標(biāo)題: Titlebook: ICT Analysis and Applications; Simon Fong,Nilanjan Dey,Amit Joshi Conference proceedings 2022 The Editor(s) (if applicable) and The Author [打印本頁] 作者: Glitch 時間: 2025-3-21 18:43
書目名稱ICT Analysis and Applications影響因子(影響力)
書目名稱ICT Analysis and Applications影響因子(影響力)學(xué)科排名
書目名稱ICT Analysis and Applications網(wǎng)絡(luò)公開度
書目名稱ICT Analysis and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱ICT Analysis and Applications被引頻次
書目名稱ICT Analysis and Applications被引頻次學(xué)科排名
書目名稱ICT Analysis and Applications年度引用
書目名稱ICT Analysis and Applications年度引用學(xué)科排名
書目名稱ICT Analysis and Applications讀者反饋
書目名稱ICT Analysis and Applications讀者反饋學(xué)科排名
作者: 消音器 時間: 2025-3-22 00:12 作者: 配偶 時間: 2025-3-22 04:07 作者: cuticle 時間: 2025-3-22 06:27 作者: BRINK 時間: 2025-3-22 10:54
Personal Identification Using Fuzzy Approach and RSA Algorithm, increase security and improve the performance. This algorithm helps to protect the data from unauthorized access and runs faster. The proposed algorithm is designed using MATLAB R2017a. We also discussed advantages and disadvantages of fuzzy and RSA algorithm.作者: babble 時間: 2025-3-22 16:22
,A Review on Insulators in Transmission Line—Progress and Comparative Studies,that has contributed to the progress of high-voltage transmission in a broad sense. The paper further explores thoroughly the attention needed to improve the characteristics of dielectric materials so that their range of applications can be expanded. The article also highlights some gaps and suggests some future areas of research.作者: STYX 時間: 2025-3-22 18:52 作者: hermitage 時間: 2025-3-22 23:49
,Intermittent Leather Defect Detection Based on?Ensemble Algorithms Derived from?Black Hat Transformms. The proposed method exhibits classification accuracy of 94.25% on validation dataset. Further, performance measures such as precision, ROC curve, sensitivity, error rate, specificity, and false positive rate have been reported to verify the effectiveness of the proposed approach.作者: Vertical 時間: 2025-3-23 04:09 作者: Engaging 時間: 2025-3-23 06:39 作者: BROTH 時間: 2025-3-23 11:49 作者: epicardium 時間: 2025-3-23 15:41 作者: 拉開這車床 時間: 2025-3-23 19:07
Parallel Algorithm to Efficiently Mine High Utility Itemset,aper proposed two new frameworks that adapted parallel mining namely CLB and PLB which are extension of ULB-Miner algorithm. CLB is hybrid algorithm from CTU-PRO and ULB-Miner, and PLB is proposed because of inefficient process in CLB. From the experimental evaluation, PLB outperforms ULB-Miner in all cases regarding execution time.作者: 易于出錯 時間: 2025-3-24 00:47
Conference proceedings 2022he 6th International Conference on ICT for Sustainable Development (ICT4SD 2021), held in Goa, India, on 5–6 August 2021. The book covers the topics such as big data and data mining, data fusion, IoT programming toolkits and frameworks, green communication systems and network, use of ICT in smart ci作者: Living-Will 時間: 2025-3-24 05:03
Sheenu Singh,Meetu Kandpalameworkto the interpretation of the many facets of the changes and crisis generated by COVID-19..The volume addresses both academics and professionals dealing with the processes and the consequences brought for978-3-030-88624-0978-3-030-88622-6Series ISSN 2366-7516 Series E-ISSN 2366-7524 作者: upstart 時間: 2025-3-24 08:46
l publicity) in this crisis situation and investigates how translation is strategically adopted by the government as a medium of communicating the Chinese experience of fighting COVID-19. After analyzing all these disparate efforts, it?argues for the significance of translation in overcoming languag作者: Anguish 時間: 2025-3-24 13:55
Sushma Bylaiah,Seema Shedole,Kuralayanapalya Puttahonnappa Suresh,Leena Gowda,Sharanagouda S. Patil,onomic indicators and emphasis on the negative economic impacts such as decline of growth rate, shrinking Gross Domestic Product (GDP), etc. However, the micro level socio-economic impacts of the outbreak, which are largely caused by the government interventions i.e., lock down, social distancing, e作者: 可耕種 時間: 2025-3-24 15:46
Van Luu Xuan,Hoa Doan Van,Dung Luu Hongonomic indicators and emphasis on the negative economic impacts such as decline of growth rate, shrinking Gross Domestic Product (GDP), etc. However, the micro level socio-economic impacts of the outbreak, which are largely caused by the government interventions i.e., lock down, social distancing, e作者: cardiopulmonary 時間: 2025-3-24 21:56
Bonani Paulonomic indicators and emphasis on the negative economic impacts such as decline of growth rate, shrinking Gross Domestic Product (GDP), etc. However, the micro level socio-economic impacts of the outbreak, which are largely caused by the government interventions i.e., lock down, social distancing, e作者: Employee 時間: 2025-3-25 02:07 作者: 狂熱文化 時間: 2025-3-25 04:14 作者: ULCER 時間: 2025-3-25 09:54 作者: 輕推 時間: 2025-3-25 12:05 作者: 詼諧 時間: 2025-3-25 16:54 作者: 取回 時間: 2025-3-25 23:34 作者: 假裝是我 時間: 2025-3-26 01:13
Sridharan Kesavan,Aakansha Uppal,Bhavna Pandeyers on the challenges to the objectualist conceptions of law that reduce law to a system of norms or a set of facts, and on those conceptions that regard the law as an interpretative social practice. Legal systems’ constitutionalization, as the chapter argues, increases legal flexibility at the expe作者: adroit 時間: 2025-3-26 06:47 作者: Radiculopathy 時間: 2025-3-26 10:53 作者: antedate 時間: 2025-3-26 12:37 作者: detach 時間: 2025-3-26 16:58
Shankargoud Patil,Kappargaon S. Prabhushettyewards are distributed within the framework of color-blind racism. Both Feagin and Bonilla-Silva came out of the critical race research tradition. In addition, given the magnitude and the variations in the demographic overrepresentation of Blacks and Hispanics in COVID-19 deaths across US States and作者: Etching 時間: 2025-3-26 21:19
Eduardus Hardika Sandy Atmaja,Kavita Sonawaneewards are distributed within the framework of color-blind racism. Both Feagin and Bonilla-Silva came out of the critical race research tradition. In addition, given the magnitude and the variations in the demographic overrepresentation of Blacks and Hispanics in COVID-19 deaths across US States and作者: Clinch 時間: 2025-3-27 01:47 作者: Nonflammable 時間: 2025-3-27 08:19 作者: 搖擺 時間: 2025-3-27 11:04
Fredin Jose,M. Priyatharishini,M. Nirmala Deviverely. A case study concerning schools close to marginal neighbourhoods allows a concrete and close-up view of the daily experience of teachers and pupils. In these two years, educational disparities have significantly widened inequality among children, delaying the development of some and hinderin作者: 誹謗 時間: 2025-3-27 13:48 作者: 窒息 時間: 2025-3-27 19:44 作者: 暗指 時間: 2025-3-27 23:08 作者: 橡子 時間: 2025-3-28 05:21
,Travel Booking and?Management Application: TravelBel,es the users various travel packages for the enterprise/planners who can chose one among the given options and edit a few particulars in it, for, e.g. the required level of luxury. In turn, the user, instead of doing different bookings through different websites, will get to complete all travel rela作者: 率直 時間: 2025-3-28 08:14 作者: 假裝是我 時間: 2025-3-28 12:19 作者: Biguanides 時間: 2025-3-28 14:35 作者: 自負(fù)的人 時間: 2025-3-28 20:40 作者: Counteract 時間: 2025-3-29 02:39 作者: BOLUS 時間: 2025-3-29 06:07 作者: 熄滅 時間: 2025-3-29 10:14
,Constructing Digital Signature Algorithm Based on?a?New Key Scheme,and the digital signature is used to validate contents and authorize users who are involving in the E-governance system. Although there are many digital signature schemes currently known as RSA, Elgamal, the approach of improving the safety level of digital signature schemes based on the hardness of作者: 笨拙處理 時間: 2025-3-29 11:39 作者: allergy 時間: 2025-3-29 16:43 作者: 翻布尋找 時間: 2025-3-29 22:41 作者: 喃喃而言 時間: 2025-3-30 01:50 作者: 憤世嫉俗者 時間: 2025-3-30 07:38
Security and Privacy Issues in Internet of Things,iety. With the Internet revolution, the IoT framework provides a platform for connecting many smart and self-configuring objects, such as watches, cars, tablets, wearable devices and home appliances. Despite the technological and societal advantages and the enormous economic potential of IoT, the is作者: Yag-Capsulotomy 時間: 2025-3-30 09:59 作者: 寡頭政治 時間: 2025-3-30 15:46 作者: Cleave 時間: 2025-3-30 19:50
Personal Identification Using Fuzzy Approach and RSA Algorithm, logic is used in RSA algorithm for securing communication. Multimodal images use the fuzzy logic FIS rules to design 64 bits blowfish algorithm which increase security and improve the performance. This algorithm helps to protect the data from unauthorized access and runs faster. The proposed algori作者: Crumple 時間: 2025-3-30 21:54 作者: metropolitan 時間: 2025-3-31 02:22
Analysis of Fault Tolerance Techniques in Virtual Machine Environment,uously growing cloud data centers are majorly dependent on physical machines and virtualization. The reliability of cloud is calculated based on service availability of its physical and virtual servers. In this paper, a brief analysis study is done on virtualization. Firstly, the concept of failure 作者: 繼而發(fā)生 時間: 2025-3-31 08:47
Analysis of Symmetric and Asymmetric Key Algorithms,ur utmost responsibilities. In 2018, 30 million cyber-attacks occurred all over the world costing $3.86 million on an average. With the statistics getting worse every year, it is very important to invest more in securing the data and more importantly design modern cryptographic techniques that are c作者: 昆蟲 時間: 2025-3-31 11:30
A Hybrid Approach for Retrieving Geographic Information in Wireless Environment Using Indexing Techr to cater a large integer of mobile users. In this research paper, we have proposed a hybrid indexing schemes for data transmission which is based on the dispersion of indexing using hash table with Huffman-tree index coding. In the proposed work, we have theoretically explained the performance of 作者: 多骨 時間: 2025-3-31 16:18 作者: 形上升才刺激 時間: 2025-3-31 17:33 作者: defile 時間: 2025-3-31 23:32 作者: Arresting 時間: 2025-4-1 05:52
,Security and Privacy Issues of Blockchain Technology in Health Care—A Review,ratory for identification of disease. Regardless of sharing data, it is vulnerable because it could be tempered or harmed as security and privacy have not been promised. In current time, it is shown that medical data is using cloud for storage, but there is also security, privacy and trust which has作者: Custodian 時間: 2025-4-1 08:44
Hardware Trojan Detection Using Deep Learning-Generative Adversarial Network and Stacked Auto Encodincreased outsourcing which leads to malicious modification by inserting hardware trojans. It becomes necessary to detect these defects before IC fabrication in pre-silicon production stage to save the production cost. In this paper, we propose a method for HT detection using gate level netlist. Ext作者: 包租車船 時間: 2025-4-1 10:13
eatly facilitated the communication between different parties. This chapter gives an overview of how diverse agents have engaged in this large-scale translation endeavor and draws attention to the importance of translation planning in crisis contexts. It not only discusses the operations of voluntee作者: Expand 時間: 2025-4-1 14:47 作者: 漫步 時間: 2025-4-1 18:47 作者: definition 時間: 2025-4-1 23:59
Bonani Paul cases followed by the USA as on September 15, 2020. This chapter analyzes the overall features of the outbreak within the country as well as the micro social impacts caused by the coronavirus in India. Based on thematic content of various newspapers, magazines, and other media reports qualitative a