派博傳思國(guó)際中心

標(biāo)題: Titlebook: Intelligent Computing and Applications; Proceedings of ICDIC B. Narendra Kumar Rao,R. Balasubramanian,Richi Nay Conference proceedings 2023 [打印本頁]

作者: 小故障    時(shí)間: 2025-3-21 19:19
書目名稱Intelligent Computing and Applications影響因子(影響力)




書目名稱Intelligent Computing and Applications影響因子(影響力)學(xué)科排名




書目名稱Intelligent Computing and Applications網(wǎng)絡(luò)公開度




書目名稱Intelligent Computing and Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Intelligent Computing and Applications被引頻次




書目名稱Intelligent Computing and Applications被引頻次學(xué)科排名




書目名稱Intelligent Computing and Applications年度引用




書目名稱Intelligent Computing and Applications年度引用學(xué)科排名




書目名稱Intelligent Computing and Applications讀者反饋




書目名稱Intelligent Computing and Applications讀者反饋學(xué)科排名





作者: 繞著哥哥問    時(shí)間: 2025-3-21 23:54
,Classification of?Credit Card Frauds Using Autoencoded Features,r (IC3) had received 2,211,396 complaints culminating in a $13.3 billion loss which is approximately equal to cumulative loss from 2016–19. Credit card fraud detection is hindered by concept drift, uneven class distribution, identifying a smaller set of features, and detecting real-time frauds. To o
作者: 奇思怪想    時(shí)間: 2025-3-22 02:36

作者: Gobble    時(shí)間: 2025-3-22 06:39

作者: 使出神    時(shí)間: 2025-3-22 10:26
Data-Driven Approach to Deflate Consumption in Delay Tolerant Networks,ous frameworks that could require steady accessibility. The capacity to move, or course, information from a communicating end to a tolerant end is an urgent limit of all data exchanging frameworks should have. Deferral-tolerant systems (DTNs) are inspected by their deficiency of accessibility, provo
作者: 來就得意    時(shí)間: 2025-3-22 15:53

作者: canvass    時(shí)間: 2025-3-22 17:37
Design of a Deep Network Model for Weed Classification,arming is to predict the precise crop and weed location over the farmland. Here, a novel dense convolutional neural networks (DCNN)-based network is proposed to differentiate weeds from crops. The overall architecture of crop and weed prediction is extensive, with enormous parameters requiring a lon
作者: 執(zhí)    時(shí)間: 2025-3-22 23:08
E-Voting System Using U-Net Architecture with Blockchain Technology,ypes of voting system: paper ballots and electronic voting machines (EVMs), both of which have similar drawbacks. The provision of security in a digital voting system has long been a major concern. In the proposed work, implemented an interface. Firstly, the user has to register after which they wil
作者: 光明正大    時(shí)間: 2025-3-23 02:48

作者: insincerity    時(shí)間: 2025-3-23 09:26

作者: 獸群    時(shí)間: 2025-3-23 15:57

作者: Lacerate    時(shí)間: 2025-3-23 21:59

作者: parsimony    時(shí)間: 2025-3-23 22:12
Detection of COVID-19 Using CNN and ML Algorithms,ases there are many false positive cases we see that person does not have corona and still the prediction comes true and also in some cases, it happens that person has corona but it does not get detected (false negative case). So due to this problem, we here come up with the two approaches and make
作者: 辯論    時(shí)間: 2025-3-24 02:26
Prioritization of Watersheds Using GIS and Fuzzy Analytical Hierarchy (FAHP) Method,study area Kaddam watershed part of the Godavari basin has been selected to prioritize the watersheds. The study area has a watershed divide with watershed codes of 4E3C4 (Sikkumanu River), classified as Eleven watersheds (4E3C4a to 4E3C4k), and 4E3C5 (Kaddam river) classified into seven watersheds
作者: 高調(diào)    時(shí)間: 2025-3-24 08:15
A Narrative Framework with Ensemble Learning for Face Emotion Recognition,ity, entertainment, employment and so on. Most auspicious part of our research across the world is focusing to the living being and nature, etc. Our ancient myths are stated that mind is the origin of all the thoughts and it can be expresses by eyes. Artificial intelligence is playing vital role in
作者: liaison    時(shí)間: 2025-3-24 11:01
Modified Cloud-Based Malware Identification Technique Using Machine Learning Approach,is needed as there is growth in the impact of the mobile devices nowadays, threat developers also active in spreading the malware day to day to weaken the user’s data privacy and integrity as it is eventually need for the mobile users. So, there is a need of effective framework to identify the malwa
作者: 提名    時(shí)間: 2025-3-24 14:56

作者: PAEAN    時(shí)間: 2025-3-24 20:11
Diagnosis of COVID-19 Using Artificial Intelligence Techniques,y uses historical data, it makes assumptions about the data without applying a defined set of rules. This allows the software to learn and adapt to information patterns in more real time. Numerous sources of medical images (e.g., X-ray, CT, and MRI) make deep learning a great technique to combat the
作者: 公司    時(shí)間: 2025-3-25 01:43

作者: Arteriography    時(shí)間: 2025-3-25 06:39
BIVFN: Blockchain-Enabled Intelligent Vehicular Fog Networks,-enabled intelligent vehicular fog network (BIVFN). This paper discusses the VFN also the architecture, and phases of BIVFN are explored in detail. BIVFN can attain the security and privacy requirements well because of blockchain and fog computing.
作者: perimenopause    時(shí)間: 2025-3-25 11:23

作者: 冒煙    時(shí)間: 2025-3-25 13:50

作者: 最高峰    時(shí)間: 2025-3-25 16:49
Multi-layered Architecture to Monitor and Control the Energy Management in Smart Cities,ur lives ‘smart’ leading to ‘smart city’ establishments. The present article proposes a novel ‘three-layered’ wireless sensor network architecture for energy meter monitoring control management in real time.
作者: 金哥占卜者    時(shí)間: 2025-3-25 21:20

作者: Tdd526    時(shí)間: 2025-3-26 00:39

作者: 防銹    時(shí)間: 2025-3-26 04:21

作者: excursion    時(shí)間: 2025-3-26 08:32

作者: Moderate    時(shí)間: 2025-3-26 12:56

作者: 公共汽車    時(shí)間: 2025-3-26 17:36

作者: 2否定    時(shí)間: 2025-3-27 00:38
Sampath Korra,V. Biksham,Kotte Vinaykumar,T. Bhaskar
作者: GRIPE    時(shí)間: 2025-3-27 02:34
A. K. Damodaram,S. Sreenivasa Chakravarthi,L. Venkateswara Reddy,K. Reddy Madhavi
作者: intertwine    時(shí)間: 2025-3-27 08:17

作者: GUILT    時(shí)間: 2025-3-27 10:08

作者: 松雞    時(shí)間: 2025-3-27 15:54

作者: relieve    時(shí)間: 2025-3-27 20:49
Nagendra Panini Challa,A. Mohan,Narendra Kumar Rao,Bhaskar Kumar Rao,J. S. Shyam Mohan,B. Balaji Bha
作者: incisive    時(shí)間: 2025-3-27 23:47
M. Raghav Srinivaas,Khanjan Shah,B. Abhishek,R. Jagadeesh Kannan,A. Balasundaram
作者: Resection    時(shí)間: 2025-3-28 05:18

作者: aspect    時(shí)間: 2025-3-28 06:20
Gavini Sreelatha,Aishwarya Govindkar,Sarukolla Ushaswini
作者: 無王時(shí)期,    時(shí)間: 2025-3-28 12:11

作者: 蜿蜒而流    時(shí)間: 2025-3-28 17:10

作者: 未完成    時(shí)間: 2025-3-28 18:50
2190-3018 Serves as a reference for researchers and practitioners in aThis book presents novel work of academicians, researchers, industry professionals, practitioners, and budding engineers to disseminate the most recent innovations, trends, and concerns along with the present-day challenges and the solving
作者: 溫室    時(shí)間: 2025-3-28 23:38

作者: 侵害    時(shí)間: 2025-3-29 05:30

作者: Parabola    時(shí)間: 2025-3-29 08:17
Bio-Inspired Firefly Algorithm for Polygonal Approximation on Various Shapes,s finding multiple optimal solutions concurrently. This technique achieves the main goal of PA that is minimum error value with less number of dominant points. The experimental results show that proposed algorithm generates better solutions compared to other algorithms.
作者: 領(lǐng)導(dǎo)權(quán)    時(shí)間: 2025-3-29 12:37

作者: 書法    時(shí)間: 2025-3-29 18:42

作者: projectile    時(shí)間: 2025-3-29 23:48

作者: lavish    時(shí)間: 2025-3-30 03:32
Automated Detection of Skin Lesions Using Back Propagation Neural Network,dentification and classification is performed using support vector machine (SVM) method for skin disease dataset. The results obtained specify that good accuracy 93% is achieved by reducing the data loss.
作者: 芭蕾舞女演員    時(shí)間: 2025-3-30 04:32
Conference proceedings 2023t innovations, trends, and concerns along with the present-day challenges and the solving approaches for implementation in the domains of data science, intelligent computing, and computer networks and security. It is a collection of selected high-quality research papers from the International Confer
作者: 跳脫衣舞的人    時(shí)間: 2025-3-30 12:03
,Classification of?Credit Card Frauds Using Autoencoded Features,pe, credit grade, credit line, book balance, and other features from a European credit card dataset. Also, the performance of different machine learning algorithms compared for the classification consistency using encoded features. The results obtained are as follows: accuracy of 99.95%, 97.45% precision, 88.26% recall, and 92.36% F1-score.
作者: ALLAY    時(shí)間: 2025-3-30 15:52
Code-Level Self-adaptive Approach for Building Reusable Software Components,is article presents the building of adaptive code-level reusable software components. A set of related components can be adaptive to create or modify a sample work product. For the work product, each product components are adaptive in their nature.
作者: 防御    時(shí)間: 2025-3-30 20:26

作者: 寒冷    時(shí)間: 2025-3-31 00:11

作者: Gullible    時(shí)間: 2025-3-31 01:20
B. Narendra Kumar Rao,R. Balasubramanian,Richi NayPresents research works in the field of data sciences.Results of ICDIC 2020 held in Sree Vidyanikethan Engineering College, Tirupati, India.Serves as a reference for researchers and practitioners in a
作者: 洞察力    時(shí)間: 2025-3-31 08:47

作者: 擦掉    時(shí)間: 2025-3-31 10:51

作者: 炸壞    時(shí)間: 2025-3-31 14:05
Intelligent Computing and Applications978-981-19-4162-7Series ISSN 2190-3018 Series E-ISSN 2190-3026
作者: 無法治愈    時(shí)間: 2025-3-31 17:56
https://doi.org/10.1007/978-981-19-4162-7Artificial Intelligence; Expert Systems; Computational Intelligence; Machine Learning; Deep Learning; Cog
作者: Ptosis    時(shí)間: 2025-3-31 23:30
Global South Doctoral Students and University Employment Services: Personalizing the Relationshipth’ and ‘employability,’ leading to insights into both the global south experience for doctoral students and their broader employability needs. We suggest that a shift towards relationship and agency is necessary to create an environment where global south students can enhance their employability as aligned with their own cultural circumstances.
作者: Bravado    時(shí)間: 2025-4-1 05:06
Das Maschinenzeichnen des Konstrukteursd with providing financing when no other source of capital is available for the sale and subsequent export itself. Airlines and lessors have also taken advantage of these programs to secure lower-cost financing. In this chapter, we will provide a detailed discussion of the various export credit agen
作者: Audiometry    時(shí)間: 2025-4-1 08:57

作者: 死貓他燒焦    時(shí)間: 2025-4-1 14:06
Infective Endocarditis: New Recommendations and Perspectives, a consequence of the medical progress (Fowler et al. 2005; Benito et al. 2009; Sy and Kritharides 2010). Thus, the most frequent causative agents now tend to be aggressive pathogens such as staphylococci, resistant-enterococci, or fungi. Although significant geographical variations exist, a signifi
作者: Lymphocyte    時(shí)間: 2025-4-1 14:57

作者: intricacy    時(shí)間: 2025-4-1 20:02
Formale und informelle Rollen in Organisationen, Rollen entstehen k?nnen. Diese Rollen-Mechanismen werden in Unterkapitel 3.3. erl?utert. Eine Rollenübernahme erfolgt abh?ngig von dem Rollen-Typ. Daher wird in 3.4. eine Klassifizierung von formalen und informellen Rollen-Typen vorgenommen.
作者: 清真寺    時(shí)間: 2025-4-2 00:38

作者: 女上癮    時(shí)間: 2025-4-2 03:45





歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
湘阴县| 遵义市| 扎鲁特旗| 松江区| 邯郸市| 南丰县| 绥宁县| 阳新县| 龙山县| 灌云县| 乌兰察布市| 沐川县| 洛宁县| 神池县| 潼关县| 道孚县| 清远市| 四子王旗| 安阳市| 犍为县| 星座| 新蔡县| 林口县| 关岭| 博湖县| 巴塘县| 峨眉山市| 康定县| 香格里拉县| 日土县| 资兴市| 灵丘县| 南宁市| 山阴县| 桂林市| 常宁市| 灵台县| 芜湖县| 吉首市| 登封市| 炎陵县|