標(biāo)題: Titlebook: Smart Computing Paradigms: New Progresses and Challenges; Proceedings of ICACN Atilla El?i,Pankaj Kumar Sa,Sambit Bakshi Conference proceed [打印本頁(yè)] 作者: 厭氧 時(shí)間: 2025-3-21 16:06
書目名稱Smart Computing Paradigms: New Progresses and Challenges影響因子(影響力)
書目名稱Smart Computing Paradigms: New Progresses and Challenges影響因子(影響力)學(xué)科排名
書目名稱Smart Computing Paradigms: New Progresses and Challenges網(wǎng)絡(luò)公開度
書目名稱Smart Computing Paradigms: New Progresses and Challenges網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Smart Computing Paradigms: New Progresses and Challenges被引頻次
書目名稱Smart Computing Paradigms: New Progresses and Challenges被引頻次學(xué)科排名
書目名稱Smart Computing Paradigms: New Progresses and Challenges年度引用
書目名稱Smart Computing Paradigms: New Progresses and Challenges年度引用學(xué)科排名
書目名稱Smart Computing Paradigms: New Progresses and Challenges讀者反饋
書目名稱Smart Computing Paradigms: New Progresses and Challenges讀者反饋學(xué)科排名
作者: painkillers 時(shí)間: 2025-3-21 23:31
S. M. Suma,Shashidhar G. Koolagudi,Pravin B. Ramteke,K. S. Raol minimization program, an important step forward in automatic logic synthesis could result. ESPRESSO-II was born and an APL implemen- tation was created in the978-1-4612-9784-0978-1-4613-2821-6Series ISSN 0893-3405 作者: 打包 時(shí)間: 2025-3-22 04:14
Optimized Object Detection Technique in Video Surveillance System Using Depth Imagese applying any image preprocessing. So we investigated the depth image by which the accuracy of object detection can be improved without applying any image preprocessing. Experimental results demonstrated that depth image (96%) outperforms RGB image (48%) and infrared image (54%) in extreme low ligh作者: CRUDE 時(shí)間: 2025-3-22 07:32 作者: 針葉樹 時(shí)間: 2025-3-22 09:50
Segmentation of Calcified Plaques in Intravascular Ultrasound Images have been performed on the different IVUS data and their experimental results are analyzed in terms of both quantitative and qualitative manner. The results revealed that the spatial fuzzy C-means provides better segmentation accuracy by extracting the calcified region as compared with other approa作者: 思想 時(shí)間: 2025-3-22 14:10
A Comparative Study of Reversible Video Watermarking Using Automatic Threshold Adjuster and Non-feedir quality of services parameters. The ATAVW method is then compared with the non-feedback-based reversible watermarking algorithms. These results clearly demonstrated that the ATAVW method provides higher PSNR and embedding capability with respect to the DE method for reversible watermarking.作者: 尖叫 時(shí)間: 2025-3-22 19:13 作者: 制定 時(shí)間: 2025-3-23 00:57
verwendet werden, die in die Welt des logischen Sperrens eintauchen wollen und dabei einen ganzheitlichen überblick über die gesamte Infrastruktur erhalten m?chten, die für den Entwurf, die Bewertung und den Einsatz moderner Sperrstrategien erforderlich ist..978-3-031-54400-2作者: fulcrum 時(shí)間: 2025-3-23 04:43
verwendet werden, die in die Welt des logischen Sperrens eintauchen wollen und dabei einen ganzheitlichen überblick über die gesamte Infrastruktur erhalten m?chten, die für den Entwurf, die Bewertung und den Einsatz moderner Sperrstrategien erforderlich ist..978-3-031-54400-2作者: 創(chuàng)新 時(shí)間: 2025-3-23 07:02 作者: Exploit 時(shí)間: 2025-3-23 12:18
S. Prasanth Vaidya,P. V. S. S. R. Chandra Moulir als ein Jahrzehnt Forschung wurde von der Sicherheitsgemeinschaft in die Entwicklung einer Vielzahl von Schutzschemata investiert. Dennoch hat die zunehmende überspezialisierung von Schutzstrategien und ungenaue Angriffsmodelle dazu geführt, dass die meisten L?sungen auf theoretische Konstrukte be作者: Fortify 時(shí)間: 2025-3-23 13:59 作者: Osteoporosis 時(shí)間: 2025-3-23 21:35 作者: Inflammation 時(shí)間: 2025-3-23 22:29 作者: Ancestor 時(shí)間: 2025-3-24 05:01
Anant Ram Dubey,Nidhi Shukla,Divya Kumargning a variety of protection schemes. Nevertheless, the increasing overspecialization of protection policies and inaccurate attack models has led to most solutions being limited to theoretical constructs without offering a tangible route for practical, secure HW development.作者: maladorit 時(shí)間: 2025-3-24 06:39
Tara Chand Ulli,Deep Guptagning a variety of protection schemes. Nevertheless, the increasing overspecialization of protection policies and inaccurate attack models has led to most solutions being limited to theoretical constructs without offering a tangible route for practical, secure HW development.作者: MUMP 時(shí)間: 2025-3-24 12:04 作者: 無能力之人 時(shí)間: 2025-3-24 18:50
Subhajit Das,Arun Kumar Sunaniyagning a variety of protection schemes. Nevertheless, the increasing overspecialization of protection policies and inaccurate attack models has led to most solutions being limited to theoretical constructs without offering a tangible route for practical, secure HW development.作者: Surgeon 時(shí)間: 2025-3-24 20:05 作者: 終止 時(shí)間: 2025-3-25 00:55 作者: 寬敞 時(shí)間: 2025-3-25 05:40 作者: 鈍劍 時(shí)間: 2025-3-25 07:32
gning a variety of protection schemes. Nevertheless, the increasing overspecialization of protection policies and inaccurate attack models has led to most solutions being limited to theoretical constructs without offering a tangible route for practical, secure HW development.作者: 要塞 時(shí)間: 2025-3-25 15:12
Nagaratna B. Chittaragi,Shashidhar G. Koolagudias apparent from an initial implementation of recursive logic minimiza- tion (ESPRESSO-I) that, if we merged our new results into a two-level minimization program, an important step forward in automatic logic synthesis could result. ESPRESSO-II was born and an APL implemen- tation was created in the作者: Itinerant 時(shí)間: 2025-3-25 17:37 作者: 煩躁的女人 時(shí)間: 2025-3-25 22:42 作者: 責(zé)難 時(shí)間: 2025-3-26 00:42
he elimination of the literal. The method can be compared with type-checking, since the elimination procedure also shows whether some type literal fails, indicating a “badly-typed” clause. Our aim however is not to construct a type system, but rather to show that simple types can be handled using a 作者: kyphoplasty 時(shí)間: 2025-3-26 06:08
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/s/image/868688.jpg作者: –scent 時(shí)間: 2025-3-26 10:34
https://doi.org/10.1007/978-981-13-9683-0Artificial Intelligence; Network Performance Analysis; Conference Proceedings; ICACNI 2018; ICACNI; ICACN作者: FLASK 時(shí)間: 2025-3-26 16:41
Atilla El?i,Pankaj Kumar Sa,Sambit BakshiPresents recent research in advanced computing, networking and informatics.Discusses current research issues with novel solutions.Focuses on both theory and applications作者: 愛了嗎 時(shí)間: 2025-3-26 20:31 作者: 牲畜欄 時(shí)間: 2025-3-26 21:01
Smart Computing Paradigms: New Progresses and Challenges978-981-13-9683-0Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: AORTA 時(shí)間: 2025-3-27 02:31
izierung von Hardware-Trojanern und ihr Zusammenspiel mit loEine subtile Ver?nderung, die zu katastrophalen Folgen führt - Hardware-Trojaner stellen zweifellos eine der gr??ten Sicherheitsbedrohungen des modernen Zeitalters dar. Wie kann die Hardware vor diesen b?sartigen Ver?nderungen geschützt wer作者: gangrene 時(shí)間: 2025-3-27 09:06
izierung von Hardware-Trojanern und ihr Zusammenspiel mit loEine subtile Ver?nderung, die zu katastrophalen Folgen führt - Hardware-Trojaner stellen zweifellos eine der gr??ten Sicherheitsbedrohungen des modernen Zeitalters dar. Wie kann die Hardware vor diesen b?sartigen Ver?nderungen geschützt wer作者: 眼界 時(shí)間: 2025-3-27 10:05 作者: Conducive 時(shí)間: 2025-3-27 15:02 作者: 放棄 時(shí)間: 2025-3-27 20:12
Md. Shahzad Alam,T. S. Ashwin,G. Ram Mohana Reddy Schaltkreis-(IC-)Lieferkette stellt jedoch ein gro?es Risiko für die Integrit?t der Mikroelektronik dar. Eine winzige, verst?ndlich zusammengesetzte und korrekt platzierte Design?nderung kann katastrophale Auswirkungen haben; von der Preisgabe sensibler Benutzerdaten bis hin zu Dienstverweigerungsa作者: 帽子 時(shí)間: 2025-3-27 23:52 作者: 音的強(qiáng)弱 時(shí)間: 2025-3-28 03:44
Adarsh Jamadandi,Sunidhi Kotturshettar,Uma Mudenagudi Schaltkreis-(IC-)Lieferkette stellt jedoch ein gro?es Risiko für die Integrit?t der Mikroelektronik dar. Eine winzige, verst?ndlich zusammengesetzte und korrekt platzierte Design?nderung kann katastrophale Auswirkungen haben; von der Preisgabe sensibler Benutzerdaten bis hin zu Dienstverweigerungsa作者: 滋養(yǎng) 時(shí)間: 2025-3-28 10:08 作者: Metastasis 時(shí)間: 2025-3-28 14:07 作者: Cabinet 時(shí)間: 2025-3-28 16:12
Badal Soni,Pradip K. Das,Dalton Meitei Thounaojam,Debalina Biswascuit (IC) supply chain poses a great risk to the integrity of microelectronics. A tiny, intelligibly assembled, and correctly placed design modification can have catastrophic ramifications; from leaking sensitive user data to denial of service attacks on defense infrastructures—the range of possible作者: Blood-Clot 時(shí)間: 2025-3-28 20:52 作者: 花爭(zhēng)吵 時(shí)間: 2025-3-29 02:24
Prabira Kumar Sethy,Smitanjali Gouda,Nalinikanta Barpanda,Amiya Kumar Rathcuit (IC) supply chain poses a great risk to the integrity of microelectronics. A tiny, intelligibly assembled, and correctly placed design modification can have catastrophic ramifications; from leaking sensitive user data to denial of service attacks on defense infrastructures—the range of possible作者: 隨意 時(shí)間: 2025-3-29 06:05 作者: Bombast 時(shí)間: 2025-3-29 08:39
Prabhujit Mohapatra,Kedar Nath Das,Santanu Roycuit (IC) supply chain poses a great risk to the integrity of microelectronics. A tiny, intelligibly assembled, and correctly placed design modification can have catastrophic ramifications; from leaking sensitive user data to denial of service attacks on defense infrastructures—the range of possible作者: Trabeculoplasty 時(shí)間: 2025-3-29 14:43 作者: 間諜活動(dòng) 時(shí)間: 2025-3-29 17:31 作者: glowing 時(shí)間: 2025-3-29 22:08 作者: Affectation 時(shí)間: 2025-3-30 01:26
Pravin Bhaskar Ramteke,Srishti Hegde,Shashidhar G. Koolagudif a program can very easily be dealt with in two separate phases of the development, the termination issue is solely addressed in the second phase. Both formal, theoretical frameworks for reasoning about termination, and automatic techniques for termination analysis have recently obtained considerab作者: PLAYS 時(shí)間: 2025-3-30 04:48
SaiKiranmai Gorla,Sriharshitha Velivelli,Dipak Kumar Satpathi,N L Bhanu Murthy,Aruna Malapatif a program can very easily be dealt with in two separate phases of the development, the termination issue is solely addressed in the second phase. Both formal, theoretical frameworks for reasoning about termination, and automatic techniques for termination analysis have recently obtained considerab作者: 連鎖 時(shí)間: 2025-3-30 08:41 作者: 有機(jī)體 時(shí)間: 2025-3-30 16:19
Estimation of Tyre Pressure from the Characteristics of the Wheel: An Image Processing Approachadius. The efficiency of the feature is evaluated using three classifiers namely Random Forest, AdaBoost and Artificial Neural Networks. It is observed that the ratio of radii plays a major role in classifying the tyres. The proposed system can be used to obtain a rough idea on whether the tyre should be refilled or not.作者: 沙發(fā) 時(shí)間: 2025-3-30 19:17
A Robust and Blind Watermarking for Color Videos Using Redundant Wavelet Domain and SVDadversaries and also helps in claiming the ownership of the video content. From the experimental results, it is found that the proposed scheme is robust to all possible attacks and has better results when compared to existing watermarking schemes.作者: Banister 時(shí)間: 2025-3-30 22:27 作者: Myocyte 時(shí)間: 2025-3-31 04:23
Hash Code Based Image Authentication Using Rotation Invariant Local Phase Quantizationwatermarking techniques. Therefore, we propose a model using Rotation invariant Local Phase Quantization (RI-LPQ) to generate a feature vector for the input image. LPQ is blur insensitive, and coupled with rotation invariance property, it provides an accurate representation of texture features of the image.作者: 成績(jī)上升 時(shí)間: 2025-3-31 06:27
Note Transcription from Carnatic Musics. These segments are labeled using note information already available. Without prior knowledge of ., 30 out of 64 sequences are identified accurately and additional 18 sequences are identified with one note error. With the prior . knowledge 76.56% accuracy is observed in note sequence identification.作者: 含水層 時(shí)間: 2025-3-31 12:47
Named Entity Recognition Using Part-of-Speech Rules for Telugumanually annotated with NEs tags, namely person, location, organization, and others. We have achieved competent performance by the generated POS rules and they help to get deeper insights into NER for Telugu.作者: Offensive 時(shí)間: 2025-3-31 15:29
Conference proceedings 2020y. It brings together contributions from scientists, professors, scholars and students, and presents essential information on computing, networking, and informatics. It also discusses the practical challenges encountered and the solutions used to overcome them, the goal being to promote the “transla作者: 抱負(fù) 時(shí)間: 2025-3-31 21:22 作者: AMBI 時(shí)間: 2025-3-31 22:10
Conference proceedings 2020nd informatics. It also discusses the practical challenges encountered and the solutions used to overcome them, the goal being to promote the “translation” of basic research into applied research, and of applied research into practice. The works presented here will also demonstrate the importance of basic scientific research in a range of fields..作者: 泄露 時(shí)間: 2025-4-1 05:42
2194-5357 being to promote the “translation” of basic research into applied research, and of applied research into practice. The works presented here will also demonstrate the importance of basic scientific research in a range of fields..978-981-13-9682-3978-981-13-9683-0Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: BRIEF 時(shí)間: 2025-4-1 08:24
Two Stream Convolutional Neural Networks for Anomaly Detection in Surveillance Videosr spatial stream and 91% for temporal stream for airport scenario and an accuracy of 94.7% for spatial and 90.1% for the temporal stream for the mall scenario. Our framework can be easily implemented in real-time and is capable of detecting anomaly in each frame fed by a live surveillance system.