標題: Titlebook: ICT with Intelligent Applications; Proceedings of ICTIS Tomonobu Senjyu,Parikshit N. Mahalle,Amit Joshi Conference proceedings 2022 The Edi [打印本頁] 作者: 太平間 時間: 2025-3-21 16:13
書目名稱ICT with Intelligent Applications影響因子(影響力)
書目名稱ICT with Intelligent Applications影響因子(影響力)學(xué)科排名
書目名稱ICT with Intelligent Applications網(wǎng)絡(luò)公開度
書目名稱ICT with Intelligent Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱ICT with Intelligent Applications被引頻次
書目名稱ICT with Intelligent Applications被引頻次學(xué)科排名
書目名稱ICT with Intelligent Applications年度引用
書目名稱ICT with Intelligent Applications年度引用學(xué)科排名
書目名稱ICT with Intelligent Applications讀者反饋
書目名稱ICT with Intelligent Applications讀者反饋學(xué)科排名
作者: inconceivable 時間: 2025-3-21 22:51
ICT with Intelligent Applications978-981-16-4177-0Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: impale 時間: 2025-3-22 02:23
https://doi.org/10.1007/978-981-16-4177-0Artificial Intelligence; Internet of Things; Intelligent Systems; Machine Learning; Cloud Computing; Big 作者: 做方舟 時間: 2025-3-22 08:19 作者: Champion 時間: 2025-3-22 10:53 作者: Thymus 時間: 2025-3-22 15:05 作者: LANCE 時間: 2025-3-22 18:20 作者: Apogee 時間: 2025-3-22 21:58 作者: 防止 時間: 2025-3-23 03:06 作者: Slit-Lamp 時間: 2025-3-23 09:17
Review of NOMA with Spectrum Sharing Technique,of dynamic spectrum access and diversity throughout the broad spectrum possible, to alleviate the spectrum scarcity problem and meet the huge demands for wireless connectivity. This article discusses the basic principle of NOMA, cognitive radio fundamentals, spectrum sharing way, and the advantages and challenges of CR and NOMA spectrum sharing.作者: Collar 時間: 2025-3-23 10:44 作者: CODE 時間: 2025-3-23 15:00 作者: Hemodialysis 時間: 2025-3-23 21:07 作者: 把手 時間: 2025-3-24 01:12 作者: 山羊 時間: 2025-3-24 03:08 作者: 某人 時間: 2025-3-24 08:22
Enhancing Signal in Noisy Environment: A Review,bile audio in high noisy environment such as conferences, meetings, heavy traffic conditions, and elimination of noise in biomedical signals in the presence of other noisy signals. For this purpose, many filtering techniques can be used, and depending on the filtered image obtained, we can find out which is best suited for the specific purpose.作者: FADE 時間: 2025-3-24 11:47 作者: 動作謎 時間: 2025-3-24 17:01
2190-3018 The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.978-981-16-4179-4978-981-16-4177-0Series ISSN 2190-3018 Series E-ISSN 2190-3026 作者: Encapsulate 時間: 2025-3-24 19:28 作者: 一個姐姐 時間: 2025-3-24 23:11 作者: 使人入神 時間: 2025-3-25 05:29 作者: STEER 時間: 2025-3-25 07:39 作者: JECT 時間: 2025-3-25 12:34 作者: Madrigal 時間: 2025-3-25 19:06 作者: jabber 時間: 2025-3-25 20:04
G. S. Gillgiven extremal . of a variational integral . is, in fact, a .. This will be achieved by a method the elements of which were developed by Weierstrass. One of its basic ideas is to consider a whole bundle of extremals instead of a single one, just as one investigates in optics . instead of isolated si作者: 注視 時間: 2025-3-26 00:10 作者: 初次登臺 時間: 2025-3-26 06:05
Purab Alok Jain,Pranali K. Kosamkars with the for- mal apparatus of the variational calculus and with nonparametric field theory, whereas Volume 2 treats parametric variational problems as weIl as Hamilton- Jacobi theory and the classical theory of partial differential equations of first order. In a subsequent treatise we shall descr作者: inflame 時間: 2025-3-26 10:17 作者: Dungeon 時間: 2025-3-26 15:33
Swapnil P. Bhagat,Bandu B. Meshrams with the for- mal apparatus of the variational calculus and with nonparametric field theory, whereas Volume 2 treats parametric variational problems as weIl as Hamilton- Jacobi theory and the classical theory of partial differential equations of first order. In a subsequent treatise we shall descr作者: 發(fā)出眩目光芒 時間: 2025-3-26 20:01 作者: 文藝 時間: 2025-3-26 22:50
Performance Analysis of Secure Hash Algorithm-2 (SHA-) and Implementing on FPGA,ld. With the goal of reduction in the accumulating area, throughput and power of the hardware performance of a crypto-analyzed system, secured hash functions of hardware working are extremely efficient and great importance. Now for most of the security services, hash function algorithm has become th作者: 情感脆弱 時間: 2025-3-27 03:00
Chat-It-Loud!: Real-Time Transcribing App for Communication for Hearing-Impaired,ication, it presents a viable solution to facilitate inclusive education of the hearing impaired. Although it improves the learning experience of hearing-impaired students in a classroom setting, it focusses only on one-way mode of communication, i.e., a single speaker to many listeners. It does not作者: gregarious 時間: 2025-3-27 08:02 作者: Generosity 時間: 2025-3-27 11:54 作者: 使害怕 時間: 2025-3-27 14:38 作者: 整頓 時間: 2025-3-27 21:02 作者: Palpate 時間: 2025-3-28 01:25 作者: 怎樣才咆哮 時間: 2025-3-28 02:58 作者: anesthesia 時間: 2025-3-28 08:25
EZAdopt,ions and the processes to be carried out to be a legal adopter. Most of them are not aware of the eligibility norms. But even after considering all the valid conditions, the process goes on for a while that makes it tidier to manage. Therefore, we propose a system that effectively manages the data o作者: 等待 時間: 2025-3-28 13:04
5G Security and Privacy Issues: A Perspective View,n. 5G will be supporting a great many existing gadgets without satisfactory inherent security, just as new gadgets whose outrageous processing force will make them appealing focuses for programmers. 5G will relate normal structures that will require greater security to undertake well-being of the ba作者: 清真寺 時間: 2025-3-28 14:48 作者: 混雜人 時間: 2025-3-28 20:26
Curiosity-Driven Dynamic Reconfiguration of Swarm Robots by Using Simple Behaviours,al insect swarm and can adopt optimal behaviours over a period of time by learning the effect of behaviours on their internal and external goal states. These swarms are made to dynamically reconfigure themselves into different topologies based on their capabilities and their desired goals. The colle作者: 我吃花盤旋 時間: 2025-3-29 00:27
Pre-stampede Monitoring and Alarm System,as the recent one; this happened in Mumbai. According to media reports, the main casualties were because of stampede at the middle of the bridge. This project focuses on to stop any possible stampede occurring and to alert the concerned department about the discovered stampede. This paper also conce作者: MUT 時間: 2025-3-29 04:31
Review of NOMA with Spectrum Sharing Technique,MA) and Cognitive Radio (CR). The NOMA is one of the most promising performance improvement methods in new generation cells and CR will make the most of dynamic spectrum access and diversity throughout the broad spectrum possible, to alleviate the spectrum scarcity problem and meet the huge demands 作者: 歸功于 時間: 2025-3-29 07:19 作者: 假設(shè) 時間: 2025-3-29 14:47 作者: 協(xié)定 時間: 2025-3-29 15:35 作者: critique 時間: 2025-3-29 23:21 作者: 大門在匯總 時間: 2025-3-30 03:32
Chirayu Lalwani,Prerna Gurbaxani,Snehal Jagatap,Maaz Shaikh作者: municipality 時間: 2025-3-30 07:44 作者: 陳舊 時間: 2025-3-30 12:00
Rajeshwari Mattimani,Nalini C. Iyer,Jyoti Patil Devaji作者: anarchist 時間: 2025-3-30 16:13 作者: covert 時間: 2025-3-30 18:39
Analysis and Prediction of COVID-19 with Image Super-Resolution Using CNN and SRCNN-Based Approach,rmation of a low-visibility image into a high-visibility image, SRCNN and for classifying whether the person is having coronavirus or not a convolutional neural network (CNN) is used. Our models are trained and tested on four datasets, which are Set5, Set14,?COVID-chest-X-Ray dataset, and chest-X-Ra作者: 自傳 時間: 2025-3-31 00:33
Classification of Medical Images Using Deep Learning to Aid in Adaptive Big Data Crowdsourcing Platondition for validation, in order to enhance diagnostic effectiveness. In this work, we focus primarily on the classification tasks using DCNN; the elucidation of the privacy-preserving architecture of our cloud-based crowdsourcing platform and classification using conventional clustering approaches作者: interference 時間: 2025-3-31 03:46 作者: forecast 時間: 2025-3-31 06:07
Design and Development of an Algorithm to Secure Big Data on Cloud Computing,ata are cost, data quality, rapid change, skilled man power requirement, infrastructure need, moving data onto big data platform, need for synchronization across data sources, and most important is security of data. These all challenges are not going to be easily solved; various researches are going作者: URN 時間: 2025-3-31 11:31
Comprehensive and Empirical Evaluation of Classical Annealing and Simulated Quantum Annealing in Apulate quantum effects on classical machines, and not much research has been conducted to evaluate the performance of the existing algorithms on optimization problems. In this paper, we try to address the effectiveness of simulated quantum annealing algorithm in finding the global optima for a distin作者: 河流 時間: 2025-3-31 17:16
Estimation of Economic Impact of National Open Digital Ecosystems,Using a case study of Indian Railways Catering and Tourism Corporation (IRCTC), an attempt to capture the economic impact of open digital ecosystems is made. The study indicates that the economic value is around USD 147.59 b for 2019, approximately 5% of GDP. Need for strengthening open digital ecosystems is highlighted with few policy suggestions.作者: Fibroid 時間: 2025-3-31 20:19 作者: OVERT 時間: 2025-3-31 22:05 作者: URN 時間: 2025-4-1 02:40 作者: 刺激 時間: 2025-4-1 08:47 作者: finite 時間: 2025-4-1 10:15