派博傳思國際中心

標(biāo)題: Titlebook: International Conference on Intelligent Computing and Smart Communication 2019; Proceedings of ICSC Geetam Singh Tomar,Narendra S. Chaudha [打印本頁]

作者: Jurisdiction    時(shí)間: 2025-3-21 18:13
書目名稱International Conference on Intelligent Computing and Smart Communication 2019影響因子(影響力)




書目名稱International Conference on Intelligent Computing and Smart Communication 2019影響因子(影響力)學(xué)科排名




書目名稱International Conference on Intelligent Computing and Smart Communication 2019網(wǎng)絡(luò)公開度




書目名稱International Conference on Intelligent Computing and Smart Communication 2019網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱International Conference on Intelligent Computing and Smart Communication 2019被引頻次




書目名稱International Conference on Intelligent Computing and Smart Communication 2019被引頻次學(xué)科排名




書目名稱International Conference on Intelligent Computing and Smart Communication 2019年度引用




書目名稱International Conference on Intelligent Computing and Smart Communication 2019年度引用學(xué)科排名




書目名稱International Conference on Intelligent Computing and Smart Communication 2019讀者反饋




書目名稱International Conference on Intelligent Computing and Smart Communication 2019讀者反饋學(xué)科排名





作者: Lipoprotein(A)    時(shí)間: 2025-3-21 21:14

作者: 縫紉    時(shí)間: 2025-3-22 02:47

作者: 權(quán)宜之計(jì)    時(shí)間: 2025-3-22 07:15

作者: Exonerate    時(shí)間: 2025-3-22 09:03
A Unified Platform for Crisis Mapping Using Web Enabled Crowdsourcing Powered by Knowledge Managememuch lesser time and provides means to collaborate with various Organizations. Here we collect the problems through forums, mails, social networks, and mobile messages, based on the data we receive the platform supervises the problem eradication manifesto supported by real time collaboration.
作者: Abnormal    時(shí)間: 2025-3-22 15:51
Conference proceedings 2020Engineering and Technology, Tehri, India, from 20 to 21 April 2019. The book is divided into two major sections – Intelligent Computing and Smart Communication. Some of the areas covered are Parallel and Distributed Systems, Web Services, Databases and Data Mining Applications, Feature Selection and
作者: Gleason-score    時(shí)間: 2025-3-22 17:56
2524-7565 tworking and mobile computing.Serves as a reference guide fo.This book gathers high-quality research papers presented at the First International Conference, ICSC 2019, organised by THDC Institute of Hydropower Engineering and Technology, Tehri, India, from 20 to 21 April 2019. The book is divided in
作者: 歡樂東方    時(shí)間: 2025-3-22 22:52
Conference proceedings 2020, High-Voltage Insulation Technologies, Fault Detection and Protection, Power System Analysis, Embedded Systems, Architectures, Electronics in Renewable Energy, CAD for VLSI, Green Electronics, Signal and Image Processing, Pattern Recognition and Analysis, Multi-Resolution Analysis and Wavelets, 3D and Stereo Imaging, and Neural Networks...?.
作者: GROUP    時(shí)間: 2025-3-23 01:22
A Survey of Fuzzy Logic Inference System and Other Computing Techniques for Agricultural Diseases,se of the fuzzy logic inference system or expert system for precision agriculture by making use of rule-based approach. This will help farmers to control and manage the diseases and increase crop productivity.
作者: 澄清    時(shí)間: 2025-3-23 08:22
A Model for Predicting Occurrence of Leaf Blast Disease in Rice Crop by Using Fuzzy Logic Techniqueariable and prediction percent as the dependent variable. At last this database is applied to ANFIS to provide a model that directly shows the level grading and predicted the severity of the disease. Our dataset has 83% accuracy and both variables are 99% correlated to each other.
作者: Ingest    時(shí)間: 2025-3-23 11:57
Location-Based Proactive Handoff Mechanism in Mobile Ad Hoc Network,ormation obtained. The architecture used in this scenario is WiMAX architecture and connections are maintained with the help of routers contained within the mobile stations. The proposed handoff method provides better handoff latency and error-free transmission in a system, where precise transmission information is necessary.
作者: bypass    時(shí)間: 2025-3-23 15:46

作者: yohimbine    時(shí)間: 2025-3-23 21:31

作者: 生存環(huán)境    時(shí)間: 2025-3-24 00:38
Credit Card Fraud Detection Using Correlation-Based Feature Extraction and Ensemble of Learners,orative model for fraud identification integrating correlation-based feature extraction and an ensemble layer of classifiers. CFS (Correlation-based Feature Selection) implements a fusion of correlation measure and exploratory search approach to rank the highest correlated attributes in the dataset.
作者: quiet-sleep    時(shí)間: 2025-3-24 05:37

作者: LOPE    時(shí)間: 2025-3-24 08:25

作者: Intend    時(shí)間: 2025-3-24 11:48

作者: 富足女人    時(shí)間: 2025-3-24 16:22

作者: Palliation    時(shí)間: 2025-3-24 21:26

作者: 事先無準(zhǔn)備    時(shí)間: 2025-3-25 01:00
A Literature Review on Energy-Efficient Routing Protocols for Heterogeneous WSNs, industries and battlefield-associated applications. Wireless Sensor Networks comprises thousands or even more number of unsystematically placed energy-deficient sensor units. These sensors are basically deployed for varied purposes mainly aimed to transfer the data from the sensor fields to the dis
作者: Facet-Joints    時(shí)間: 2025-3-25 03:49

作者: FLIT    時(shí)間: 2025-3-25 08:54
PSO-Based Improved DV-Hop Localization Algorithm in Wireless Sensor Networks, sensor nodes. To improve the node localization, a range-free localization algorithm is proposed in this paper, viz., improved Distance Vector (IDV) Hop Localization based on Particle Swarm Optimization (PSO). In the proposed algorithm, hop size of the anchor nodes is modified using the correction f
作者: Mri485    時(shí)間: 2025-3-25 15:18
Countermeasures Against Variants of Wormhole in Wireless Sensor Networks: A Review,n unattended environment, remote management, and nodes are easily captured. The major applications include military, health, monitoring environment, etc. The major possible attacks are wormhole, sinkhole, denial of service, selective forwarding, etc. Among all possible attacks, wormhole is a dangero
作者: 大炮    時(shí)間: 2025-3-25 18:09

作者: MAG    時(shí)間: 2025-3-25 22:11

作者: Anal-Canal    時(shí)間: 2025-3-26 02:17
Guidelines for an Effective Network Forensic System,an effective network forensic system. This helps the organizations to strategically establish their logging infrastructure so that the identified evidences are reliable, protected, and admissible in the court. The guideline also helps the forensic investigator while investigating a cyber attack.
作者: 腐爛    時(shí)間: 2025-3-26 05:35
Handling Incomplete and Delayed Information Using Optimal Scheduling of Big Data Stream,e as they arrive. The arrival rate of the big data stream may vary after some time. Scheduling plays a key part in big data streaming applications in a big data stream computing environment. In this paper, optimal scheduling is proposed on big data streams to handle the incomplete and delayed inform
作者: accomplishment    時(shí)間: 2025-3-26 09:58

作者: 虛假    時(shí)間: 2025-3-26 13:49

作者: 有毛就脫毛    時(shí)間: 2025-3-26 17:54

作者: 朋黨派系    時(shí)間: 2025-3-27 00:40

作者: filicide    時(shí)間: 2025-3-27 04:43

作者: 不愛防注射    時(shí)間: 2025-3-27 06:42

作者: 硬化    時(shí)間: 2025-3-27 11:40

作者: 陶醉    時(shí)間: 2025-3-27 16:24

作者: 重畫只能放棄    時(shí)間: 2025-3-27 20:07
Comparison of Fuzzy Logic Based MPPT of Grid-Connected Solar PV System with Different MPPT,verter. Fuzzy logic based MPPT is more efficient due to its better response to varying climate conditions. Performance evaluation of the different MPPTs for grid-connected solar systems is discussed in this paper.
作者: 搜尋    時(shí)間: 2025-3-27 23:55

作者: septicemia    時(shí)間: 2025-3-28 02:19
Handling Incomplete and Delayed Information Using Optimal Scheduling of Big Data Stream, as a feedback ID. Finally, krill herd optimization algorithm is used for the optimal scheduling of tasks based on the generated feedback ID. The results have shown that our proposed model outperformed popular scheduling algorithms in terms of computational time, schedule time, and throughput.
作者: brother    時(shí)間: 2025-3-28 09:32

作者: alleviate    時(shí)間: 2025-3-28 10:41
KKG-512: A New Approach for Kryptos Key Generation of Size 512 Bits Using Plaintext,s have good result in encryption and decryption process but very few algorithms are available for the secrecy of the key and we know that the strength of any cryptographic technique is fully dependent on the key. So the objective of this paper is to develop a new approach known as Kryptos key genera
作者: Digitalis    時(shí)間: 2025-3-28 15:16
HD-MAABE: Hierarchical Distributed Multi-Authority Attribute Based Encryption for Enabling Open Acctems. In this paper, a Hierarchical Distributed Multi-Authority Attribute Based Encryption (HD-MAABE) scheme is proposed, where the organization and standard attribute authorities issue the attributes. Internal users of the organization get their attributes issued from the organization and attribute
作者: gorgeous    時(shí)間: 2025-3-28 18:57
D. Kalyani,Somula Ramasubbareddy,K. Govinda,V. Kumar
作者: DAFT    時(shí)間: 2025-3-28 23:29
Ravi Kishan Surapaneni,Sailaja Nimmagadda,Roja Rani Govada
作者: 無辜    時(shí)間: 2025-3-29 07:01
Kamal Kumar Gola,Gulista Khan,Ashish Joshi,Rahul Rathore
作者: 粘連    時(shí)間: 2025-3-29 07:44
A. Vijaya Krishna,Somula Ramasubbareddy,K. Govinda
作者: Offstage    時(shí)間: 2025-3-29 14:25
Geetam Singh Tomar,Narendra S. Chaudhari,Mahesh KuDiscusses novel theories and research work on Intelligent Computing and Smart Communication.Focuses on the latest innovations in advanced networking and mobile computing.Serves as a reference guide fo
作者: 高貴領(lǐng)導(dǎo)    時(shí)間: 2025-3-29 18:28

作者: 哪有黃油    時(shí)間: 2025-3-29 20:04

作者: 蒼白    時(shí)間: 2025-3-30 02:26

作者: subacute    時(shí)間: 2025-3-30 06:23
Guidelines for an Effective Network Forensic System,an effective network forensic system. This helps the organizations to strategically establish their logging infrastructure so that the identified evidences are reliable, protected, and admissible in the court. The guideline also helps the forensic investigator while investigating a cyber attack.
作者: 懸崖    時(shí)間: 2025-3-30 11:27

作者: 飾帶    時(shí)間: 2025-3-30 13:16
International Conference on Intelligent Computing and Smart Communication 2019978-981-15-0633-8Series ISSN 2524-7565 Series E-ISSN 2524-7573
作者: 解開    時(shí)間: 2025-3-30 17:26

作者: libertine    時(shí)間: 2025-3-30 21:18
Matthew J. Olszta,Daniel K. Schreiber,Larry E. Thomas,Stephen M. Bruemmerusing this new model, the anesthesiologist has the opportunity to discuss the various treatment modalities and potentially suggest diagnostic testing to be performed prior to delivery, similar to the pre-operative testing that is done in other surgical environments.?. . . . .
作者: Mystic    時(shí)間: 2025-3-31 02:37
Structure and Expression of Aminopeptidase N unknown but it has been suggested that APN might be involved in the degradation of regulatory peptides.. In the recent years the realisation that APN is expressed in cells of the immune system has lent support to the idea that APN might be involved in the processing of antigens..
作者: Repetitions    時(shí)間: 2025-3-31 07:33

作者: Erythropoietin    時(shí)間: 2025-3-31 12:49

作者: Palate    時(shí)間: 2025-3-31 14:41

作者: condemn    時(shí)間: 2025-3-31 17:50
ca. Examining both the north-south divide and the spread of violence from Darfur, this study shows how colonial legacies have shaped state formation and charts out a path to inclusive citizenship and democracy.978-1-137-37179-9




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
龙游县| 呼图壁县| 化州市| 佛冈县| 华池县| 大悟县| 芜湖市| 大英县| 南涧| 黔江区| 射阳县| 丁青县| 杭州市| 遂溪县| 镇雄县| 霍城县| 蓬莱市| 唐海县| 翁源县| 太和县| 五河县| 阳曲县| 枣强县| 阿巴嘎旗| 梁平县| 全椒县| 白沙| 惠水县| 腾冲县| 信阳市| 临西县| 西林县| 永善县| 高邮市| 喀喇| 郧西县| 台山市| 琼海市| 福清市| 江山市| 阜宁县|