標(biāo)題: Titlebook: Information and Communication Technologies; International Confer Vinu V Das,R. Vijaykumar Conference proceedings 2010 Springer-Verlag Berli [打印本頁] 作者: 尖酸好 時間: 2025-3-21 19:54
書目名稱Information and Communication Technologies影響因子(影響力)
書目名稱Information and Communication Technologies影響因子(影響力)學(xué)科排名
書目名稱Information and Communication Technologies網(wǎng)絡(luò)公開度
書目名稱Information and Communication Technologies網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information and Communication Technologies被引頻次
書目名稱Information and Communication Technologies被引頻次學(xué)科排名
書目名稱Information and Communication Technologies年度引用
書目名稱Information and Communication Technologies年度引用學(xué)科排名
書目名稱Information and Communication Technologies讀者反饋
書目名稱Information and Communication Technologies讀者反饋學(xué)科排名
作者: 沒收 時間: 2025-3-21 22:13 作者: 不開心 時間: 2025-3-22 03:03 作者: 一個姐姐 時間: 2025-3-22 05:26 作者: 以煙熏消毒 時間: 2025-3-22 10:04
Bi-variate Polynomial Approximation of Fuzzy Controller Using Genetic Algorithm for Trajectory Contr Algorithm. In the proposed method, initially Fuzzy PD+I controller is used for control of PUMA560. The input and output data points are collected from the Fuzzy PD controllers of individual joints. With these data points a bi-variate polynomial approximation function is obtained through interpolati作者: Obscure 時間: 2025-3-22 14:06 作者: Offensive 時間: 2025-3-22 19:01
A Novel High Speed Dynamic Comparator Using Positive Feedback with Low Power Dissipation and Low Offification, the design was simulated in CADENCE GPDK 90nm CMOS Technology at 1.8Vsupply voltage. Nearly 18mV Offset Voltage, power dissipation 2.564mW, speed 2.812GHZ, propagation delay 0.3556ns is easily achieved with the proposed structure. Inputs are reconfigured from typical differential pair com作者: syring 時間: 2025-3-22 21:14
VLSI Design of Four Quadrant Analog Voltage-Mode Multiplier and Its Applicationtion & to that of voltage difference circuit. The circuit is formed by cascading the complementary diode pair connection with the voltage difference circuit. Based on the proposed multiplier circuit, a low voltage high performance CMOS four quadrant analog multiplier is designed and fabricated by us作者: Optimum 時間: 2025-3-23 03:45
An Optimizing Technique for MDGT Using DRSA Algorithm Association with IP Traceback Strategiestely, or by disturbing it completely, so as to cause customer baulking. Several traceback schemes are available to mitigate these attacks. The simulation approach also can be used to test the performing effects of different marking schemes in large-scale DDoS attacks. Based on the simulation and eva作者: dry-eye 時間: 2025-3-23 06:41
Designing a Promotor for a Novel Target Site Identified in Caspases for Initiating Apoptosis in Canch work, a computational approach has been adopted to design a promotor that targets the inactivated caspases particularly Pro-caspase-3 or caspase-7, which are the effector caspases that cleave the downstream substrates like lamin-A, ICAD and PARP. Out of the 38 anti-carcinomic compounds selected fo作者: Vo2-Max 時間: 2025-3-23 12:02
Learning Classifier Systems Approach for Automated Discovery of Hierarchical Censored Production Rul adaptive system that learns to perform the best action given its input. By . is generally meant the action that will receive the most reward or reinforcement from the system’s environment. A classifier system consists of three main components: rule and message system, apportionment of credit system作者: Fresco 時間: 2025-3-23 15:28 作者: Obsequious 時間: 2025-3-23 21:13
Inference of Gene Networks from Microarray Data through a Phenomic Approachtional methods of drug discovery and disease diagnosis is dependent upon our understanding of the biological basis of the interaction networks between the genes. Better modelling of biological processes and powerful evolutionary methods are proving to be a key factor in the solution of such problems作者: 逃避系列單詞 時間: 2025-3-24 01:01
A Novel Lattice Based Research Frame Work for Identifying Web User’s Behavior with Web Usage Miningusers’ access patterns from web logs. This information can be used to identify the behavior of the web user. However, the web data will grow rapidly in the short time, and some of the web data may be antiquated. The user behavior may be changed when the new web data is inserted into and the old web 作者: Temporal-Lobe 時間: 2025-3-24 04:25 作者: 青春期 時間: 2025-3-24 09:05 作者: CANON 時間: 2025-3-24 14:26
Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Maps the odd key values. Byte substitution is applied in the second step to improve the security against the known/chosen-plaintext attack. Finally, confusion and diffusion are obtained using the sub diagonal diffusion of adjacent pixels and XORing with the chaotic key. The numbers of rounds in the ste作者: LITHE 時間: 2025-3-24 18:19
Network Forensic Analysis by Correlation of Attacks with Network Attributesm incidents. We extend our previously proposed model for collecting network data, identifying suspicious packets, examining protocol features misused and correlating attack attributes. This model is capable of handling attacks on the TCP/IP suite. The results obtained by this model are validated.作者: chalice 時間: 2025-3-24 21:28 作者: 群島 時間: 2025-3-25 00:30 作者: Picks-Disease 時間: 2025-3-25 07:24
Rajat Sheel Jain,Neeraj Kumar,Brijesh Kumar as lighting, occlusion or self-occlusion in scenes happens. We argue that there could be multiple 3D human meshes corresponding a single image from a view point, because we really do not know what happens in extreme lighting or behind occlusion/self occlusion. In this paper, we address the problem 作者: NICE 時間: 2025-3-25 07:55
Manash Pratim Sarma,Kandarpa Kumar Sarma graphs to extract discriminative features. However, due to the fixed topology shared among different poses and the lack of direct long-range temporal dependencies, it is not trivial to learn the robust spatial-temporal feature. Therefore, we present a spatial-temporal adaptive graph convolutional n作者: Lice692 時間: 2025-3-25 13:32
K. Dhanumjaya,G. Kiran Kumar,M. N. Giriprasad,M. Raja Reddymodels have a limited generalization ability under the scale and location mismatch between objects, as only few samples from target classes are provided. Therefore, the lack of a mechanism to match the scale and location between pairs of compared images leads to the performance degradation. The impo作者: 知識分子 時間: 2025-3-25 17:36
Prasenjit Choudhury,Rajasekhar Gaddam,Rajesh Babu Parisi,Manohar Babu Dasari,Satyanarayana Vuppalamodels have a limited generalization ability under the scale and location mismatch between objects, as only few samples from target classes are provided. Therefore, the lack of a mechanism to match the scale and location between pairs of compared images leads to the performance degradation. The impo作者: 不公開 時間: 2025-3-25 22:14 作者: Nerve-Block 時間: 2025-3-26 01:36 作者: 生命層 時間: 2025-3-26 05:10
Silpakesav Velagaleti,Pavankumar Gorpuni,K. K. Mahapatraity of existing networks are relatively fixed, which makes it difficult for them to be flexibly applied to devices with different computational constraints. Instead of manually designing the network structure for each specific device, in this paper, we propose a novel training-free neural architectu作者: ENNUI 時間: 2025-3-26 11:46
Ankita Tijare,Pravin Dakholest generative ZSL methods exploit category semantic plus Gaussian noise to generate visual features. However, there is a contradiction between the unity of category semantic and the diversity of visual features. The semantic of a single category cannot accurately correspond to different individuals 作者: MIRTH 時間: 2025-3-26 16:20 作者: Genome 時間: 2025-3-26 16:52 作者: antedate 時間: 2025-3-26 20:59
Suraiya Jabinble across a variety of datasets coming from different scanners, hospitals, and acquisition protocols. In practice, this remains a challenge due to the complexities of the different types of domain shifts. In this paper, we address the domain-shift by proposing a novel domain adaptation framework fo作者: oxidant 時間: 2025-3-27 02:37
S. S. Sujatha,M. Mohamed Sathiksarial defenses have been carried out in academia. However, there is few research on adversarial attacks and adversarial defenses of point cloud semantic segmentation models, especially in the field of autonomous driving. The stability and robustness of point cloud semantic segmentation models are o作者: 暫時中止 時間: 2025-3-27 07:47 作者: 修飾 時間: 2025-3-27 10:13
V. V. R. Maheswara Rao,V. Valli Kumarieatment for HCC is surgical resection. However, patients with HCC are still at a huge risk of recurrence after tumor resection. In this light, preoperative early recurrence prediction methods are necessary to guide physicians to develop an individualized preoperative treatment plan and postoperative作者: Subdue 時間: 2025-3-27 14:38
Vydeki Dharmar,K. Jayanthyposed, FL remains vulnerable to security attacks (such as poisoning attacks and evasion attacks) because of its distributed nature. Additionally, real-world training data used in FL are usually Non-Independent and Identically Distributed (Non-IID), which further weakens the robustness of the existin作者: Regurgitation 時間: 2025-3-27 20:38 作者: 身體萌芽 時間: 2025-3-27 23:51
I. Shatheesh Sam,P. Devaraj,R. S. Bhuvaneswarans problem, the face images in the database and the query images captured on spot are acquired under quite different conditions or even using different equipments. Conventional approaches either treat the samples in a uniform model or introduce an intermediate conversion stage, both of which would le作者: 秘密會議 時間: 2025-3-28 04:35
Atul Kant Kaushik,Emmanuel S. Pilli,R. C. Joshiection error, which, in the pinhole camera model case, is nonlinear in the 3D point coordinates. We study the triangulation of points lying on a 3D line, which is a typical problem for Structure-From-Motion in man-made environments. We show that the reprojection error can be minimized by finding the作者: ANN 時間: 2025-3-28 08:59
Deepali Virmani,Satbir Jainn important problem in image processing and computer vision. Modelling a signal using only a . orientation is often too restrictive, since occlusions and transparency happen frequently, thus necessitating the modelling and analysis of ...In this paper, we therefore develop a unifying mathematical mo作者: 燕麥 時間: 2025-3-28 12:03
978-3-642-15765-3Springer-Verlag Berlin Heidelberg 2010作者: 遷移 時間: 2025-3-28 15:29 作者: 星星 時間: 2025-3-28 19:28
1865-0929 Overview: up-to-date results.fast track conference proceedings.state-of-the-art report978-3-642-15765-3978-3-642-15766-0Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 除草劑 時間: 2025-3-29 01:34
https://doi.org/10.1007/978-3-642-15766-0IEEE 802; 16; Information Retrieval; Management; Multimedia; Performance; algorithms; classification; data m作者: 過多 時間: 2025-3-29 03:59
Network Forensic Analysis by Correlation of Attacks with Network Attributesm incidents. We extend our previously proposed model for collecting network data, identifying suspicious packets, examining protocol features misused and correlating attack attributes. This model is capable of handling attacks on the TCP/IP suite. The results obtained by this model are validated.作者: Climate 時間: 2025-3-29 09:05 作者: 頌揚(yáng)本人 時間: 2025-3-29 13:28 作者: Inkling 時間: 2025-3-29 19:18
A Novel High Speed Dynamic Comparator Using Positive Feedback with Low Power Dissipation and Low Offparator such that near equal current distribution in the input transistors can be achieved for a meta-stable point of the comparator. Restricted signal swing clock for the tail current is also used to ensure constant currents in the differential pairs.作者: Flatus 時間: 2025-3-29 22:00
A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheauthentication results with low computational cost and high performance by comparing with existing content-based authentication procedure. The proposed scheme implemented the existing methods like secret wavelet filter parameterization, wireless image authentication and structural digital signature.作者: 代理人 時間: 2025-3-30 03:02 作者: Jacket 時間: 2025-3-30 07:35
Protecting Digital Images Using DTCWT-DCT embedding and extracting the watermark. This paper compares various watermarking algorithms like DCT, Discrete Wavelet Transform (DWT), DTCWT, DCT-DWT with DTCWT-DCT method. This hybrid DTCWT-DCT shows superior performance in the presence of geometric and signal processing operations.作者: 類型 時間: 2025-3-30 09:58 作者: 澄清 時間: 2025-3-30 16:26 作者: TIGER 時間: 2025-3-30 19:59 作者: 強(qiáng)有力 時間: 2025-3-31 00:15 作者: 拱形面包 時間: 2025-3-31 04:38
Speech Recognition of Assamese Numerals Using Combinations of LPC - Features and Heterogenous ANNsh numerals of Assamese- a language spoken by a sizable population in the North-Eastern part of India. The performance of the LPC feature set is further compared with that obtained PCA features applied to the same LVQ block.作者: 消音器 時間: 2025-3-31 08:26
Design and Modeling of Power Efficient, High Performance 32-bit ALU through Advanced HDL Synthesish, based on the data and clock activities.Our simulation results indicate that, for the 180nm-65nm CMOS technologies [6] it is possible to reduce the ALU total energy by 18%-24%, with minimal delay degradation. In addition, there is up to 22%-32% reduction in leakage power in the standby mode.作者: 成績上升 時間: 2025-3-31 09:41 作者: JEER 時間: 2025-3-31 16:27
Inference of Gene Networks from Microarray Data through a Phenomic Approachom expression data using phenotypic interactions. The benefit of this is that we avoid the need for an explicit objective function in the optimization process. In order to realize this, we have implemented a method called as the Phenomic algorithm and validated it for stability and accuracy in the reconstruction of gene networks.作者: Lipoprotein(A) 時間: 2025-3-31 17:45 作者: 丑惡 時間: 2025-4-1 00:01
Robust and Real Time Data Delivery in Wireless Sensor Networkstimely delivery of data is done through a prior bandwidth reservation. Simulation results show that the proposed control plane and bandwidth reservation ensures higher priority traffic more bandwidth than lower priority traffic and guarantees real-time data delivery.