派博傳思國際中心

標(biāo)題: Titlebook: Information and Communication Technologies; International Confer Vinu V Das,R. Vijaykumar Conference proceedings 2010 Springer-Verlag Berli [打印本頁]

作者: 尖酸好    時間: 2025-3-21 19:54
書目名稱Information and Communication Technologies影響因子(影響力)




書目名稱Information and Communication Technologies影響因子(影響力)學(xué)科排名




書目名稱Information and Communication Technologies網(wǎng)絡(luò)公開度




書目名稱Information and Communication Technologies網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information and Communication Technologies被引頻次




書目名稱Information and Communication Technologies被引頻次學(xué)科排名




書目名稱Information and Communication Technologies年度引用




書目名稱Information and Communication Technologies年度引用學(xué)科排名




書目名稱Information and Communication Technologies讀者反饋




書目名稱Information and Communication Technologies讀者反饋學(xué)科排名





作者: 沒收    時間: 2025-3-21 22:13

作者: 不開心    時間: 2025-3-22 03:03

作者: 一個姐姐    時間: 2025-3-22 05:26

作者: 以煙熏消毒    時間: 2025-3-22 10:04
Bi-variate Polynomial Approximation of Fuzzy Controller Using Genetic Algorithm for Trajectory Contr Algorithm. In the proposed method, initially Fuzzy PD+I controller is used for control of PUMA560. The input and output data points are collected from the Fuzzy PD controllers of individual joints. With these data points a bi-variate polynomial approximation function is obtained through interpolati
作者: Obscure    時間: 2025-3-22 14:06

作者: Offensive    時間: 2025-3-22 19:01
A Novel High Speed Dynamic Comparator Using Positive Feedback with Low Power Dissipation and Low Offification, the design was simulated in CADENCE GPDK 90nm CMOS Technology at 1.8Vsupply voltage. Nearly 18mV Offset Voltage, power dissipation 2.564mW, speed 2.812GHZ, propagation delay 0.3556ns is easily achieved with the proposed structure. Inputs are reconfigured from typical differential pair com
作者: syring    時間: 2025-3-22 21:14
VLSI Design of Four Quadrant Analog Voltage-Mode Multiplier and Its Applicationtion & to that of voltage difference circuit. The circuit is formed by cascading the complementary diode pair connection with the voltage difference circuit. Based on the proposed multiplier circuit, a low voltage high performance CMOS four quadrant analog multiplier is designed and fabricated by us
作者: Optimum    時間: 2025-3-23 03:45
An Optimizing Technique for MDGT Using DRSA Algorithm Association with IP Traceback Strategiestely, or by disturbing it completely, so as to cause customer baulking. Several traceback schemes are available to mitigate these attacks. The simulation approach also can be used to test the performing effects of different marking schemes in large-scale DDoS attacks. Based on the simulation and eva
作者: dry-eye    時間: 2025-3-23 06:41
Designing a Promotor for a Novel Target Site Identified in Caspases for Initiating Apoptosis in Canch work, a computational approach has been adopted to design a promotor that targets the inactivated caspases particularly Pro-caspase-3 or caspase-7, which are the effector caspases that cleave the downstream substrates like lamin-A, ICAD and PARP. Out of the 38 anti-carcinomic compounds selected fo
作者: Vo2-Max    時間: 2025-3-23 12:02
Learning Classifier Systems Approach for Automated Discovery of Hierarchical Censored Production Rul adaptive system that learns to perform the best action given its input. By . is generally meant the action that will receive the most reward or reinforcement from the system’s environment. A classifier system consists of three main components: rule and message system, apportionment of credit system
作者: Fresco    時間: 2025-3-23 15:28

作者: Obsequious    時間: 2025-3-23 21:13
Inference of Gene Networks from Microarray Data through a Phenomic Approachtional methods of drug discovery and disease diagnosis is dependent upon our understanding of the biological basis of the interaction networks between the genes. Better modelling of biological processes and powerful evolutionary methods are proving to be a key factor in the solution of such problems
作者: 逃避系列單詞    時間: 2025-3-24 01:01
A Novel Lattice Based Research Frame Work for Identifying Web User’s Behavior with Web Usage Miningusers’ access patterns from web logs. This information can be used to identify the behavior of the web user. However, the web data will grow rapidly in the short time, and some of the web data may be antiquated. The user behavior may be changed when the new web data is inserted into and the old web
作者: Temporal-Lobe    時間: 2025-3-24 04:25

作者: 青春期    時間: 2025-3-24 09:05

作者: CANON    時間: 2025-3-24 14:26
Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Maps the odd key values. Byte substitution is applied in the second step to improve the security against the known/chosen-plaintext attack. Finally, confusion and diffusion are obtained using the sub diagonal diffusion of adjacent pixels and XORing with the chaotic key. The numbers of rounds in the ste
作者: LITHE    時間: 2025-3-24 18:19
Network Forensic Analysis by Correlation of Attacks with Network Attributesm incidents. We extend our previously proposed model for collecting network data, identifying suspicious packets, examining protocol features misused and correlating attack attributes. This model is capable of handling attacks on the TCP/IP suite. The results obtained by this model are validated.
作者: chalice    時間: 2025-3-24 21:28

作者: 群島    時間: 2025-3-25 00:30

作者: Picks-Disease    時間: 2025-3-25 07:24
Rajat Sheel Jain,Neeraj Kumar,Brijesh Kumar as lighting, occlusion or self-occlusion in scenes happens. We argue that there could be multiple 3D human meshes corresponding a single image from a view point, because we really do not know what happens in extreme lighting or behind occlusion/self occlusion. In this paper, we address the problem
作者: NICE    時間: 2025-3-25 07:55
Manash Pratim Sarma,Kandarpa Kumar Sarma graphs to extract discriminative features. However, due to the fixed topology shared among different poses and the lack of direct long-range temporal dependencies, it is not trivial to learn the robust spatial-temporal feature. Therefore, we present a spatial-temporal adaptive graph convolutional n
作者: Lice692    時間: 2025-3-25 13:32
K. Dhanumjaya,G. Kiran Kumar,M. N. Giriprasad,M. Raja Reddymodels have a limited generalization ability under the scale and location mismatch between objects, as only few samples from target classes are provided. Therefore, the lack of a mechanism to match the scale and location between pairs of compared images leads to the performance degradation. The impo
作者: 知識分子    時間: 2025-3-25 17:36
Prasenjit Choudhury,Rajasekhar Gaddam,Rajesh Babu Parisi,Manohar Babu Dasari,Satyanarayana Vuppalamodels have a limited generalization ability under the scale and location mismatch between objects, as only few samples from target classes are provided. Therefore, the lack of a mechanism to match the scale and location between pairs of compared images leads to the performance degradation. The impo
作者: 不公開    時間: 2025-3-25 22:14

作者: Nerve-Block    時間: 2025-3-26 01:36

作者: 生命層    時間: 2025-3-26 05:10
Silpakesav Velagaleti,Pavankumar Gorpuni,K. K. Mahapatraity of existing networks are relatively fixed, which makes it difficult for them to be flexibly applied to devices with different computational constraints. Instead of manually designing the network structure for each specific device, in this paper, we propose a novel training-free neural architectu
作者: ENNUI    時間: 2025-3-26 11:46
Ankita Tijare,Pravin Dakholest generative ZSL methods exploit category semantic plus Gaussian noise to generate visual features. However, there is a contradiction between the unity of category semantic and the diversity of visual features. The semantic of a single category cannot accurately correspond to different individuals
作者: MIRTH    時間: 2025-3-26 16:20

作者: Genome    時間: 2025-3-26 16:52

作者: antedate    時間: 2025-3-26 20:59
Suraiya Jabinble across a variety of datasets coming from different scanners, hospitals, and acquisition protocols. In practice, this remains a challenge due to the complexities of the different types of domain shifts. In this paper, we address the domain-shift by proposing a novel domain adaptation framework fo
作者: oxidant    時間: 2025-3-27 02:37
S. S. Sujatha,M. Mohamed Sathiksarial defenses have been carried out in academia. However, there is few research on adversarial attacks and adversarial defenses of point cloud semantic segmentation models, especially in the field of autonomous driving. The stability and robustness of point cloud semantic segmentation models are o
作者: 暫時中止    時間: 2025-3-27 07:47

作者: 修飾    時間: 2025-3-27 10:13
V. V. R. Maheswara Rao,V. Valli Kumarieatment for HCC is surgical resection. However, patients with HCC are still at a huge risk of recurrence after tumor resection. In this light, preoperative early recurrence prediction methods are necessary to guide physicians to develop an individualized preoperative treatment plan and postoperative
作者: Subdue    時間: 2025-3-27 14:38
Vydeki Dharmar,K. Jayanthyposed, FL remains vulnerable to security attacks (such as poisoning attacks and evasion attacks) because of its distributed nature. Additionally, real-world training data used in FL are usually Non-Independent and Identically Distributed (Non-IID), which further weakens the robustness of the existin
作者: Regurgitation    時間: 2025-3-27 20:38

作者: 身體萌芽    時間: 2025-3-27 23:51
I. Shatheesh Sam,P. Devaraj,R. S. Bhuvaneswarans problem, the face images in the database and the query images captured on spot are acquired under quite different conditions or even using different equipments. Conventional approaches either treat the samples in a uniform model or introduce an intermediate conversion stage, both of which would le
作者: 秘密會議    時間: 2025-3-28 04:35
Atul Kant Kaushik,Emmanuel S. Pilli,R. C. Joshiection error, which, in the pinhole camera model case, is nonlinear in the 3D point coordinates. We study the triangulation of points lying on a 3D line, which is a typical problem for Structure-From-Motion in man-made environments. We show that the reprojection error can be minimized by finding the
作者: ANN    時間: 2025-3-28 08:59
Deepali Virmani,Satbir Jainn important problem in image processing and computer vision. Modelling a signal using only a . orientation is often too restrictive, since occlusions and transparency happen frequently, thus necessitating the modelling and analysis of ...In this paper, we therefore develop a unifying mathematical mo
作者: 燕麥    時間: 2025-3-28 12:03
978-3-642-15765-3Springer-Verlag Berlin Heidelberg 2010
作者: 遷移    時間: 2025-3-28 15:29

作者: 星星    時間: 2025-3-28 19:28
1865-0929 Overview: up-to-date results.fast track conference proceedings.state-of-the-art report978-3-642-15765-3978-3-642-15766-0Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 除草劑    時間: 2025-3-29 01:34
https://doi.org/10.1007/978-3-642-15766-0IEEE 802; 16; Information Retrieval; Management; Multimedia; Performance; algorithms; classification; data m
作者: 過多    時間: 2025-3-29 03:59
Network Forensic Analysis by Correlation of Attacks with Network Attributesm incidents. We extend our previously proposed model for collecting network data, identifying suspicious packets, examining protocol features misused and correlating attack attributes. This model is capable of handling attacks on the TCP/IP suite. The results obtained by this model are validated.
作者: Climate    時間: 2025-3-29 09:05

作者: 頌揚(yáng)本人    時間: 2025-3-29 13:28

作者: Inkling    時間: 2025-3-29 19:18
A Novel High Speed Dynamic Comparator Using Positive Feedback with Low Power Dissipation and Low Offparator such that near equal current distribution in the input transistors can be achieved for a meta-stable point of the comparator. Restricted signal swing clock for the tail current is also used to ensure constant currents in the differential pairs.
作者: Flatus    時間: 2025-3-29 22:00
A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheauthentication results with low computational cost and high performance by comparing with existing content-based authentication procedure. The proposed scheme implemented the existing methods like secret wavelet filter parameterization, wireless image authentication and structural digital signature.
作者: 代理人    時間: 2025-3-30 03:02

作者: Jacket    時間: 2025-3-30 07:35
Protecting Digital Images Using DTCWT-DCT embedding and extracting the watermark. This paper compares various watermarking algorithms like DCT, Discrete Wavelet Transform (DWT), DTCWT, DCT-DWT with DTCWT-DCT method. This hybrid DTCWT-DCT shows superior performance in the presence of geometric and signal processing operations.
作者: 類型    時間: 2025-3-30 09:58

作者: 澄清    時間: 2025-3-30 16:26

作者: TIGER    時間: 2025-3-30 19:59

作者: 強(qiáng)有力    時間: 2025-3-31 00:15

作者: 拱形面包    時間: 2025-3-31 04:38
Speech Recognition of Assamese Numerals Using Combinations of LPC - Features and Heterogenous ANNsh numerals of Assamese- a language spoken by a sizable population in the North-Eastern part of India. The performance of the LPC feature set is further compared with that obtained PCA features applied to the same LVQ block.
作者: 消音器    時間: 2025-3-31 08:26
Design and Modeling of Power Efficient, High Performance 32-bit ALU through Advanced HDL Synthesish, based on the data and clock activities.Our simulation results indicate that, for the 180nm-65nm CMOS technologies [6] it is possible to reduce the ALU total energy by 18%-24%, with minimal delay degradation. In addition, there is up to 22%-32% reduction in leakage power in the standby mode.
作者: 成績上升    時間: 2025-3-31 09:41

作者: JEER    時間: 2025-3-31 16:27
Inference of Gene Networks from Microarray Data through a Phenomic Approachom expression data using phenotypic interactions. The benefit of this is that we avoid the need for an explicit objective function in the optimization process. In order to realize this, we have implemented a method called as the Phenomic algorithm and validated it for stability and accuracy in the reconstruction of gene networks.
作者: Lipoprotein(A)    時間: 2025-3-31 17:45

作者: 丑惡    時間: 2025-4-1 00:01
Robust and Real Time Data Delivery in Wireless Sensor Networkstimely delivery of data is done through a prior bandwidth reservation. Simulation results show that the proposed control plane and bandwidth reservation ensures higher priority traffic more bandwidth than lower priority traffic and guarantees real-time data delivery.




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
离岛区| 宁陕县| 夹江县| 荆州市| 罗江县| 泰兴市| 金乡县| 焉耆| 牙克石市| 清水县| 穆棱市| 兰西县| 达孜县| 治县。| 高要市| 唐河县| 泸定县| 达孜县| 手机| 东明县| 湘阴县| 白水县| 蒲城县| 西安市| 辛集市| 高陵县| 和政县| 孟州市| 霍州市| 客服| 恩平市| 和田市| 宁国市| 河源市| 凉山| 安顺市| 集安市| 六盘水市| 准格尔旗| 治县。| 凌源市|