標(biāo)題: Titlebook: International Conference on Innovative Computing and Communications; Proceedings of ICICC Aboul Ella Hassanien,Oscar Castillo,Ajay Jaiswal [打印本頁] 作者: palliative 時(shí)間: 2025-3-21 18:50
書目名稱International Conference on Innovative Computing and Communications影響因子(影響力)
書目名稱International Conference on Innovative Computing and Communications影響因子(影響力)學(xué)科排名
書目名稱International Conference on Innovative Computing and Communications網(wǎng)絡(luò)公開度
書目名稱International Conference on Innovative Computing and Communications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱International Conference on Innovative Computing and Communications被引頻次
書目名稱International Conference on Innovative Computing and Communications被引頻次學(xué)科排名
書目名稱International Conference on Innovative Computing and Communications年度引用
書目名稱International Conference on Innovative Computing and Communications年度引用學(xué)科排名
書目名稱International Conference on Innovative Computing and Communications讀者反饋
書目名稱International Conference on Innovative Computing and Communications讀者反饋學(xué)科排名
作者: 擔(dān)心 時(shí)間: 2025-3-22 00:10
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/471391.jpg作者: Ccu106 時(shí)間: 2025-3-22 04:17 作者: 異常 時(shí)間: 2025-3-22 08:39
International Conference on Innovative Computing and Communications978-981-99-3315-0Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: Allege 時(shí)間: 2025-3-22 10:17
https://doi.org/10.1007/978-981-99-3315-0Innovative Communication Networks and Security; Innovative Computing; Internet of Things (IoT); Machine作者: 我邪惡 時(shí)間: 2025-3-22 15:00 作者: Externalize 時(shí)間: 2025-3-22 19:26 作者: Brain-Waves 時(shí)間: 2025-3-23 00:44
A Machine Vision-Based Approach for Tuberculosis Identification in Chest X-Rays Images of Patients,need for an accurate diagnosis, however. Even while there is generally available X-ray equipment, particularly in underdeveloped nations, there is sometimes a lack of radiological expertise, which makes it difficult to accurately evaluate the images. The ability to diagnose and, ultimately, cure the作者: 行乞 時(shí)間: 2025-3-23 04:03
,Prediction of Patients’ Incurable Diseases Utilizing Deep Learning Approach,eveloping in fields such as bioscience and health protection. In the field of medicine, prediction is an important but sometimes overlooked component. In this paper, the authors construct deep learning and ML approaches in the estimation of chronic illnesses in patients. Conduct several tests using 作者: 警告 時(shí)間: 2025-3-23 07:27 作者: Ardent 時(shí)間: 2025-3-23 17:14
Effective Strategies for Resource Allocation and Scheduling in Cloud Computing,ly infrastructure. In particular, IaaS clouds offer an accessible, flexible, and scalable infrastructure for the deployment of these scientific applications by giving users access to a virtually endless pool of resources that can be obtained, configured, and used on demand and charged on a pay-as-yo作者: Obscure 時(shí)間: 2025-3-23 21:05
A Brief Review Particle Swarm Optimization on Intrusion Detection System,gs up significant security-related challenges. In the past, a number of systems that provide host or network-level security have emerged. Many conventional security measures, such as, firewalls, spyware, authentication methods and antivirus software provide some way towards ensuring security, but th作者: FLINT 時(shí)間: 2025-3-23 23:19
CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Thro for their users through distributed and parallel computing. Due to the usage of technology and its facilities, large data has been stored and retrieved by their users. Thus, processing a huge volume of data has become progressively essential to satisfy their business and other private users effecti作者: parasite 時(shí)間: 2025-3-24 05:57 作者: 要控制 時(shí)間: 2025-3-24 10:20 作者: 違法事實(shí) 時(shí)間: 2025-3-24 12:47 作者: incontinence 時(shí)間: 2025-3-24 18:48
Trusted Cloud Service Framework for Cloud Computing Security,nient and timely access. IAM is a virtual server which manages user and resource rights and authorization. To control who has entry to what and how, IAM rules are collections of permissions that may be applied to either users or cloud resources. Cloud computing is an easily managed technology in whi作者: achlorhydria 時(shí)間: 2025-3-24 22:36 作者: DUCE 時(shí)間: 2025-3-24 23:36 作者: inhumane 時(shí)間: 2025-3-25 03:49
Diabetic Retinopathy Detection Using Deep CNN Architecture and Medical Prescription,n impairment or vision loss. The development of DR significantly depends on how long a person had diabetes. There is no cure for the DR, so we must detect DR in early stage so that we can prevent loss of vision. The manual process by ophthalmologists is a time-consuming process. Here in this paper, 作者: 人類的發(fā)源 時(shí)間: 2025-3-25 10:39
An Innovative Software Engineering Approach to Machine Learning for Increasing the Effectiveness ofvolutionize the healthcare sector. Realizing the full potential of artificial intelligence in healthcare requires finally adoption of cutting-edge software engineering methodologies. This review of the literature looks at the present status of software engineering and healthcare practices in the are作者: 付出 時(shí)間: 2025-3-25 15:38
Region of Interest and Feature-based Analysis to Detect Breast Cancer from a Mammogram Image,gnant tumours in mammography images utilising the Gabor cut algorithm for region of interest from the morphologically upgraded image for cancer detection with better detection rate and accuracy. To eliminate spurious matching points, the features were examined using the enhanced feature extraction t作者: Cultivate 時(shí)間: 2025-3-25 18:38 作者: Forehead-Lift 時(shí)間: 2025-3-26 00:01 作者: 高度 時(shí)間: 2025-3-26 03:49 作者: 饒舌的人 時(shí)間: 2025-3-26 04:33
Noor A. Husseinons, and frameworks for distributed and embedded real-time Java systems.? This book is aimed primarily at researchers in real-time embedded systems, particularly those who wish to understand the current state of the art in using Java in this domain.? Much of the work in real-time distributed, embedd作者: 阻撓 時(shí)間: 2025-3-26 08:38 作者: grudging 時(shí)間: 2025-3-26 13:42
S. Praveenkumar,Vivek Veeraiah,Sabyasachi Pramanik,Shaik Mahaboob Basha,Aloísio Vieira Lira Neto,Vicons, and frameworks for distributed and embedded real-time Java systems.? This book is aimed primarily at researchers in real-time embedded systems, particularly those who wish to understand the current state of the art in using Java in this domain.? Much of the work in real-time distributed, embedd作者: conservative 時(shí)間: 2025-3-26 20:07
Saif F. Abulhail,Mohammed Z. Al-Faizplications.Includes coverage of multiprocessor embedded syst.Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.? This book is aim作者: Forage飼料 時(shí)間: 2025-3-26 22:33
V. Vanjipriya,A. Sureshplications.Includes coverage of multiprocessor embedded syst.Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.? This book is aim作者: 序曲 時(shí)間: 2025-3-27 04:49 作者: Fulminate 時(shí)間: 2025-3-27 06:37
G. M. Nandana,Ashok Kumar Yadavplications.Includes coverage of multiprocessor embedded syst.Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.? This book is aim作者: 卡死偷電 時(shí)間: 2025-3-27 13:15 作者: arbovirus 時(shí)間: 2025-3-27 13:56 作者: 涂掉 時(shí)間: 2025-3-27 20:08
Ashok Kumar Munnangi,Sivaram Rajeyyagari,Ramesh Sekaran,Nashreen Begum Jikkiriya,Manikandan Ramachanplications.Includes coverage of multiprocessor embedded syst.Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.? This book is aim作者: occult 時(shí)間: 2025-3-27 23:13
Usha Devi,Neera Batraplications.Includes coverage of multiprocessor embedded syst.Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.? This book is aim作者: 優(yōu)雅 時(shí)間: 2025-3-28 05:21 作者: syncope 時(shí)間: 2025-3-28 07:47
Alaa Sabree Awad,Ekram H. Hasan,Mustafa Amer Obaidy considered as a momentous historical event, not only because it was so unexpected, but because it symbolized an end to the Cold War, the freeing of several hundred million individuals from an authoritarian state which had kept them closed off from the rest of the world, and a liberation of private作者: left-ventricle 時(shí)間: 2025-3-28 11:58 作者: Chronological 時(shí)間: 2025-3-28 16:29
Rajasekhar Kommaraju,Nallamotu Haritha,Patibandla Yugala,Mukkera Pushpa,Sanikommu Yaswanth Reddyy considered as a momentous historical event, not only because it was so unexpected, but because it symbolized an end to the Cold War, the freeing of several hundred million individuals from an authoritarian state which had kept them closed off from the rest of the world, and a liberation of private作者: murmur 時(shí)間: 2025-3-28 20:31 作者: Colonnade 時(shí)間: 2025-3-28 23:54
D. Saranyaraj,R. Vaisshale,R. NandhaKishorewas enough to result in a ‘Selective Bibliography’ exceeding 700 items. Given the lead time for academic research it is not surprising that the subsequent years led to an explosion of writings; a June 2004 internet search under ‘post-communist transition’ produced an impossible 50,000 + items, and e作者: thwart 時(shí)間: 2025-3-29 06:55 作者: 煩人 時(shí)間: 2025-3-29 09:29
2367-3370 n the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.978-981-99-3314-3978-981-99-3315-0Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: AWRY 時(shí)間: 2025-3-29 12:43 作者: gimmick 時(shí)間: 2025-3-29 15:36
Real-Time Control of Humanoid Robotic Arm Motion Using IT2FLC Based on Kinect Sensor,ation results show the efficiency of the IT2FLC implementation after it is compared with Type1FLC (T1FLC). The simulation results showed that the IT2FLC is more accurate than T1FLC. The RMSE calculated by IT2FLC is less than the T1FLC.作者: Creatinine-Test 時(shí)間: 2025-3-29 22:43 作者: 售穴 時(shí)間: 2025-3-30 00:00 作者: 葡萄糖 時(shí)間: 2025-3-30 06:54
Trusted Cloud Service Framework for Cloud Computing Security,n the number of large and small firms investing in data infrastructure. Plus, they’re shelling out a lot of cash to keep the data secure. Using this approach to cloud computing significantly reduces the user’s dependence on hardware and software combinational models.作者: Decrepit 時(shí)間: 2025-3-30 08:21 作者: ADAGE 時(shí)間: 2025-3-30 15:40 作者: 帶來墨水 時(shí)間: 2025-3-30 20:32 作者: Mangle 時(shí)間: 2025-3-30 22:59 作者: 警告 時(shí)間: 2025-3-31 03:53
2367-3370 23.Serves as a reference for researchers and practitioners iThis book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, D作者: FLIC 時(shí)間: 2025-3-31 08:35 作者: BAIT 時(shí)間: 2025-3-31 09:18
Conference proceedings 2023tive works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.作者: 傻 時(shí)間: 2025-3-31 16:03
High-Level Deep Features and Convolutional Neural Network for Evaluating the Classification Performr non-JPG file for fragmented data clusters. The RABEI-2017 dataset was used for evaluating the performance of this study. The results demonstrate that the SVM method outperforms the ELM method with a high accuracy rate to classify fragmented JPG files. The accuracy of classification of the SVM meth作者: 無辜 時(shí)間: 2025-3-31 19:21 作者: optional 時(shí)間: 2025-3-31 22:51
,Prediction of Patients’ Incurable Diseases Utilizing Deep Learning Approach,proves significantly. When compared to different approaches, the DL approaches will produce a superior accuracy, which is around 97.9%. Approaches like this are used in making predictions about chronic illnesses including diabetes, heart disease, and breast cancer.作者: largesse 時(shí)間: 2025-4-1 03:05
Blockchain-Based Access Control with Decentralized Architecture for Data Storage and Transfer,r (DU) generates a registration request that is sent to the data owner (DO). In order to ensure safe transmission, an EHR application implements a data protection procedure. The cloud infrastructure incorporates components such as data consumers, data producers, blockchain transactions, smart contra作者: 濃縮 時(shí)間: 2025-4-1 08:24
Effective Strategies for Resource Allocation and Scheduling in Cloud Computing,g energy consumption—all without breaching service-level agreements. Comparisons of proposed and established methods have been found to yield positive outcomes in experiments. The utilization rate has been identified in existing system is 88, but the proposed system rate is 88.82.作者: incredulity 時(shí)間: 2025-4-1 12:09 作者: 令人心醉 時(shí)間: 2025-4-1 18:17
CryptoDataMR: Enhancing the Data Protection Using Cryptographic Hash and Encryption/Decryption Thrority breaches. This paper presents a solution CryptoDataMR model to enhance data protection by implementing cryptographic hash and encryption/decryption algorithms in the MapReduce programming model. The proposed model uses a chain rolling double hash algorithm at the map layer and position-based sh作者: 向外供接觸 時(shí)間: 2025-4-1 19:36 作者: 馬賽克 時(shí)間: 2025-4-2 02:19 作者: 盡責(zé) 時(shí)間: 2025-4-2 04:46