派博傳思國際中心

標題: Titlebook: Intelligent Computing and Networking; Proceedings of IC-IC Valentina Emilia Balas,Vijay Bhaskar Semwal,Anand Conference proceedings 2022 T [打印本頁]

作者: 漏出    時間: 2025-3-21 17:57
書目名稱Intelligent Computing and Networking影響因子(影響力)




書目名稱Intelligent Computing and Networking影響因子(影響力)學科排名




書目名稱Intelligent Computing and Networking網絡公開度




書目名稱Intelligent Computing and Networking網絡公開度學科排名




書目名稱Intelligent Computing and Networking被引頻次




書目名稱Intelligent Computing and Networking被引頻次學科排名




書目名稱Intelligent Computing and Networking年度引用




書目名稱Intelligent Computing and Networking年度引用學科排名




書目名稱Intelligent Computing and Networking讀者反饋




書目名稱Intelligent Computing and Networking讀者反饋學科排名





作者: GUEER    時間: 2025-3-21 21:03

作者: 要塞    時間: 2025-3-22 02:56
Performance Evaluation of an IoT Edge-Based Computer Vision Scheme for Agglomerations Detection Covformed through videos from a public database. The obtained results demonstrate a gain in terms of computational performance with a video analysis in comparison to the best solutions available in the literature. The proposed solution can be a powerful edge tool to support the combat against Covid-19 Pandemic.
作者: CERE    時間: 2025-3-22 05:56

作者: 邪惡的你    時間: 2025-3-22 08:47
Comparative Review of Content Based Image Retrieval Using Deep Learning,utline the superiority of CBIR using deep learning over traditional CBIR methods. An experiment has been conducted to evaluate the efficacy of CNN over traditionally used machine learning algorithms like FNN and decision tree classifier.
作者: Senescent    時間: 2025-3-22 15:10
Data Clustering Algorithms: Experimentation and Comparison,rithms like K-Means, Agglomerative, and DBSCAN. A tabular comparison of algorithms is represented to acquire in-depth knowledge. The results obtained after experimenting with algorithms are also been discussed at the end.
作者: avenge    時間: 2025-3-22 20:02

作者: 發(fā)芽    時間: 2025-3-23 00:19

作者: conscribe    時間: 2025-3-23 01:38

作者: BRINK    時間: 2025-3-23 09:08
A Comparative Study of Clustering Algorithm,in those clusters is assigned rather than placing every data object into a distinct cluster. This paper focuses on comparative study of different clustering algorithms that are applied in data mining.
作者: flaunt    時間: 2025-3-23 12:50
Conference proceedings 2022N 2021), organized by the Computer Department, Thakur College of Engineering and Technology, in Mumbai, Maharashtra, India, on February 26–27, 2021. The book includes innovative and novel papers in the areas of intelligent computing, artificial intelligence, machine learning, deep learning, fuzzy lo
作者: eustachian-tube    時間: 2025-3-23 17:22
Cloud Attacks and Defence Mechanism for SaaS: A Survey,ro-level and macro-level. This paper also discusses the different solutions for these attacks, identified the gaps of each solutions and recommends methods which can be adopted to further improve the discussed solutions.
作者: 無能的人    時間: 2025-3-23 20:22
2367-3370 ng February 2021.Serves as a reference for researchers and p.This book gathers high-quality peer-reviewed research papers presented at the International Conference on Intelligent Computing and Networking (IC-ICN 2021), organized by the Computer Department, Thakur College of Engineering and Technolog
作者: AVOID    時間: 2025-3-23 22:50
A Statistical Review on Covid-19 Pandemic and Outbreak,. A statistical study of the current case helps to analyze the impact of the pandemic and take required measures and is preserved for future use in case of a similar situation. The world data of covid-19 is compared and studied graphically from the very start of the pandemic till date.
作者: 全神貫注于    時間: 2025-3-24 05:15

作者: coalition    時間: 2025-3-24 07:06

作者: demote    時間: 2025-3-24 12:48

作者: Mangle    時間: 2025-3-24 15:29
Design and Development of Clustering Algorithm for Wireless Sensor Network,ans algorithm will build the nature of cluster and mainly it focuses on the assignment of cluster which is centroid selection so as to improve the clustering performance through K-Means clustering. There are some of the methods for initialization through which we can hypertune our algorithm to impro
作者: 浪費時間    時間: 2025-3-24 22:16
Performance Evaluation of Secure Web Usage Mining Technique to Predict Consumer Behaviour (SWUM-PCBer of rows. Secondly, it lacks the foolproof system of security of data. The proposed algorithm (SWUM-PCB), which has been accomplished on genuine information of website by utilizing Hash table, Hashing Encryption (Message Digest algorithm MD5), association rule mining has a marked edge over the con
作者: EPT    時間: 2025-3-25 03:07

作者: CAPE    時間: 2025-3-25 06:22
Design and Develop Data Analysis and Forecasting of the Sales Using Machine Learning,zing our foundation (however not however much our High Values), genuinely continuous and creates moderate income. High Value: The gathering we would prefer not to lose. High Revenue, Frequency and low Inactivity. Market Basket Analysis is a technique which recognizes the nature of connection between
作者: Ganglion    時間: 2025-3-25 11:14

作者: 數量    時間: 2025-3-25 12:06
Detection and Performance Evaluation of Online-Fraud Using Deep Learning Algorithms,Click-bait and Non-Click-bait, in terms of Accuracy, Precision and Recall. The graphs achieved are also self-explanatory in terms of reliability of the system. A comparative analysis is also been done to show the effectiveness of our design with respect to detecting Click-bait which is heavily prese
作者: myopia    時間: 2025-3-25 16:27
Akram Harun Shaikh,B. B. Meshrameben der Anodenspannung auch den Heizstrom m?glichst herabzusetzen. Die ersten Versuche liegen schon weit zurück. Sowohl in Deutschland als auch im Auslande versuchte man R?hren besonders als Starkstromr?hren für die Drahttelephonie zu entwickeln, die die hohe Elektronenemission der Oxydkathoden aus
作者: 邊緣帶來墨水    時間: 2025-3-25 23:46

作者: 故意    時間: 2025-3-26 03:25
Sonia Sharma,Dalipchen Einfühlung und Erfindergabe für seinen Kranken die jeweils günstigste Stellung herausfinden. Die Klagen, die der Patient dabei ?u?ert, sind ein sicherer Wegweiser; durch sie geleitet, wird man bald hier ein Kissen unterschieben, dort ein Gelenk beugen — und die Situation ist schon gebessert.
作者: 使迷惑    時間: 2025-3-26 05:22
Mukta Nivelkar,S. G. Bhirudprechend ihren Absorptionsgesetzen innerhalb der Schattenkontur eine . des Objekts in .- und . erfolgt. Ein homogenes Objekt von verschiedener Dicke wird an der Stelle seines gr??ten Breitedurchmessers am st?rksten absorbieren und umgekehrt, wo es am dünnsten ist am meisten Strahlung durchlassen. De
作者: 神秘    時間: 2025-3-26 11:39

作者: 手勢    時間: 2025-3-26 13:06
Khyaati Shrikant,Vaishnavi Gupta,Anand Khandare,Palak Furia7 schon auf 23 belief (Gilchrist.)). Das war der Anfang der R?ntgentherapie! Freund.) war der erste, der das B?se zum Guten wenden wollte, scho? aber mit der zum Zwecke der Enthaarung ausgeführten Bestrahlung eines gro?en Naevus pilosus weit über das Ziel hinaus.
作者: 減震    時間: 2025-3-26 20:27

作者: 鞠躬    時間: 2025-3-27 00:42

作者: 圓桶    時間: 2025-3-27 03:56
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/469512.jpg
作者: Substance-Abuse    時間: 2025-3-27 06:45
978-981-16-4862-5The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor
作者: adulterant    時間: 2025-3-27 11:58

作者: FAWN    時間: 2025-3-27 15:14

作者: Canary    時間: 2025-3-27 18:04
Performance Evaluation of an IoT Edge-Based Computer Vision Scheme for Agglomerations Detection Covtem latency requirements and a huge amount of data transmitted in the network. This architecture aims to decentralize systems and extend cloud resources to devices located at the edge of networks. Various benefits regarding local processing, lower latency, and better communication bandwidth can be h
作者: 訓誡    時間: 2025-3-28 00:48

作者: 有抱負者    時間: 2025-3-28 04:13

作者: 宮殿般    時間: 2025-3-28 08:22
Cloud Attacks and Defence Mechanism for SaaS: A Survey,oday, increase in the number of services provided by these systems. These services range from software-based systems to high-end hardware-based infrastructures. The wide variety attracts a lot of attention by unwanted hackers, due to which the cloud deployments are one of the most cyber attacked ent
作者: 放棄    時間: 2025-3-28 12:28
,“Palisade”—A Student Friendly Social Media Website, companies and experience at interviews or etc. and also like, comment on respective posts, and also user can able to follow or unfollow a user to get updates from different users. We feel very difficult to find blood donors at difficult times, this website provides a list of blood donors with their
作者: 不幸的人    時間: 2025-3-28 15:45

作者: 終端    時間: 2025-3-28 20:11
Fuzzy-Logic Approach for Traffic Light Control Based on IoT Technology,hip. Traffic congestion not only causes air pollution and fuel wastage, but it also leads to an increased commuting time and reduces the work time availability. Due to these reasons, traffic congestion needs to be controlled and reduced. The traffic light is the most widely adopted method to control
作者: fiscal    時間: 2025-3-29 01:32
Data Clustering Algorithms: Experimentation and Comparison,ide the data points based on their similarity to each other. Clustering can be stated as an unsupervised data mining technique that describes the nature of datasets. The main objective of data clustering is to obtain groups of similar entities. There are various methods of clustering such as hierarc
作者: 新星    時間: 2025-3-29 06:25
Design and Development of Clustering Algorithm for Wireless Sensor Network,sively, studied. Clustering method are widely used for partitioned the data. In Unsupervised Machine Learning K-Means is very powerful technique. K-means algorithm calculation is a repetitive process where we try to limit the distance of data points from the approximate data points in cluster. A pow
作者: 侵略主義    時間: 2025-3-29 10:55

作者: THROB    時間: 2025-3-29 12:21
A Statistical Review on Covid-19 Pandemic and Outbreak,he above statement true. A similar situation is being experienced in the present day, a war against an invisible enemy; the novel COVID-19 coronavirus. A statistical study of the current case helps to analyze the impact of the pandemic and take required measures and is preserved for future use in ca
作者: Inflated    時間: 2025-3-29 18:02
Performance Evaluation of Secure Web Usage Mining Technique to Predict Consumer Behaviour (SWUM-PCBeasing day by day. So investigating client‘s conduct is a significant piece of web architecture which is helpful for decision making, planning sites as indicated by the client‘s needs. To understand and handle consumers’ web behaviour, web usage mining (WUM) is used which includes data preprocessing
作者: overweight    時間: 2025-3-29 22:41

作者: 密切關系    時間: 2025-3-30 00:27

作者: 來自于    時間: 2025-3-30 07:18
Prediction of Depression Using Machine Learning and NLP Approach,. Thus, micro blogging websites are a rich source of opinion mining data or Sentiment Analysis (SA) information. Because of the recent advent of micro blogging, there are a few research papers dedicated to this subject. In our paper, we concentrate on Twitter, one of the leading micro blogging sites
作者: Muffle    時間: 2025-3-30 09:03
Detection and Performance Evaluation of Online-Fraud Using Deep Learning Algorithms,ociated with this is Click-bait. Click-baiting being the growing phenomenon on internet has the potential to intentionally mislead and attract online viewership thereby earning considerable revenue for the agencies providing such false information. There is need for accurately detecting such events
作者: 勤勞    時間: 2025-3-30 15:14

作者: 撫慰    時間: 2025-3-30 19:07
Message Propagation in Vehicular Ad Hoc Networks: A Review,llular networks and Worldwide Interoperability for Microwave Access (WiMAX), to becomeprompt web access for creating the media among vehicles and stable street side infrastructure. In addition, VANETs spirit utilize short-distance message strategies, for instance Wireless Fidelity (Wi-Fi) and Dedica
作者: 圖表證明    時間: 2025-3-30 23:41
A Comparative Study of Clustering Algorithm,imilar in nature to the other data points in that cluster as compared to the data points that are segregated in different groups. In layman words, the purpose is to form distinct groups of data points having alike characteristics and allot it into the groups. The clustering algorithms are advocated
作者: 隱士    時間: 2025-3-31 01:16
Akram Harun Shaikh,B. B. Meshramgro?er Exaktheit mathematisch darzustellen und in s?mtlichen F?llen qualitativ und quantitativ vorauszuberechnen, hatte man zuerst sein Augenmerk in den ersten Friedensjahren darauf gelenkt, durch besonders g?nstige Formgebungen bei Beibehaltung des normalen Aufbaus auf den h?chsten Wirkungsgrad zu
作者: 裂隙    時間: 2025-3-31 08:55
Nithin Katla,M. Goutham Kumar,Rohithraj Pidugu,S. Shitharthgro?er Exaktheit mathematisch darzustellen und in s?mtlichen F?llen qualitativ und quantitativ vorauszuberechnen, hatte man zuerst sein Augenmerk in den ersten Friedensjahren darauf gelenkt, durch besonders g?nstige Formgebungen bei Beibehaltung des normalen Aufbaus auf den h?chsten Wirkungsgrad zu
作者: 防御    時間: 2025-3-31 11:04
Sonia Sharma,Dalipch-topographischen Verh?ltnisse anbetrifft, sondern auch soweit es sich um die rein k?rperliche und psychische Beherrschung des Patienten zur absoluten Ruhigstellung zur Photographie handelt. über das erstere wird bei den einzelnen K?rperteilen das N?tige gesagt werden, über das letztere einige allg
作者: impale    時間: 2025-3-31 14:10

作者: 木質    時間: 2025-3-31 20:37

作者: 托人看管    時間: 2025-3-31 23:32
Khyaati Shrikant,Vaishnavi Gupta,Anand Khandare,Palak Furiaher, dicke Holzbretter, Menschenleiber, Steinmauern, Eisenplatten und wer wei?, was sonst noch eilfertige Geschw?tzigkeit und freigebige Phantasie erfand, ohne Schwierigkeit zu durchdringen. Da setzte ein weises Geschick den kühnsten Tr?umen und sch?nsten Hoffnungen einen b?sen D?mpfer auf. Es hatte




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
宽城| 香港| 天水市| 澎湖县| 班戈县| 芮城县| 聂拉木县| 五指山市| 仁怀市| 梅州市| 大兴区| 甘孜县| 鄯善县| 阿拉善右旗| 辽源市| 共和县| 凤台县| 宜黄县| 康平县| 白银市| 保靖县| 塔城市| 咸阳市| 会宁县| 盐源县| 泰来县| 思茅市| 新泰市| 鄂尔多斯市| 岢岚县| 郧西县| 阿克陶县| 鞍山市| 清远市| 禄劝| 朝阳市| 尚义县| 海兴县| 民县| 筠连县| 凌云县|