標(biāo)題: Titlebook: Information and Communication Technology and Applications; Third International Sanjay Misra,Bilkisu Muhammad-Bello Conference proceedings [打印本頁(yè)] 作者: 轉(zhuǎn)變 時(shí)間: 2025-3-21 19:19
書目名稱Information and Communication Technology and Applications影響因子(影響力)
書目名稱Information and Communication Technology and Applications影響因子(影響力)學(xué)科排名
書目名稱Information and Communication Technology and Applications網(wǎng)絡(luò)公開度
書目名稱Information and Communication Technology and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information and Communication Technology and Applications被引頻次
書目名稱Information and Communication Technology and Applications被引頻次學(xué)科排名
書目名稱Information and Communication Technology and Applications年度引用
書目名稱Information and Communication Technology and Applications年度引用學(xué)科排名
書目名稱Information and Communication Technology and Applications讀者反饋
書目名稱Information and Communication Technology and Applications讀者反饋學(xué)科排名
作者: 安慰 時(shí)間: 2025-3-21 22:49
Application of Big Data Analytics for Improving Learning Process in Technical Vocational Education aigeria. Two research questions were answered. The descriptive survey design was employed and the target population was made up of experts in TVET. A structured questionnaire titled “Big Data Analytics in Technical Vocational Education and Training” (BDATVET) is the tool used for data compilation. BD作者: 聯(lián)邦 時(shí)間: 2025-3-22 00:33
A Survey for Recommender System for Groups. The aim of this paper is to provide an overview of the existing state of the art techniques for collecting ratings, strategies used in aggregating these strategies and the practical application for group recommendations. This study explored five databases which include IEEE, Science Direct, Spring作者: 不確定 時(shí)間: 2025-3-22 04:58
Prediction of Malaria Fever Using Long-Short-Term Memory and Big Data. This prevails in developing nations where healthcare facilities are not enough for the patients. The technological advancement in medicine has resulted in the collection of huge volumes of data from various sources in different formats. A reliable and early parasite-based diagnosis, identification作者: 紅潤(rùn) 時(shí)間: 2025-3-22 12:10 作者: SLUMP 時(shí)間: 2025-3-22 16:42
Comparative Analyses of Machine Learning Paradigms for Operators’ Voice Call Quality of Servicers increases over limited resources, the challenge of value for money paid becomes the concern of MNOs, and their customers. A significant weakness in the researchers’ assessment of operators’ voice call services is lack of performance evaluation on models developed base on a data set covering a bro作者: scoliosis 時(shí)間: 2025-3-22 19:07
LearnFuse: An Efficient Distributed Big Data Fusion Architecture Using Ensemble Learning Techniquetical result. This technique is less computationally expensive when compared with traditional method. In this work, spatial data were acquired, performed image filtration, standardization, feature extraction and Local learning method was adopted to partition the dataset into clusters. The portioned 作者: 消瘦 時(shí)間: 2025-3-22 21:12 作者: Overstate 時(shí)間: 2025-3-23 02:50
Analysis and Classification of Biomedical Data Using Machine Learning Techniques deaths in women. A biopsy in which tissue is microscopically extracted and analyzed will be used for the detection of breast cancer. The cancer cells are either categorized as cancer or non-cancer. There are various methods for classifying and predicting breast cancer. The proposed work uses a brea作者: lipoatrophy 時(shí)間: 2025-3-23 06:45
Emotion Recognition of Speech in Hindi Using Dimensionality Reduction and Machine Learning Technique. To predict human beings, the existing machine learning algorithms were applied to train the available dataset to obtain better results. This will result in obtaining much better response from machines by processing the human instruction & related emotions. Through machine learning techniques emoti作者: Maximizer 時(shí)間: 2025-3-23 11:34 作者: Pamphlet 時(shí)間: 2025-3-23 16:38 作者: Albinism 時(shí)間: 2025-3-23 20:53 作者: 善于騙人 時(shí)間: 2025-3-23 22:24
A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LSstributed Denial of Service (DDoS), Malware, Masquerade attacks and so on. Masquerade attack is one of the most dangerous security attacks, dangerous – because it is can easily go undetected as the damage might have been done before realizing the extent to which it is done. The traditional method of作者: 拾落穗 時(shí)間: 2025-3-24 02:34
An Automated Framework for Swift Lecture Evaluation Using Speech Recognition and NLPdents efficiently to improve the education quality. In this study. A novel framework for collection and swift processing of students’ feedbacks about lecture is proposed in this paper, which addresses the shortcomings of traditional scale-rated surveys and open-end comments. The automated framework 作者: 健忘癥 時(shí)間: 2025-3-24 06:38 作者: 猛烈責(zé)罵 時(shí)間: 2025-3-24 12:10
Hausa Intelligence Chatbot Systemnteracts with people in Hausa Language, which is the second most famous languages in Africa. Numerous chatbots have been created and continue to be created. To the best of our knowledge, there is very limited or no Chatbot that target Hausa Language, hence the catalyst of this research. The proposed作者: 不整齊 時(shí)間: 2025-3-24 18:07 作者: OCTO 時(shí)間: 2025-3-24 19:11
s providing agility, innovation, automatic scaling, flexibility in development and better evaluation and control of costs. It emerged as an evolution of microservices running in containers and implementing functions, which is why it is sometimes called function as a service. Although it has the afor作者: Contort 時(shí)間: 2025-3-25 01:09
een all pairs of vertices in a graph and is employed in areas like communication networking, traffic routing, bioinformatics, among others. However, FW is computationally and spatially expensive since it requires . operations and . memory space. As the graph gets larger, parallel computing becomes n作者: 愛了嗎 時(shí)間: 2025-3-25 05:25
Rytis Maskeliunas,Andrius Lauraitis,Robertas Damasevicius,Sanjay Misracy concerns due to their strong inference potential. In this work, we propose TUL-STEO, a novel deep learning approach, based on a combination of pretraining and fine-tuning, for performing a Trajectory-User Linking (TUL) attack (also called user re-identification attack). More precisely, TUL-STEO c作者: Cytokines 時(shí)間: 2025-3-25 10:44
Aliyu Mustapha,Abdullahi Kutiriko Abubakar,Haruna Dokoro Ahmed,Abdulkadir Mohammedore energy efficient than proof-of-work but are also well-studied and widely accepted within the community. However, PoS systems are susceptible to a particularly powerful “l(fā)ong-range" attack, where an adversary can corrupt the validator set retroactively and present forked versions of the blockchai作者: 設(shè)想 時(shí)間: 2025-3-25 13:10
Ananya Misrat poisoning attacks is plagued with confusion due to the proliferation of research that makes different assumptions about the capabilities of adversaries and the adversary models they operate under. Our work aims to clarify this confusion by presenting a comprehensive analysis of the various poisoni作者: Psa617 時(shí)間: 2025-3-25 18:18 作者: 咯咯笑 時(shí)間: 2025-3-25 20:51 作者: palette 時(shí)間: 2025-3-26 00:56 作者: 規(guī)范就好 時(shí)間: 2025-3-26 05:32 作者: 內(nèi)行 時(shí)間: 2025-3-26 12:12
Isabona Joseph,Ojuh O. Divinen be read, edited, and manipulated by adversaries using either the officially provided readable text format or some advanced binary analysis tools. Reverse engineering of Wasm binaries is often used for nefarious intentions, e.g., identifying and exploiting both classic and Wasm-specific vulnerabili作者: dominant 時(shí)間: 2025-3-26 15:09
Sujata Panda,Hima Bindu Maringantilnerabilities, the binary prediction outcomes offer limited support for accurate debugging and pinpointing vulnerabilities across different types. Additionally, the prevalent use of homogeneous GNN training has constrained the ability to effectively model the diverse relationships existing between c作者: HAVOC 時(shí)間: 2025-3-26 20:03
Akshat Agrawal,Anurag Jain Many security measures are evaluated against and thus restricted by the practical capability of ROP. However, the ROP automation state-of-the-art approaches have fundamental limitations in their gadget utilization and fall short of delivering the promise..To overcome these fundamental limitations, 作者: cortisol 時(shí)間: 2025-3-26 21:31
Ojuh O. Divine,Isabona Josephive data obtained through in-depth interviews. The research describes a recent study examining the impact of enterprise education on students pursuing Professional Higher Education (PHE) at an extensive vocational educational institution in the EU state of Malta. This paper aims to demonstrate how M作者: 引水渠 時(shí)間: 2025-3-27 05:06
Benjamin A. Gyunka,Oluwakemi C. Abikoye,Adekeye S. Adekunleor two cameras to measure 2D or 3D dynamics. The frames of the recorded videos are then postprocessed to correlate the structure points at different times and obtain displacement information. A plethora of cameras is available—in terms of frame rate, resolution, versatility, and overall quality—the 作者: 合群 時(shí)間: 2025-3-27 06:40
Kayode Omotosho Alabi,Sulaiman Olaniyi Abdulsalam,Roseline Oluwaseun Ogundokun,Micheal Olaolu Arowolipulation of ECG signals can result in inaccurate diagnosis or treatment because these signals are crucial for identifying and monitoring cardiovascular illnesses. Also, these signals are frequently sent via the internet, raising the possibility of unwanted access and manipulation. Hence, ECG signal作者: 證實(shí) 時(shí)間: 2025-3-27 10:37
Adam Adenike Azeezat,Onashoga Sadiat Adebukola,Abayomi-Alli Adebayo,Omoyiola Bayo Olusholaworks. Nonetheless, the growing complexity of datasets and the ongoing pursuit of enhanced performance necessitate innovative approaches. In this study, we introduce a novel deep neural network, referred to as the “T-Fusion Net,” which incorporates multiple spatial attention mechanisms based on loca作者: 船員 時(shí)間: 2025-3-27 13:52
Ochilbek RakhmanovoV) in thermal imaging systems often results in insufficient and fragmented large Field of View (FoV) simulation data, thereby compromising the effectiveness of defense applications using large Field of View (FoV) cameras. To address this challenge, we propose an innovative approach employing image 作者: 法官 時(shí)間: 2025-3-27 21:24
Emmanuel Adetiba,Amarachi E. Opara,Oluwaseun T. Ajayi,Folashade O. Owolabien contains excessive noise, whereas radar point clouds retain only limited information. In this work, we holistically treat the sparse nature of radar data by introducing an adaptive subsampling method together with a tailored network architecture that exploits the sparsity patterns to discover glo作者: obeisance 時(shí)間: 2025-3-27 23:25
Usman Haruna,Umar Sunusi Maitalata,Murtala Mohammed,Jaafar Zubairu Maitamamethods modify softmax scores fine-tuned on outlier data or leverage intermediate feature layers to identify distinctive patterns between In-Distribution (ID) and OOD samples. Other methods focus on employing diverse OOD samples to learn discrepancies between ID and OOD. These techniques, however, a作者: MIR 時(shí)間: 2025-3-28 03:10 作者: 做方舟 時(shí)間: 2025-3-28 06:23
https://doi.org/10.1007/978-3-030-69143-1artificial intelligence; communication channels (information theory); communication systems; computer h作者: 卵石 時(shí)間: 2025-3-28 12:58 作者: discord 時(shí)間: 2025-3-28 18:02
978-3-030-69142-4Springer Nature Switzerland AG 2021作者: 寬容 時(shí)間: 2025-3-28 21:11 作者: OUTRE 時(shí)間: 2025-3-29 00:53
Multi-class Model MOV-OVR for Automatic Evaluation of Tremor Disorders in Huntington’s Diseasebtained during research from subjects and patients with HD in Lithuania. The proposed SVM model achieved an accuracy of 97.09% in relation to 14 different classes, which were built according to the Shoulson-Fahn Total Functional Capacity (TFC) scale for assessing the patient’s tremor condition.作者: murmur 時(shí)間: 2025-3-29 06:23 作者: 松馳 時(shí)間: 2025-3-29 09:32
1865-0929 ations, ICTA 2020, held in Minna, Nigeria, in November 2020. Due to the COVID-19 pandemic the conference was held online.?.The 67 full papers were carefully reviewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine L作者: 濃縮 時(shí)間: 2025-3-29 13:00
Conference proceedings 2021TA 2020, held in Minna, Nigeria, in November 2020. Due to the COVID-19 pandemic the conference was held online.?.The 67 full papers were carefully reviewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine Learning;?I作者: 殺蟲劑 時(shí)間: 2025-3-29 15:35
A Survey for Recommender System for Groupser, ACM and Google Scholar, from which 300 publications were screened. Irrelevant, duplicate and ambiguous papers were removed. At the end, 26 papers were used for depth analysis. This study provides a systematic review of the available evidence based literature concerning recommender systems for groups.作者: Recessive 時(shí)間: 2025-3-29 22:32 作者: 尖叫 時(shí)間: 2025-3-30 03:54
A Conceptual Hybrid Model of Deep Convolutional Neural Network (DCNN) and Long Short-Term Memory (LS detecting such attack has proven to be ineffective as rate of false positives is always on the high side and True positives are low. This paper presents an automatic deep learning method of Convolutional Neural Network (CNN) with Long Short Term Memory (LSTM) model using the dataset from Greenberg and Schonlau.作者: judiciousness 時(shí)間: 2025-3-30 04:05
An Automated Framework for Swift Lecture Evaluation Using Speech Recognition and NLPuses speech recognition and NLP tools to produce frequency graph of mostly used words, which can help to identify the topics need to be revised. An experiment was successfully conducted to test the framework among 3. year undergraduate students.作者: Processes 時(shí)間: 2025-3-30 10:25
Improving the Prediction Accuracy of Academic Performance of the Freshman Using Wonderlic Personnel males, 52?males) students from 2 different faculties (Medicine and Computer Science) were collected. The results show that both IQ and ROCF are significantly correlated to CGPA. Linear regression test shows that the combination of IQ-ROCF (β?=?0.565) can serve as good feature to predict CGPA.作者: 是他笨 時(shí)間: 2025-3-30 14:27
Conference proceedings 2021iewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine Learning;?Information Security Privacy and Trust;?Information Science and Technology..作者: 獨(dú)輪車 時(shí)間: 2025-3-30 20:23
1865-0929 efully reviewed and selected from 234 submissions. The papers are organized in the topical sections on Artificial Intelligence, Big Data and Machine Learning;?Information Security Privacy and Trust;?Information Science and Technology..978-3-030-69142-4978-3-030-69143-1Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: calamity 時(shí)間: 2025-3-30 22:19 作者: Intend 時(shí)間: 2025-3-31 02:56 作者: 生存環(huán)境 時(shí)間: 2025-3-31 06:12 作者: Fester 時(shí)間: 2025-3-31 09:59
Prediction of Malaria Fever Using Long-Short-Term Memory and Big Datae study used a deep learning algorithm as a classifier for the proposed system. Three locations were selected from Irepodun Local Government Areas of Kwara State with 34 months periodic pattern. Each location?reacted?differently?based?on?environmental?factors.?The?findings?indicate?that?both factors作者: 思想流動(dòng) 時(shí)間: 2025-3-31 16:15 作者: 尖叫 時(shí)間: 2025-3-31 17:41 作者: allergen 時(shí)間: 2025-3-31 22:30
Emotion Recognition of Speech in Hindi Using Dimensionality Reduction and Machine Learning Techniquerates better results than the exiting machine learning (ML) classification techniques such as K-means nearest neighbor algorithm (KNN),Support vector machine (SVM) & decision tree(DT). This paper presents the results of various ML techniques that is used for finding out ER. Through SVM prediction ra作者: Compass 時(shí)間: 2025-4-1 04:05 作者: 協(xié)奏曲 時(shí)間: 2025-4-1 05:59
Anomaly Android Malware Detection: A Comparative Analysis of Six Classifiers PART, k-Nearest Neighbours (k-NN), and Support Vector Machine (SVM). The Machine learning tool that was used for the pre-processing of the feature sets and the classification processes is WEKA 3.8.2?suite. Findings of the study showed that Random Forest had the best detection result with false alar作者: Occlusion 時(shí)間: 2025-4-1 10:31 作者: 鎮(zhèn)痛劑 時(shí)間: 2025-4-1 14:50
Hausa Intelligence Chatbot Systemm would bring the Hausa language into the Artificial intelligence stage and it would serve as a reference material for future research and development. The result shows that the system is capable of communicating in simple Hausa words and will be able to learn simple words in Hausa. Developing syste