標題: Titlebook: Intelligent Systems for Smart Cities; Select Proceedings o Anand J. Kulkarni,Naoufel Cheikhrouhou Conference proceedings 2024 The Editor(s) [打印本頁] 作者: 神像之光環(huán) 時間: 2025-3-21 18:47
書目名稱Intelligent Systems for Smart Cities影響因子(影響力)
書目名稱Intelligent Systems for Smart Cities影響因子(影響力)學(xué)科排名
書目名稱Intelligent Systems for Smart Cities網(wǎng)絡(luò)公開度
書目名稱Intelligent Systems for Smart Cities網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Intelligent Systems for Smart Cities被引頻次
書目名稱Intelligent Systems for Smart Cities被引頻次學(xué)科排名
書目名稱Intelligent Systems for Smart Cities年度引用
書目名稱Intelligent Systems for Smart Cities年度引用學(xué)科排名
書目名稱Intelligent Systems for Smart Cities讀者反饋
書目名稱Intelligent Systems for Smart Cities讀者反饋學(xué)科排名
作者: 易改變 時間: 2025-3-21 21:07 作者: ITCH 時間: 2025-3-22 02:49 作者: Lacunar-Stroke 時間: 2025-3-22 05:25 作者: 緯線 時間: 2025-3-22 12:32 作者: 花束 時間: 2025-3-22 16:57
Image Steganography Using Particle Swarm Optimizationoses a steganographic method based on JPEG and the nature–inspired algorithm, Particle Swarm Optimisation (PSO) algorithm. The algorithm is used to first construct an optimal substitution matrix for modifying the undisclosed messages to make the quality of stego-images better. As well as being alter作者: 變白 時間: 2025-3-22 18:16
Intelligent Inventory Management in Retail Stores Using Four State of the Art Object Detection Modelolutional Neural Network), and MOBILENETSSD. These algorithms are being implemented and compared by mAP, or mean, average, and precision, and from that, the algorithm that works best for tracking is determined. Also, a webapp is created as a medium for visualization of the detected objects. Overall,作者: 植物茂盛 時間: 2025-3-23 01:13 作者: 粗糙濫制 時間: 2025-3-23 02:41
Real Time Food Monitoring and Quality Alert System Using IoT and Streamlitth an accuracy of 78%. Novel Visualizations and a dynamic food quality graph are displayed over an interactive Streamlit website and Thingspeakcloud server?achieving real time data communication with the user. The results show its relevance in the field of food logistics.作者: correspondent 時間: 2025-3-23 08:46 作者: 稱贊 時間: 2025-3-23 13:10
QuickTag: A Machine Learning-Based Automated Toll Collection System Using Optical Character Recognitowner is billed instantly using the auto-pay protocol. Vehicles pass through toll gates at a speed of 20–30?km/h. OCR-enabled speed cameras installed at the gates will capture the license plate, and text will be extracted from the image. In addition to that, a backup QR code will be installed on the作者: 群島 時間: 2025-3-23 17:45 作者: medium 時間: 2025-3-23 19:07 作者: EVADE 時間: 2025-3-23 23:05 作者: Mhc-Molecule 時間: 2025-3-24 04:43
onventional MRI. Complex fiber architecture is illustrated schematically and described concisely in textboxes directly on the relevant page. In the final part of the atlas, a straightforward, step-by-step appro978-3-662-50563-2978-3-642-20456-2作者: 評論性 時間: 2025-3-24 10:10
Trupti Baraskar,Uma Pujeri,Himangi Pandeearly detection of Parkinson’s disease using specific imaging biomarkers with the help of FA values, which will help in the early treatment of PD patients and thus extend and improve their quality of life. It w978-981-19-5003-2978-981-19-5001-8作者: Muscularis 時間: 2025-3-24 11:09
occurs at fixed (., .). values. This “transition” shows that a species can dominate the other in finite clusters. Moreover, the fractal dimension of the clusters drastically drops at the same critical values. These behaviours are interestingly new and unexpected.作者: ectropion 時間: 2025-3-24 15:45 作者: 迷住 時間: 2025-3-24 21:26
Atharva Wadpelli,Shivya Shrivastava,Apurva Pete,Lokesh Bhangale,S. S. Kulkarni5, contrary to expectations from the Rouse model. Therefore also the crossover from the Rouse-like behavior for chain length N less than the entanglement chain length Ne to reptation-like behavior for long chains shows some unexpected features..Finally we briefly discuss the motion of chains in cons作者: expunge 時間: 2025-3-24 23:25 作者: OATH 時間: 2025-3-25 06:27 作者: Dedication 時間: 2025-3-25 10:08
Jyoti Mante (Khurpade),Prerna Patil,Megha Dhotay,Shilpa Budhavalesource localization are based on these two types of estimators or their variants. This book also includes algorithms that leverage partial-time information for source localization and a brief discussion of interesting unresolved problems in this area.978-3-031-79284-7978-3-031-79285-4Series ISSN 2690-4306 Series E-ISSN 2690-4314 作者: 污點 時間: 2025-3-25 13:57 作者: 含糊其辭 時間: 2025-3-25 19:38
Rahil Parikh,Ashwini Dalvints, you will find a short summary called “To review” which outlines the major take-home messages from that section. In summary, this chapter is intended to help with standard DTI acquisitions, improve and optimize image quality of such exams, and is presented in a way to help ensure the acquisition作者: Communal 時間: 2025-3-25 22:28
Kavita,Rajender Singh Chhillarnts, you will find a short summary called “To review” which outlines the major take-home messages from that section. In summary, this chapter is intended to help with standard DTI acquisitions, improve and optimize image quality of such exams, and is presented in a way to help ensure the acquisition作者: 剛毅 時間: 2025-3-26 01:30
Sujeet Kumar,Shejal Pujari,Abhishek Kulkarni,Pawan Misal,Ishaan R. Kalents, you will find a short summary called “To review” which outlines the major take-home messages from that section. In summary, this chapter is intended to help with standard DTI acquisitions, improve and optimize image quality of such exams, and is presented in a way to help ensure the acquisition作者: 某人 時間: 2025-3-26 06:22
, and how to use them optimally. Finally, strengths and limitations of connectivity analysis based on tractography-derived measures are discussed. If performed and interpreted correctly, fibre tracking may provide useful complementary information in preclinical research and has potential future util作者: 事物的方面 時間: 2025-3-26 10:31
Pramod Kanjalkar,Samyak Jain,Rutuj Saraf,Jyoti Kanjalkar, and how to use them optimally. Finally, strengths and limitations of connectivity analysis based on tractography-derived measures are discussed. If performed and interpreted correctly, fibre tracking may provide useful complementary information in preclinical research and has potential future util作者: Saline 時間: 2025-3-26 13:50
Vidit Gupta,S. Vijayakumar Bharathints, you will find a short summary called “To review” which outlines the major take-home messages from that section. In summary, this chapter is intended to help with standard DTI acquisitions, improve and optimize image quality of such exams, and is presented in a way to help ensure the acquisition作者: Herd-Immunity 時間: 2025-3-26 20:09
Sourjadip Pramanik,Vaibhav Kadam,Shripad Bhatlawandeanatomically important structures are clearly labeled both on DTI-derived color maps and conventional MRI. Complex fiber architecture is illustrated schematically and described concisely in textboxes directly on the relevant page. In the final part of the atlas, a straightforward, step-by-step appro作者: 亂砍 時間: 2025-3-27 00:50
Aniket Nargundkar,Anand J. Kulkarni,Milind Pandeanatomically important structures are clearly labeled both on DTI-derived color maps and conventional MRI. Complex fiber architecture is illustrated schematically and described concisely in textboxes directly on the relevant page. In the final part of the atlas, a straightforward, step-by-step appro作者: Antarctic 時間: 2025-3-27 02:29 作者: Essential 時間: 2025-3-27 07:40 作者: Medicare 時間: 2025-3-27 12:50
Amritesh,Mohammed Masood Owais,Vaibhav Vemula,Amityush Amit,S. Natarajananatomically important structures are clearly labeled both on DTI-derived color maps and conventional MRI. Complex fiber architecture is illustrated schematically and described concisely in textboxes directly on the relevant page. In the final part of the atlas, a straightforward, step-by-step appro作者: placebo 時間: 2025-3-27 14:18
Conference proceedings 2024nce is ‘Intelligent Systems for Smart Cities‘. It covers the topics of intelligent systems in multiple aspects such as healthcare, supply chain and logistics, smart homes and smart structures, banking and finance, a sustainable environment, social media and cyber security, crime prevention, and disa作者: 土產(chǎn) 時間: 2025-3-27 21:50 作者: Individual 時間: 2025-3-28 01:49
Credit Card Fraud Detection System Using Support Vector Classifier can successfully detect fraudulent transactions while minimizing false positives. The findings demonstrate that the suggested approach outperforms conventional fraud detection techniques, offering a possible answer to the problems associated with credit card fraud detection.作者: watertight, 時間: 2025-3-28 05:07 作者: Nostalgia 時間: 2025-3-28 09:42 作者: TOM 時間: 2025-3-28 12:58
social media and cyber security, crime prevention, and disaster management. The book will be useful for researchers and professionals interested in the broad field of artificial intelligence and machine learning..978-981-99-6983-8978-981-99-6984-5作者: 無表情 時間: 2025-3-28 18:28 作者: debacle 時間: 2025-3-28 20:29
Anand J. Kulkarni,Naoufel CheikhrouhouComprises peer-reviewed proceedings of the conference ICISA 2023.Covers the latest research in technological advances in the field of artificial intelligence and machine learning.Enriches understandin作者: Corporeal 時間: 2025-3-29 02:33 作者: 得罪 時間: 2025-3-29 04:29
https://doi.org/10.1007/978-981-99-6984-5Smart Cities; Banking and Finance; Social-Media, Cyber security & Crime Prevention; Infrastructure; Heal作者: 窒息 時間: 2025-3-29 09:06
Manifesta: An Event Management Platform Using Recommendation System way by using an online platform. A new event-driven platform for smart cities is proposed in this paper for simplifying event management services. This paper proposes an intelligent website named “Manifesta” for event management services that would enable an intelligent environment for event manage作者: noxious 時間: 2025-3-29 13:40
An Empirical Study on the Information Security Threats Due to Remote Working Environmentsurity issues. Insecure human internet use habits (unprotected home networks, unpatched software), organizational policies regarding cyber security during remote work, insecure teleconferencing and video conferencing practices and sophisticated cyber-attack techniques are a few of the reasons respons作者: dearth 時間: 2025-3-29 17:29
Intelligent Surveillance Tower for Detection of the Drone from the Other Aerial Objects Using Deep Lar-based systems have limitations, including high costs, complex installation procedures, and limited accuracy in detecting small and low-flying drones. To address these limitations, this paper presents a novel drone detection system-based on deep learning using a modified You Only Look Once (YOLO) 作者: Aggregate 時間: 2025-3-29 20:23 作者: SHOCK 時間: 2025-3-30 00:59
Credit Card Fraud Detection System Using Support Vector Classifier growing issue of credit card fraud in online purchases. The suggested system analyses and pre-processes transaction data using the Support Vector Classifier algorithm, which effectively identifies fraudulent activity. The paper’s main objective is to show how the Support Vector Classifier algorithm作者: comely 時間: 2025-3-30 07:53 作者: 不可磨滅 時間: 2025-3-30 10:56
Machine Learning Techniques for Real-Time Human Face Recognitionvily on face detection and recognition. When it comes to authentication and other forms of security, the face is where it’s at. An improved and faster facial detection system is a primary goal. This work introduces a CNN and Python-based Face Recognition System. The paper presents the analysis of ma作者: habitat 時間: 2025-3-30 15:40
Image Steganography Using Particle Swarm Optimizationdeo, and images to obfuscate sensitive information?are commonly referred to as known as Steganography. Maintaining a fair trade-off between increased bit embedding rate, security, imperceptibility, and robustness is the major problem of steganographic system design. Therefore, with the enormous adva作者: Mercurial 時間: 2025-3-30 16:49
Intelligent Inventory Management in Retail Stores Using Four State of the Art Object Detection Modelse in everyday life, business management development and improvement are two areas where it is particularly useful. Today’s industry demands that inventory management and space allocation be done effectively as there are significantly greater chances of operator error associated with manual tracking作者: synovium 時間: 2025-3-30 21:18
Supply Chain Risk Management Through Zero-Trust Architecturerchy process (FAHP) developed in the study. Even though the idea of failure inquiry has been covered in earlier research, its integration with knowledge-based planning is not adequately addressed. This study fills this gap in three key steps, which are as follows. First, the preceding literature is 作者: Irremediable 時間: 2025-3-31 04:19
Real Time Food Monitoring and Quality Alert System Using IoT and Streamlitd demand for food, the risk of contamination and spoilage has also increased, leading to significant public health and economic consequences. In order to protect food from contamination during transportation caused by environmental factors, this paper suggests an IoT framework for easy food monitori作者: 大量 時間: 2025-3-31 07:53 作者: overbearing 時間: 2025-3-31 09:16
QuickTag: A Machine Learning-Based Automated Toll Collection System Using Optical Character Recognitlt to manually handle the gridlock, making the process cumbersome and time-consuming. Currently, toll collection is done using FASTag, which operates as a digital wallet. The toll is deducted when the operator scans the vehicle barcode, if the balance is insufficient the driver has to pay using cash作者: Subdue 時間: 2025-3-31 15:10 作者: 有偏見 時間: 2025-3-31 21:34
Localised Land-Use Classification Using U-Net and Satellite Imagingitable, which leads to improper development of cities. With increasing urbanisation and the advancement of technology, we get an opportunity to explore the idea of land-use classification. Modern software and models do provide such information but at a high zoom level which defeats the purpose of lo作者: 沒血色 時間: 2025-3-31 22:17 作者: Tonometry 時間: 2025-4-1 03:39
etween aggregating spins in presence of an external magnetic field is defined. This model generates a kinetic growth competition between two kinds of entities and leads to a wide variety of kinetic processes and morphologies distributed in the “phase diagram” of the two growth parameters (coupling a