標題: Titlebook: Inventive Computation and Information Technologies; Proceedings of ICICI S. Smys,Khaled A. Kamel,Ram Palanisamy Conference proceedings 2023 [打印本頁] 作者: 開脫 時間: 2025-3-21 19:55
書目名稱Inventive Computation and Information Technologies影響因子(影響力)
書目名稱Inventive Computation and Information Technologies影響因子(影響力)學科排名
書目名稱Inventive Computation and Information Technologies網(wǎng)絡公開度
書目名稱Inventive Computation and Information Technologies網(wǎng)絡公開度學科排名
書目名稱Inventive Computation and Information Technologies被引頻次
書目名稱Inventive Computation and Information Technologies被引頻次學科排名
書目名稱Inventive Computation and Information Technologies年度引用
書目名稱Inventive Computation and Information Technologies年度引用學科排名
書目名稱Inventive Computation and Information Technologies讀者反饋
書目名稱Inventive Computation and Information Technologies讀者反饋學科排名
作者: 整頓 時間: 2025-3-22 00:02
S Anantha Babu,V. Manikandan,M. Jaiganesh,M. John Basha,P. Divyassion on the?relationship between the ‘fabulously textual’ and the ‘factual? in nuclear fiction contributes to a reconsideration of the ecological and political aspects of nuclear narrative, and frames the writers’ reflections?on the?literary dimensions of nuclear energy as a concept in an energy-de作者: 不透氣 時間: 2025-3-22 03:56
S. Saranya,M. Rajalakshmi,S. Devi,R. M. Suruthiider audience. Many directly link this absence of effective communication with the lack of concrete action on the part of decision makers and the public. The chapter argues that the humanities and social sciences can greatly contribute to the transfer of knowledge between the scientific community an作者: 熱情的我 時間: 2025-3-22 05:20 作者: Insul島 時間: 2025-3-22 12:27 作者: nettle 時間: 2025-3-22 15:18 作者: 怕失去錢 時間: 2025-3-22 18:32
Partha Pratim Rayc appliances. It means that when occupants are active, they extensively use their electric appliances and are more likely to use the wood stove simultaneously. Consequently, the peak power of electric appliances does not coincide with the peak power of the electric radiators so that total electric p作者: ungainly 時間: 2025-3-22 22:12
Souraneel Mandal,Sajib Saha,Tanaya Dasr linear programming model is used to formulate the problem, ensuring the solution’s optimality. The applicability of the proposed model is evaluated in the 69-bus distribution grid. Promising results concerning grid-connected MGs were obtained, including the enhancement of energy exchange with the 作者: Metastasis 時間: 2025-3-23 04:05 作者: 使苦惱 時間: 2025-3-23 08:28 作者: 效果 時間: 2025-3-23 10:58 作者: 別名 時間: 2025-3-23 16:43 作者: 漸變 時間: 2025-3-23 18:23 作者: Engulf 時間: 2025-3-23 23:36
Abhishek Gupta,Pranav Soneji,Nikhita Mangaonkarl strategy achieves energy savings of 5.9% to 12.2% compared to the conventional strategy. This research represents an important step forward in the development of smarter and more sustainable building management practices, which will become increasingly critical as we strive to reduce our environme作者: originality 時間: 2025-3-24 05:33 作者: engrave 時間: 2025-3-24 07:58
Ford Lumban Gaol,Christopher,Gerry Dermawan,Muhammad Resnandya Rafif,Rully Rubianto,Tokuro MatsuoRe project will on the one hand explore innovative NILM concepts to fulfill BMS application requirements while minimizing hardware cost. On the other hand, it will contribute innovative BMS applications based on device-level monitoring and contemporary communication infrastructure.作者: CBC471 時間: 2025-3-24 12:49
Jui Sanjay Berde,Shirish S. Kulkarniem for Energy Services (OS4ES) that is going to enable the aggregator to control dynamically configured large scale Virtual Power Plants with IEC 61850. The results of this project and its field test should contribute to the further development of IEC 61850.作者: 山頂可休息 時間: 2025-3-24 16:49 作者: 小樣他閑聊 時間: 2025-3-24 19:33
M. Sivaraman,J. Sumithant traces are fed back into a co-simulation framework to then show the impact on control performance of the different technologies. The results show that 2G and narrow-band PLC cannot support the presented control scenario, mainly due to throughput and delay limitations, while 3G and WLAN technologi作者: 彩色 時間: 2025-3-25 02:28 作者: Senescent 時間: 2025-3-25 04:06 作者: MURKY 時間: 2025-3-25 09:40
Enhancing Customer Prediction Using Machine Learning with Feature Selection Approaches,tomer pattern analysis in this study. The research investigation makes use of UCI’s customer dataset and compares machine learning results obtained with and without feature selection. Performing customer analysis helps businesses to improve their decision-making and marketing strategies, which in tu作者: otic-capsule 時間: 2025-3-25 14:55
Domain Name System Resolution System with Hyperledger Fabric Blockchain,arrier of the peer-to-peer network to reduce the impact of illegal access and complicity tampering on the DNS credibility. Hyperledger Fabric Blockchain has four characteristics: permission network, confidential transaction, non-crypto currency, and programmable. Furthermore, the DNS records stored 作者: 原始 時間: 2025-3-25 19:33 作者: Thymus 時間: 2025-3-25 21:54 作者: Feckless 時間: 2025-3-26 01:23 作者: AVANT 時間: 2025-3-26 07:06
,Supply Chain Management in?Blockchain Using Hyperledger,ly chains to improve overall supply chain management. Blockchain records information on a wide range of products and/or service transactions, which are tracked in real time to address a lack of transparency.作者: arcane 時間: 2025-3-26 10:42 作者: 可耕種 時間: 2025-3-26 14:38
The Influence of Digital Financial Literacy on Interest in Investing in the Capital Market of Mille a correlation between student interest in capital market investment and their digital financial literacy. As a result, extensive action is required to increase student interest in the capital market, which is precisely what this study wants to do. According to our findings, students who have access作者: heirloom 時間: 2025-3-26 17:24
Conference proceedings 2023ies (ICICIT 2022), organized during August 25–26, 2022. This book includes papers in the research area of information sciences and communication engineering. This book presents novel and innovative research results in theory, methodology and applications of communication engineering and information technologies..作者: 無表情 時間: 2025-3-26 21:33 作者: hemoglobin 時間: 2025-3-27 04:28
Inventive Computation and Information Technologies978-981-19-7402-1Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: anthesis 時間: 2025-3-27 08:38 作者: 摸索 時間: 2025-3-27 11:39 作者: Left-Atrium 時間: 2025-3-27 15:21
Lecture Notes in Networks and Systemshttp://image.papertrans.cn/i/image/474631.jpg作者: G-spot 時間: 2025-3-27 20:32
Comparison of Various CNN Models for Image Classification,ike medical imaging, automated vehicle, social media and many more. This paper compares convolutional neural network (CNN) models like AlexNet, VGG16, InceptionV3, Deep residual networks (ResNet), and DenseNet using the accuracy. Here, the CIFAR-10 dataset is used for comparison.作者: genuine 時間: 2025-3-27 22:12 作者: hypnogram 時間: 2025-3-28 02:22
Conference proceedings 2023ies (ICICIT 2022), organized during August 25–26, 2022. This book includes papers in the research area of information sciences and communication engineering. This book presents novel and innovative research results in theory, methodology and applications of communication engineering and information 作者: GLEAN 時間: 2025-3-28 09:49
A Meta-Classifier Link Prediction Model for False Profile Identification in Facebook,when compared to alternative prevailing methods. Hence, the method incorporated reveals the outliers in the social networks. We proposed an approach that can identify the false profiles with 93% accuracy and lower false positive rates with sustainable accuracy.作者: infantile 時間: 2025-3-28 11:36
Jyoti: An Intelligent App for Women Security,n a bad situation, the application will send a message to trusted people and the police will go to current location. This application has unique feature that it sends messages to trusted people at regular intervals while shaking the phone. It also calls for the first trusted contact to assist in an emergency. It will help to reduce female crime.作者: Chagrin 時間: 2025-3-28 17:08 作者: Mitigate 時間: 2025-3-28 19:02 作者: 招致 時間: 2025-3-29 02:17 作者: 彩色 時間: 2025-3-29 03:56
2367-3370 esearch area of information sciences and communication engineering. This book presents novel and innovative research results in theory, methodology and applications of communication engineering and information technologies..978-981-19-7401-4978-981-19-7402-1Series ISSN 2367-3370 Series E-ISSN 2367-3389 作者: HACK 時間: 2025-3-29 08:59 作者: 饒舌的人 時間: 2025-3-29 15:11
Robotic Process Automation Powered Admission Management System,uploaded supporting documents, accept students’ admission requests, send verification emails, detect discrepancies, and brief the students regarding the same via email. Robotic Process Automation Powered Admission Management System (R.P.A.A.M.S) can carry out the specified operations competently.作者: 語源學 時間: 2025-3-29 18:44
Implementation of Advanced High Performance Bus to Advanced Peripheral Bus Bridge,four modules: an AHB master, an AHB slave interface, an APB controller, and an APB interface. These modules were written in Verilog Hardware Description Language (VHDL) and tested on a Questa Sim-64 10.7c and also code coverage report has been generated.作者: 正面 時間: 2025-3-29 22:32
Security Enhancement in IoT with an Application of Water Monitoring, the safety of user data and give assurity to the user that the data is not accessed without their consent. As a proof of concept, we will develop an Internet-based water flow monitoring system that will avoid water theft and will enable users to access data and create statistical inferences.作者: Paraplegia 時間: 2025-3-30 00:14
Decision Support System for Weeding Out Drug Seeking Behavior from Emergency Clinics,s the EHR to predict how much of the prescription opioid the patient requires. This will eventually prevent patients from becoming dependent on these medications and preserve these pharmaceuticals for their intended use.作者: 摻和 時間: 2025-3-30 07:06
Detecting Wildlife Trapped Images Using Automatically Shared Nearest Neighbouring Pixels (ASNNP),. This work covers the components of a detect and categorises the species of trapped picture with crop using bbox detect by automatically selecting the shared closest neighbour pixel to detect the large data set detected by MegaDetector. The model automatically selects the weighted average pixel usi作者: 編輯才信任 時間: 2025-3-30 10:51
A Meta-Classifier Link Prediction Model for False Profile Identification in Facebook,es in these networks has become more vital in exposing network intruders or malicious users. In this paper, we have included a novel meta-classifier which will notice anomalous vertices in complicated interactive network topology by extracting useful patterns. We identify that a vertex with several 作者: Integrate 時間: 2025-3-30 15:26
Comparison of Various CNN Models for Image Classification,eives the input image, analyzes the image, and assigns the label based on its training. Image classification provides a vital role in various fields like medical imaging, automated vehicle, social media and many more. This paper compares convolutional neural network (CNN) models like AlexNet, VGG16,作者: 網(wǎng)絡添麻煩 時間: 2025-3-30 16:55
Enhancing Customer Prediction Using Machine Learning with Feature Selection Approaches,o customer patterns and the identification of high-risk customers in the enterprise. In today’s world, machine learning approaches are being used more and more in customer pattern analysis and prediction, as well as in other areas. But in real-time, the consumer dataset often holds a poor quality of作者: 無法治愈 時間: 2025-3-31 00:27 作者: 感激小女 時間: 2025-3-31 03:03
Parametric Analysis of Resource-Constrained Devices for Internet of Things Using FreeRTOS,h the current real-time scenario. Further, power consumption and sleep period determining approaches are not feasible in such platforms. In this paper, a novel RiotModel framework is proposed to validate the appropriateness of resource-constrained IoT-based devices to cope up with the concurrency re作者: DECRY 時間: 2025-3-31 07:06
A Text Analytics Approach of Exploratory Visualization of Legal Parameters of Dowry Death Cases,text to comprehend the meaning present within the documents. Indian judicial systems rely on unstructured textual sources. Retrieving information by analyzing legal documents is a time-consuming task for legal professionals. Natural Language Processing and its techniques, i.e., text analytics can su作者: QUAIL 時間: 2025-3-31 12:17
Okra Cultivation Using IoT and Disease Detection,ivation time, with a substantial number of yields produced. In cultivation of okra, farmers face difficulties in maintaining the moisture in soil, detecting the diseases since okra is prone to acquire diseases, harvesting during the right period, and involving expensive labor. Scientists are trying 作者: arthroscopy 時間: 2025-3-31 14:37
Identifying Pitfalls and Solutions in Parallelizing Long Short-Term Memory Network on Graphical Pro makes it difficult. RNN is used mainly for sequential data, but the dependencies are complex, making it difficult to parallelize. Resource utilization is inefficient for RNN in GPU compared to TPU. This analysis of RNN for hate speech application is done in GPU and TPU, and the data reuse is identi作者: jettison 時間: 2025-3-31 18:58 作者: Ornament 時間: 2025-3-31 22:33
Jyoti: An Intelligent App for Women Security,n comes a growing sense of loneliness and helplessness among certain social groups. Women’s safety is a major issue in this situation, not only for the poor but also for civilized women. Weaknesses in the situation women’s safety plans, practices, and guidelines exist to reduce violence against wome作者: 一回合 時間: 2025-4-1 05:31
Performance Analysis of Machine Learning Algorithms in the Systematic Prediction of Chronic Kidney data is properly utilized, it will be helpful in the diagnosis as well as treatment of many diseases. Chronic kidney disease (CKD) is a progressive reduction in the function of kidney which is not reversible. During the progress in disease development, patients may suffer from other health issues li作者: Meager 時間: 2025-4-1 08:47 作者: 變白 時間: 2025-4-1 11:35 作者: 波動 時間: 2025-4-1 17:19