標題: Titlebook: Intelligent Computing and Networking; Proceedings of IC-IC Valentina Emilia Balas,Vijay Bhaskar Semwal,Anand Conference proceedings 2022 T [打印本頁] 作者: 漏出 時間: 2025-3-21 17:57
書目名稱Intelligent Computing and Networking影響因子(影響力)
書目名稱Intelligent Computing and Networking影響因子(影響力)學科排名
書目名稱Intelligent Computing and Networking網絡公開度
書目名稱Intelligent Computing and Networking網絡公開度學科排名
書目名稱Intelligent Computing and Networking被引頻次
書目名稱Intelligent Computing and Networking被引頻次學科排名
書目名稱Intelligent Computing and Networking年度引用
書目名稱Intelligent Computing and Networking年度引用學科排名
書目名稱Intelligent Computing and Networking讀者反饋
書目名稱Intelligent Computing and Networking讀者反饋學科排名
作者: GUEER 時間: 2025-3-21 21:03 作者: 要塞 時間: 2025-3-22 02:56
Performance Evaluation of an IoT Edge-Based Computer Vision Scheme for Agglomerations Detection Covformed through videos from a public database. The obtained results demonstrate a gain in terms of computational performance with a video analysis in comparison to the best solutions available in the literature. The proposed solution can be a powerful edge tool to support the combat against Covid-19 Pandemic.作者: CERE 時間: 2025-3-22 05:56 作者: 邪惡的你 時間: 2025-3-22 08:47
Comparative Review of Content Based Image Retrieval Using Deep Learning,utline the superiority of CBIR using deep learning over traditional CBIR methods. An experiment has been conducted to evaluate the efficacy of CNN over traditionally used machine learning algorithms like FNN and decision tree classifier.作者: Senescent 時間: 2025-3-22 15:10
Data Clustering Algorithms: Experimentation and Comparison,rithms like K-Means, Agglomerative, and DBSCAN. A tabular comparison of algorithms is represented to acquire in-depth knowledge. The results obtained after experimenting with algorithms are also been discussed at the end.作者: avenge 時間: 2025-3-22 20:02 作者: 發(fā)芽 時間: 2025-3-23 00:19 作者: conscribe 時間: 2025-3-23 01:38 作者: BRINK 時間: 2025-3-23 09:08
A Comparative Study of Clustering Algorithm,in those clusters is assigned rather than placing every data object into a distinct cluster. This paper focuses on comparative study of different clustering algorithms that are applied in data mining.作者: flaunt 時間: 2025-3-23 12:50
Conference proceedings 2022N 2021), organized by the Computer Department, Thakur College of Engineering and Technology, in Mumbai, Maharashtra, India, on February 26–27, 2021. The book includes innovative and novel papers in the areas of intelligent computing, artificial intelligence, machine learning, deep learning, fuzzy lo作者: eustachian-tube 時間: 2025-3-23 17:22
Cloud Attacks and Defence Mechanism for SaaS: A Survey,ro-level and macro-level. This paper also discusses the different solutions for these attacks, identified the gaps of each solutions and recommends methods which can be adopted to further improve the discussed solutions.作者: 無能的人 時間: 2025-3-23 20:22
2367-3370 ng February 2021.Serves as a reference for researchers and p.This book gathers high-quality peer-reviewed research papers presented at the International Conference on Intelligent Computing and Networking (IC-ICN 2021), organized by the Computer Department, Thakur College of Engineering and Technolog作者: AVOID 時間: 2025-3-23 22:50
A Statistical Review on Covid-19 Pandemic and Outbreak,. A statistical study of the current case helps to analyze the impact of the pandemic and take required measures and is preserved for future use in case of a similar situation. The world data of covid-19 is compared and studied graphically from the very start of the pandemic till date.作者: 全神貫注于 時間: 2025-3-24 05:15 作者: coalition 時間: 2025-3-24 07:06 作者: demote 時間: 2025-3-24 12:48 作者: Mangle 時間: 2025-3-24 15:29
Design and Development of Clustering Algorithm for Wireless Sensor Network,ans algorithm will build the nature of cluster and mainly it focuses on the assignment of cluster which is centroid selection so as to improve the clustering performance through K-Means clustering. There are some of the methods for initialization through which we can hypertune our algorithm to impro作者: 浪費時間 時間: 2025-3-24 22:16
Performance Evaluation of Secure Web Usage Mining Technique to Predict Consumer Behaviour (SWUM-PCBer of rows. Secondly, it lacks the foolproof system of security of data. The proposed algorithm (SWUM-PCB), which has been accomplished on genuine information of website by utilizing Hash table, Hashing Encryption (Message Digest algorithm MD5), association rule mining has a marked edge over the con作者: EPT 時間: 2025-3-25 03:07 作者: CAPE 時間: 2025-3-25 06:22
Design and Develop Data Analysis and Forecasting of the Sales Using Machine Learning,zing our foundation (however not however much our High Values), genuinely continuous and creates moderate income. High Value: The gathering we would prefer not to lose. High Revenue, Frequency and low Inactivity. Market Basket Analysis is a technique which recognizes the nature of connection between作者: Ganglion 時間: 2025-3-25 11:14 作者: 數量 時間: 2025-3-25 12:06
Detection and Performance Evaluation of Online-Fraud Using Deep Learning Algorithms,Click-bait and Non-Click-bait, in terms of Accuracy, Precision and Recall. The graphs achieved are also self-explanatory in terms of reliability of the system. A comparative analysis is also been done to show the effectiveness of our design with respect to detecting Click-bait which is heavily prese作者: myopia 時間: 2025-3-25 16:27
Akram Harun Shaikh,B. B. Meshrameben der Anodenspannung auch den Heizstrom m?glichst herabzusetzen. Die ersten Versuche liegen schon weit zurück. Sowohl in Deutschland als auch im Auslande versuchte man R?hren besonders als Starkstromr?hren für die Drahttelephonie zu entwickeln, die die hohe Elektronenemission der Oxydkathoden aus作者: 邊緣帶來墨水 時間: 2025-3-25 23:46 作者: 故意 時間: 2025-3-26 03:25
Sonia Sharma,Dalipchen Einfühlung und Erfindergabe für seinen Kranken die jeweils günstigste Stellung herausfinden. Die Klagen, die der Patient dabei ?u?ert, sind ein sicherer Wegweiser; durch sie geleitet, wird man bald hier ein Kissen unterschieben, dort ein Gelenk beugen — und die Situation ist schon gebessert.作者: 使迷惑 時間: 2025-3-26 05:22
Mukta Nivelkar,S. G. Bhirudprechend ihren Absorptionsgesetzen innerhalb der Schattenkontur eine . des Objekts in .- und . erfolgt. Ein homogenes Objekt von verschiedener Dicke wird an der Stelle seines gr??ten Breitedurchmessers am st?rksten absorbieren und umgekehrt, wo es am dünnsten ist am meisten Strahlung durchlassen. De作者: 神秘 時間: 2025-3-26 11:39 作者: 手勢 時間: 2025-3-26 13:06
Khyaati Shrikant,Vaishnavi Gupta,Anand Khandare,Palak Furia7 schon auf 23 belief (Gilchrist.)). Das war der Anfang der R?ntgentherapie! Freund.) war der erste, der das B?se zum Guten wenden wollte, scho? aber mit der zum Zwecke der Enthaarung ausgeführten Bestrahlung eines gro?en Naevus pilosus weit über das Ziel hinaus.作者: 減震 時間: 2025-3-26 20:27 作者: 鞠躬 時間: 2025-3-27 00:42 作者: 圓桶 時間: 2025-3-27 03:56
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/469512.jpg作者: Substance-Abuse 時間: 2025-3-27 06:45
978-981-16-4862-5The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: adulterant 時間: 2025-3-27 11:58 作者: FAWN 時間: 2025-3-27 15:14 作者: Canary 時間: 2025-3-27 18:04
Performance Evaluation of an IoT Edge-Based Computer Vision Scheme for Agglomerations Detection Covtem latency requirements and a huge amount of data transmitted in the network. This architecture aims to decentralize systems and extend cloud resources to devices located at the edge of networks. Various benefits regarding local processing, lower latency, and better communication bandwidth can be h作者: 訓誡 時間: 2025-3-28 00:48 作者: 有抱負者 時間: 2025-3-28 04:13 作者: 宮殿般 時間: 2025-3-28 08:22
Cloud Attacks and Defence Mechanism for SaaS: A Survey,oday, increase in the number of services provided by these systems. These services range from software-based systems to high-end hardware-based infrastructures. The wide variety attracts a lot of attention by unwanted hackers, due to which the cloud deployments are one of the most cyber attacked ent作者: 放棄 時間: 2025-3-28 12:28
,“Palisade”—A Student Friendly Social Media Website, companies and experience at interviews or etc. and also like, comment on respective posts, and also user can able to follow or unfollow a user to get updates from different users. We feel very difficult to find blood donors at difficult times, this website provides a list of blood donors with their作者: 不幸的人 時間: 2025-3-28 15:45 作者: 終端 時間: 2025-3-28 20:11
Fuzzy-Logic Approach for Traffic Light Control Based on IoT Technology,hip. Traffic congestion not only causes air pollution and fuel wastage, but it also leads to an increased commuting time and reduces the work time availability. Due to these reasons, traffic congestion needs to be controlled and reduced. The traffic light is the most widely adopted method to control作者: fiscal 時間: 2025-3-29 01:32
Data Clustering Algorithms: Experimentation and Comparison,ide the data points based on their similarity to each other. Clustering can be stated as an unsupervised data mining technique that describes the nature of datasets. The main objective of data clustering is to obtain groups of similar entities. There are various methods of clustering such as hierarc作者: 新星 時間: 2025-3-29 06:25
Design and Development of Clustering Algorithm for Wireless Sensor Network,sively, studied. Clustering method are widely used for partitioned the data. In Unsupervised Machine Learning K-Means is very powerful technique. K-means algorithm calculation is a repetitive process where we try to limit the distance of data points from the approximate data points in cluster. A pow作者: 侵略主義 時間: 2025-3-29 10:55 作者: THROB 時間: 2025-3-29 12:21
A Statistical Review on Covid-19 Pandemic and Outbreak,he above statement true. A similar situation is being experienced in the present day, a war against an invisible enemy; the novel COVID-19 coronavirus. A statistical study of the current case helps to analyze the impact of the pandemic and take required measures and is preserved for future use in ca作者: Inflated 時間: 2025-3-29 18:02
Performance Evaluation of Secure Web Usage Mining Technique to Predict Consumer Behaviour (SWUM-PCBeasing day by day. So investigating client‘s conduct is a significant piece of web architecture which is helpful for decision making, planning sites as indicated by the client‘s needs. To understand and handle consumers’ web behaviour, web usage mining (WUM) is used which includes data preprocessing作者: overweight 時間: 2025-3-29 22:41 作者: 密切關系 時間: 2025-3-30 00:27 作者: 來自于 時間: 2025-3-30 07:18
Prediction of Depression Using Machine Learning and NLP Approach,. Thus, micro blogging websites are a rich source of opinion mining data or Sentiment Analysis (SA) information. Because of the recent advent of micro blogging, there are a few research papers dedicated to this subject. In our paper, we concentrate on Twitter, one of the leading micro blogging sites作者: Muffle 時間: 2025-3-30 09:03
Detection and Performance Evaluation of Online-Fraud Using Deep Learning Algorithms,ociated with this is Click-bait. Click-baiting being the growing phenomenon on internet has the potential to intentionally mislead and attract online viewership thereby earning considerable revenue for the agencies providing such false information. There is need for accurately detecting such events 作者: 勤勞 時間: 2025-3-30 15:14 作者: 撫慰 時間: 2025-3-30 19:07
Message Propagation in Vehicular Ad Hoc Networks: A Review,llular networks and Worldwide Interoperability for Microwave Access (WiMAX), to becomeprompt web access for creating the media among vehicles and stable street side infrastructure. In addition, VANETs spirit utilize short-distance message strategies, for instance Wireless Fidelity (Wi-Fi) and Dedica作者: 圖表證明 時間: 2025-3-30 23:41
A Comparative Study of Clustering Algorithm,imilar in nature to the other data points in that cluster as compared to the data points that are segregated in different groups. In layman words, the purpose is to form distinct groups of data points having alike characteristics and allot it into the groups. The clustering algorithms are advocated 作者: 隱士 時間: 2025-3-31 01:16
Akram Harun Shaikh,B. B. Meshramgro?er Exaktheit mathematisch darzustellen und in s?mtlichen F?llen qualitativ und quantitativ vorauszuberechnen, hatte man zuerst sein Augenmerk in den ersten Friedensjahren darauf gelenkt, durch besonders g?nstige Formgebungen bei Beibehaltung des normalen Aufbaus auf den h?chsten Wirkungsgrad zu 作者: 裂隙 時間: 2025-3-31 08:55
Nithin Katla,M. Goutham Kumar,Rohithraj Pidugu,S. Shitharthgro?er Exaktheit mathematisch darzustellen und in s?mtlichen F?llen qualitativ und quantitativ vorauszuberechnen, hatte man zuerst sein Augenmerk in den ersten Friedensjahren darauf gelenkt, durch besonders g?nstige Formgebungen bei Beibehaltung des normalen Aufbaus auf den h?chsten Wirkungsgrad zu 作者: 防御 時間: 2025-3-31 11:04
Sonia Sharma,Dalipch-topographischen Verh?ltnisse anbetrifft, sondern auch soweit es sich um die rein k?rperliche und psychische Beherrschung des Patienten zur absoluten Ruhigstellung zur Photographie handelt. über das erstere wird bei den einzelnen K?rperteilen das N?tige gesagt werden, über das letztere einige allg作者: impale 時間: 2025-3-31 14:10 作者: 木質 時間: 2025-3-31 20:37 作者: 托人看管 時間: 2025-3-31 23:32
Khyaati Shrikant,Vaishnavi Gupta,Anand Khandare,Palak Furiaher, dicke Holzbretter, Menschenleiber, Steinmauern, Eisenplatten und wer wei?, was sonst noch eilfertige Geschw?tzigkeit und freigebige Phantasie erfand, ohne Schwierigkeit zu durchdringen. Da setzte ein weises Geschick den kühnsten Tr?umen und sch?nsten Hoffnungen einen b?sen D?mpfer auf. Es hatte