial samples pose major security and privacy risks since a malware d作者: 闖入 時(shí)間: 2025-3-27 01:01 作者: 美食家 時(shí)間: 2025-3-27 03:27 作者: 使入迷 時(shí)間: 2025-3-27 08:15 作者: 小樣他閑聊 時(shí)間: 2025-3-27 10:45
The Toba supervolcanic eruption: ,d studies are reported on analyzing, classifying, and predicting Landslides, but there are countless avenues where these techniques must be developed to their full potential. This work proposes a deep convolutional neural network for classifying landslide data. The synthetic minority over-sampling m作者: 無效 時(shí)間: 2025-3-27 16:28 作者: Mitigate 時(shí)間: 2025-3-27 19:59 作者: 柱廊 時(shí)間: 2025-3-27 21:56
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/281824.jpg作者: 彩色 時(shí)間: 2025-3-28 03:01 作者: consent 時(shí)間: 2025-3-28 09:29
Conference proceedings 2023s held in Bhubaneswar, India, in January 2023..The 20 full papers and 9 short papers presented in this volume were carefully reviewed and selected from 55 submissions. The papers are organized in the following topical sections:?Invited Talks;?Distributed Computing; Intelligent Technology..作者: GLIDE 時(shí)間: 2025-3-28 12:25 作者: Seminar 時(shí)間: 2025-3-28 14:54 作者: chondromalacia 時(shí)間: 2025-3-28 22:04
https://doi.org/10.1007/978-94-009-3509-9 rules to detect whether two statements in different tasks may race with each other. We have developed a prototype implementation of our tool for the Rapid programming language that is used to program industrial robots of ABB. Rapid has all the features of a typical programming language for industri作者: 昏迷狀態(tài) 時(shí)間: 2025-3-28 23:43
https://doi.org/10.1007/978-94-009-3509-9 - total time to commit all the transactions and (ii) . - the total distance traversed in accessing required shared objects. We design scheduling algorithms that are individually or simultaneously efficient for both the metrics and rigorously evaluate them through several benchmarks on random and gr作者: 閑逛 時(shí)間: 2025-3-29 05:33 作者: ORE 時(shí)間: 2025-3-29 07:57
The Nose in Midface Developmentby integrating the entropy method and the extended Best-Worst method (BWM) using Hesitant-Triangular-Fuzzy information with group-decisions. Finally, the TOPSIS uses these weights to assess the app’s performance. To validate our MCMARS, we prepared a dataset of 124 government-approved COVID-19 Andro作者: 向外才掩飾 時(shí)間: 2025-3-29 12:28 作者: 低位的人或事 時(shí)間: 2025-3-29 16:23 作者: depreciate 時(shí)間: 2025-3-29 20:32 作者: largesse 時(shí)間: 2025-3-30 01:20 作者: 大雨 時(shí)間: 2025-3-30 04:40 作者: 磨碎 時(shí)間: 2025-3-30 09:46 作者: 擁護(hù) 時(shí)間: 2025-3-30 14:34 作者: 陰郁 時(shí)間: 2025-3-30 17:32
Ordered Scheduling in Control-Flow Distributed Transactional Memory - total time to commit all the transactions and (ii) . - the total distance traversed in accessing required shared objects. We design scheduling algorithms that are individually or simultaneously efficient for both the metrics and rigorously evaluate them through several benchmarks on random and gr作者: Keshan-disease 時(shí)間: 2025-3-30 21:13
Fault-Tolerant Graph Realizations in?the?Congested Clique, Revisited, we extend the result to . when the network is anonymous, i.e., the IDs of the neighboring nodes are unknown. We present an algorithm that solves the graph realization problem in the . model with matching performance guarantees as in the . model.作者: MIR 時(shí)間: 2025-3-31 03:43 作者: 懶洋洋 時(shí)間: 2025-3-31 07:57